Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.228",
%%%     date            = "20 February 2026",
%%%     time            = "07:24:22 MDT",
%%%     filename        = "jacm.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "26109 113287 553986 5204593",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; JACM; Journal of the
%%%                        ACM",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        Journal of the Association for Computing
%%%                        Machinery (CODEN JACOAH, ISSN 0004-5411),
%%%                        covering all published articles, letters,
%%%                        remarks, and corrigenda from all volumes
%%%                        (1954--date).
%%%
%%%                        At version 1.228, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             1954 (  29)    1979 (  59)    2004 (  33)
%%%                             1955 (  29)    1980 (  61)    2005 (  30)
%%%                             1956 (  48)    1981 (  52)    2006 (  31)
%%%                             1957 (  62)    1982 (  65)    2007 (  32)
%%%                             1958 (  45)    1983 (  51)    2008 (  28)
%%%                             1959 (  54)    1984 (  52)    2009 (  38)
%%%                             1960 (  43)    1985 (  51)    2010 (  34)
%%%                             1961 (  48)    1986 (  39)    2011 (  26)
%%%                             1962 (  41)    1987 (  48)    2012 (  32)
%%%                             1963 (  50)    1988 (  48)    2013 (  45)
%%%                             1964 (  43)    1989 (  42)    2014 (  41)
%%%                             1965 (  58)    1990 (  37)    2015 (  51)
%%%                             1966 (  56)    1991 (  37)    2016 (  49)
%%%                             1967 (  64)    1992 (  38)    2017 (  56)
%%%                             1968 (  53)    1993 (  45)    2018 (  42)
%%%                             1969 (  57)    1994 (  47)    2019 (  45)
%%%                             1970 (  64)    1995 (  46)    2020 (  38)
%%%                             1971 (  52)    1996 (  32)    2021 (  49)
%%%                             1972 (  55)    1997 (  34)    2022 (  46)
%%%                             1973 (  53)    1998 (  35)    2023 (  42)
%%%                             1974 (  64)    1999 (  32)    2024 (  42)
%%%                             1975 (  53)    2000 (  35)    2025 (  43)
%%%                             1976 (  66)    2001 (  38)    2026 (   7)
%%%                             1977 (  51)    2002 (  31)
%%%                             1978 (  57)    2003 (  53)
%%%
%%%                             Article:       3281
%%%                             Book:             2
%%%
%%%                             Total entries: 3283
%%%
%%%                        The author will be grateful for reports of
%%%                        any errors or omissions in this file; they
%%%                        will be corrected in future editions.
%%%
%%%                        Articles and letters or corrections that
%%%                        comment on them are cross-referenced in both
%%%                        directions, so that citation of one of them
%%%                        will automatically include the others.
%%%
%%%                        All entries in the years 1954--1994 have
%%%                        been checked against the original journal
%%%                        articles (NOT the tables of contents, which
%%%                        abbreviate names and titles, and sometimes
%%%                        have other errors as well) for correct
%%%                        accents, capitalization, and spelling of
%%%                        author and title data.
%%%
%%%                        Volumes 1 and 2 used all-cap titles, with
%%%                        mixed caps in the table of contents; for
%%%                        readability, and consistency with all other
%%%                        journal volumes, mixed caps have been used
%%%                        for article titles in all volumes.
%%%
%%%                        Bibliography software has been used to make
%%%                        further checks for consistency of
%%%                        pages/number/month data.
%%%
%%%                        The initial draft of this file was
%%%                        developed from the TeX Users Group
%%%                        bibliography collection on
%%%                        ftp.math.utah.edu in /pub/tex/bib, and from
%%%                        the Computer Science bibliography
%%%                        collection on ftp.ira.uka.de in
%%%                        /pub/bibliography, to which many people of
%%%                        have contributed.  Math Review MRclass and
%%%                        MRnumber values were supplied from a search
%%%                        of the American Mathematical Society's
%%%                        MathSciNet database.  A search of the
%%%                        Compendex databases (1970--1996) provided
%%%                        many missing abstracts, and cross checks of
%%%                        existing data.
%%%
%%%                        The ACM maintains Web pages with journal
%%%                        tables of contents for 1954--date at
%%%                        http://www.acm.org/pubs/toc, with pages for
%%%                        this journal at
%%%
%%%                            http://www.acm.org/pubs/contents/journals/jacm/
%%%                            http://portal.acm.org/browse_dl.cfm?idx=J401
%%%                            https://dl.acm.org/loi/jacm
%%%
%%%                        That data has been automatically converted
%%%                        to BibTeX form, corrected for spelling and
%%%                        page number errors, and merged into this
%%%                        file.
%%%
%%%                        ACM copyrights explicitly permit abstracting
%%%                        with credit, so article abstracts, keywords,
%%%                        and subject classifications have been
%%%                        included in this bibliography wherever
%%%                        available.  Article reviews have been
%%%                        omitted, until their copyright status has
%%%                        been clarified.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.   Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by the biblabel software
%%%                        developed for the BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, with the help of
%%%                        ``bibsort -byvolume''.  The bibsort utility,
%%%                        and several related programs for
%%%                        bibliography maintenance, is available on
%%%                        ftp.math.utah.edu in /pub/tex/bib, and at
%%%                        other Internet sites which mirror it,
%%%                        including the Comprehensive TeX Archive
%%%                        Network (CTAN); the command `finger
%%%                        ctan<at>tug.org' will produce a list of
%%%                        CTAN hosts.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
   "\input path.sty" #
   "\ifx \undefined \mathbb  \def \mathbb #1{{\bf #1}}\fi" #
   "\ifx \undefined \mathrm  \def \mathrm #1{{\rm #1}}\fi" #
   "\ifx \undefined \poly    \def \poly {\mathrm{poly}}\fi" #
   "\ifx \undefined \polylog \def \polylog {\mathrm{polylog}}\fi" #
   "\hyphenation{
                Cher-vo-nen-kis
                Eh-ren-feucht
                Hal-pern
                Jean-ette
                Kam-eda
                Leigh-ton
                Mehl-horn
                Metro-po-lis
                Pra-sad
                Prep-a-ra-ta
                Press-er
                Pros-ku-row-ski
                Ros-en-krantz
                Ru-dolph
                Schie-ber
                Schnei-der
                Te-zu-ka
                Vis-wa-na-than
                Yech-ez-kel
                Yech-i-ali
                data-base
                data-bases
                dead-lock
                poly-adic
                }"
        }

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-CACM                  = "Communications of the Association for
                                  Computing Machinery"}

@String{j-J-ACM                 = "Journal of the ACM"}

@String{j-J-COMPUT-APPL-MATH    = "Journal of Computational and Applied
                                  Mathematics"}

@String{j-TOPLAS                = "ACM Transactions on Programming
                                  Languages and Systems"}

%%% ====================================================================
%%% Publishers and their addresses:
@String{pub-U-ILLINOIS-PRESS    = "University of Illinois Press"}

@String{pub-U-ILLINOIS-PRESS:adr = "Urbana, IL, USA"}

%%% ====================================================================
%%% Bibliography entries.  To satisfy cross references, a few entries
%%% from other journals and books are included here.
@Book{vonNeumann:1966:TSR,
  author =       "John {von Neumann}",
  editor =       "A. W. Burks",
  title =        "Theory of Self-Reproducing Automata",
  publisher =    pub-U-ILLINOIS-PRESS,
  address =      pub-U-ILLINOIS-PRESS:adr,
  pages =        "xix + 388",
  year =         "1966",
  LCCN =         "QA267 .V55",
  bibdate =      "Wed Jan 10 19:22:59 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Von Neumann's work on self-reproducing automata,
                 completed and edited after his death by Arthur Burks.
                 Also includes transcripts of von Neumann's 1949
                 University of Illinois lectures on the ``Theory and
                 Organization of Complicated Automata''. See
                 \cite{Burks:1970:ECA}.",
  acknowledgement = ack-nhfb,
  keywords =     "refs-general, CA, automata-theory, complex,
                 automata-selfrepro",
}

@Book{Burks:1970:ECA,
  author =       "Arthur W. Burks",
  title =        "Essays on Cellular Automata",
  publisher =    pub-U-ILLINOIS-PRESS,
  address =      pub-U-ILLINOIS-PRESS:adr,
  pages =        "xxvi + 375",
  year =         "1970",
  LCCN =         "QA267.5.S4 B87",
  bibdate =      "Wed Jan 10 19:23:20 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "A classic collection of papers on cellular automata
                 intended as a companion to von Neumann's {\em Theory of
                 Self Reproducing Automata\/}
                 \cite{vonNeumann:1966:TSR}. Includes papers by Burks,
                 Thatcher, Moore, Myhill, Ulam, and Holland. See
                 \cite{Holland:1962:OLT}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  keywords =     "CA, refs-general, refs-bottomup, automata-selfrepro,
                 automata-biol",
}

@Article{Ercoli:1960:LEE,
  author =       "Paolo Ercoli",
  title =        "Letters to the {Editor}: Errors Due to Overflow in
                 Arithmetic Operations",
  journal =      j-CACM,
  volume =       "3",
  number =       "12",
  pages =        "A9--A9",
  month =        dec,
  year =         "1960",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Nov 25 18:19:29 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm1960.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Ercoli:1957:EDO}.",
  acknowledgement = ack-nhfb,
  ajournal =     "Commun. ACM",
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

@Article{Tarjan:1979:SST,
  author =       "Robert Endre Tarjan and Andrew Chi-Chih Yao",
  title =        "Storing a Sparse Table",
  journal =      j-CACM,
  volume =       "22",
  number =       "11",
  pages =        "606--611",
  month =        nov,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sun May 02 10:02:29 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Fredman:1984:SST}.",
  acknowledgement = ack-nhfb,
  ajournal =     "Commun. ACM",
  fjournal =     "Communications of the ACM",
  journal-URL =  "https://dl.acm.org/loi/cacm",
}

%%% ====================================================================
%%% Entries for the Journal of the Association for Computing Machinery:
@Article{Williams:1954:ACM,
  author =       "S. B. Williams",
  title =        "The {Association for Computing Machinery}",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "1",
  pages =        "1--3",
  month =        jan,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 10 18:09:03 1998",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Backus:1954:ISS,
  author =       "J. W. Backus",
  title =        "The {IBM 701 Speedcoding} System",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "1",
  pages =        "4--6",
  month =        jan,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://community.computerhistory.org/scc/projects/FORTRAN/paper/p4-backus.pdf",
  abstract =     "The IBM 701 Speedcoding System is a set of
                 instructions which causes the 701 to behave like a
                 three-address floating point calculator. Let us call
                 this the Speedcoding calculator. In addition to
                 operating in floating point, this Speedcoding
                 calculator has extremely convenient means for getting
                 information into the machine and for printing results;
                 it has an extensive set of operations to make the job
                 of programming as easy as possible. Speedcoding also
                 provides automatic address modification, flexible
                 tracing, convenient use of auxiliary storage, and
                 built-in checking.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wiseman:1954:LIP,
  author =       "R. T. Wiseman",
  title =        "Life Insurance Premium Billing and Combined Operations
                 by Electronic Equipment",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "1",
  pages =        "7--12",
  month =        jan,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamilton:1954:IMD,
  author =       "F. E. Hamilton and E. C. Kubie",
  title =        "The {IBM Magnetic Drum Calculator Type 650}",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "1",
  pages =        "13--20",
  month =        jan,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 00:56:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jacobs:1954:ERA,
  author =       "H. {Jacobs, Jr.}",
  title =        "Equipment Reliability as Applied to Analogue
                 Computers",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "1",
  pages =        "21--26",
  month =        jan,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 18:52:51 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Edwards:1954:SAM,
  author =       "C. M. Edwards",
  title =        "Survey of Analog Multiplication Schemes",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "1",
  pages =        "27--35",
  month =        jan,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Perley:1954:ASG,
  author =       "Richmond Perley",
  title =        "Automatic Strain-Gage and Thermocouple Recording on
                 Punched Cards",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "1",
  pages =        "36--43",
  month =        jan,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1954:NNa,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "1",
  pages =        "44--44",
  month =        jan,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 18:53:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Neumann:1954:SODa,
  author =       "A. J. Neumann",
  title =        "Supplement: {ONR Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "1",
  pages =        "45--55",
  month =        jan,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:49:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Leiner:1954:SSD,
  author =       "Alan L. Leiner",
  title =        "System Specifications for the {DYSEAC}",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "2",
  pages =        "57--81",
  month =        apr,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brock:1954:PAT,
  author =       "Paul Brock and Sybil Rock",
  title =        "Problems in Acceptance Testing in Digital Computers",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "2",
  pages =        "82--87",
  month =        apr,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Moshman:1954:GPR,
  author =       "Jack Moshman",
  title =        "The Generation of Pseudo-Random Numbers on a Decimal
                 Calculator",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "2",
  pages =        "88--91",
  month =        apr,
  year =         "1954",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/320772.320775",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  HDnumber =     "85",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1954:NNb,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "2",
  pages =        "92--92",
  month =        apr,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Neumann:1954:SODb,
  author =       "A. J. Neumann",
  title =        "Supplement: {ONR Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "2",
  pages =        "93--100",
  month =        apr,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:49:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bergman:1954:MSB,
  author =       "Stefan Bergman",
  title =        "A Method of Solving Boundary Value Problems of
                 Mathematical Physics on Punch Card Machines",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "3",
  pages =        "101--104",
  month =        jul,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wasel:1954:MDP,
  author =       "A. D. Wasel",
  title =        "A Method of Determining Plate Bending by Use of a
                 Punched-Card Machine",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "3",
  pages =        "105--110",
  month =        jul,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 23:18:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Crandall:1954:NTF,
  author =       "Stephen H. Crandall",
  title =        "Numerical Treatment of a Fourth Order Parabolic
                 Partial Differential Equation",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "3",
  pages =        "111--117",
  month =        jul,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 00:56:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Elgot:1954:SVT,
  author =       "Calvin C. Elgot",
  title =        "On Single vs. Triple Address Computing Machines",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "3",
  pages =        "118--123",
  month =        jul,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gotlieb:1954:RCE,
  author =       "C. C. Gotlieb",
  title =        "Running a Computer Efficiently",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "3",
  pages =        "124--127",
  month =        jul,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wadel:1954:EDA,
  author =       "Louis B. Wadel",
  title =        "An Electronic Differential Analyzer as a Difference
                 Analyzer",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "3",
  pages =        "128--136",
  month =        jul,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 00:57:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1954:NNc,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "3",
  pages =        "137--138",
  month =        jul,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Neumann:1954:SODc,
  author =       "A. J. Neumann",
  title =        "Supplement: {ONR Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "3",
  pages =        "139--148",
  month =        jul,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:49:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bashe:1954:IT,
  author =       "C. J. Bashe and W. Buchholz and N. Rochester",
  title =        "The {IBM Type 702}",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "4",
  pages =        "149--169",
  month =        oct,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:49:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Atta:1954:CGH,
  author =       "Susie E. Atta and Ward C. Sangren",
  title =        "Calculation of Generalized Hypergeometric Series",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "4",
  pages =        "170--172",
  month =        oct,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:50:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Trexler:1954:PUC,
  author =       "George F. Trexler",
  title =        "Public Utility Customer Accounting on the {Type 650
                 Magnetic Drum Data Processing Machine}",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "4",
  pages =        "173--176",
  month =        oct,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:50:11 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bauer:1954:DHS,
  author =       "Walter F. Bauer and John W. {Carr III}",
  title =        "On the Demonstration of High-Speed Digital Computers",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "4",
  pages =        "177--182",
  month =        oct,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:50:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Davis:1954:MPO,
  author =       "Philip Davis and Philip Rabinowitz",
  title =        "A Multiple Purpose Orthonormalizing Code and Its
                 Uses",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "4",
  pages =        "183--191",
  month =        oct,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:50:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1954:NNd,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "4",
  pages =        "192--192",
  month =        oct,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:50:39 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Neumann:1954:SODd,
  author =       "A. J. Neumann",
  title =        "Supplement: {ONR Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "1",
  number =       "4",
  pages =        "193--200",
  month =        oct,
  year =         "1954",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:18:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rutishauser:1955:SPT,
  author =       "Heinz Rutishauser",
  title =        "Some Programming Techniques for the {ERMETH}",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "1",
  pages =        "1--4",
  month =        jan,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gray:1955:PTE,
  author =       "H. J. {Gray, Jr.}",
  title =        "Propagation of Truncation Errors in the Numerical
                 Solution of Ordinary Differential Equations by Repeated
                 Closures",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "1",
  pages =        "6--17",
  month =        jan,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Titus:1955:GCP,
  author =       "C. K. Titus",
  title =        "A General Card-Program for the Evaluation of the
                 Inverse {Laplace} Transform",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "1",
  pages =        "18--27",
  month =        jan,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:31:29 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Logan:1955:ASE,
  author =       "Benjamin F. Logan and George R. Welti and George C.
                 Sponsler",
  title =        "Analogue Study of Electron Trajectories",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "1",
  pages =        "28--41",
  month =        jan,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Crandall:1955:IVE,
  author =       "Stephen H. Crandall",
  title =        "Implicit vs. Explicit Recurrence Formulas for the
                 Linear Diffusion Equation",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "1",
  pages =        "42--49",
  month =        jan,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 23:18:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1955:NNa,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "1",
  pages =        "50--52",
  month =        jan,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Neumann:1955:SODa,
  author =       "A. J. Neumann",
  title =        "Supplement: {ONR Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "1",
  pages =        "53--60",
  month =        jan,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:50:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Murray:1955:MR,
  author =       "F. J. Murray",
  title =        "Mechanisms and Robots",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "2",
  pages =        "61--82",
  month =        apr,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Moshos:1955:AIA,
  author =       "George J. Moshos",
  title =        "Analog Interpolator for Automatic Control",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "2",
  pages =        "83--91",
  month =        apr,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamer:1955:TOA,
  author =       "Howard Hamer and Jerome D. Kennedy",
  title =        "Testing of Operational Amplifiers",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "2",
  pages =        "92--94",
  month =        apr,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Graney:1955:MAT,
  author =       "Edward P. Graney",
  title =        "Maintenance and Acceptance Tests Used on the {MIDAC}",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "2",
  pages =        "95--98",
  month =        apr,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Weil:1955:RRM,
  author =       "Herschel Weil",
  title =        "Reduction of Runs in Multiparameter Computations",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "2",
  pages =        "99--110",
  month =        apr,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cohn:1955:SEI,
  author =       "Harvey Cohn",
  title =        "Some Experiments in Ideal Factorization on the
                 {MIDAC}",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "2",
  pages =        "111--116",
  month =        apr,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1955:NNb,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "2",
  pages =        "117--118",
  month =        apr,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Neumann:1955:SODb,
  author =       "A. J. Neumann",
  title =        "Supplement: {ONR Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "2",
  pages =        "119--136",
  month =        apr,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:50:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Young:1955:OSD,
  author =       "David M. Young",
  title =        "{ORDVAC} Solutions of the {Dirichlet} Problem",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "3",
  pages =        "137--161",
  month =        jul,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:30:54 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Abramowitz:1955:VSC,
  author =       "Milton Abramowitz and William F. Cahill",
  title =        "On the Vibration of a Square Clamped Plate",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "3",
  pages =        "162--168",
  month =        jul,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pulvari:1955:MMU,
  author =       "Charles F. Pulvari",
  title =        "Memory Matrix Using Ferroelectric Condensers as
                 Bistable Elements",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "3",
  pages =        "169--185",
  month =        jul,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 00:58:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rubinoff:1955:DCR,
  author =       "Morris Rubinoff",
  title =        "Digital Computers for Real-Time Simulation",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "3",
  pages =        "186--204",
  month =        jul,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:00:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Parsons:1955:SDC,
  author =       "Frances L. Parsons",
  title =        "A Simple Desk-Calculator Method for Checking Binary
                 Results of Digital Computer Arithmetic Operations",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "3",
  pages =        "205--207",
  month =        jul,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:00:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1955:NNc,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "3",
  pages =        "208--210",
  month =        jul,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Neumann:1955:SODc,
  author =       "A. J. Neumann",
  title =        "Supplement: {ONR Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "3",
  pages =        "211--228",
  month =        jul,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:51:04 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blanyer:1955:PMD,
  author =       "Carl G. Blanyer",
  title =        "Precision Modulators and Demodulators",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "4",
  pages =        "229--242",
  month =        oct,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hume:1955:TSA,
  author =       "J. N. P. Hume and Beatrice H. Worsley",
  title =        "{Transcode}: a System of Automatic Coding for
                 {FERUT}",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "4",
  pages =        "243--252",
  month =        oct,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:01:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gorman:1955:ACI,
  author =       "T. P. Gorman and R. G. Kelly and R. B. Reddy",
  title =        "Automatic Coding for the {IBM 701}",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "4",
  pages =        "253--261",
  month =        oct,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Macon:1955:CEH,
  author =       "Nathaniel Macon",
  title =        "On the Computation of Exponential and Hyperbolic
                 Functions Using Continued Fractions",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "4",
  pages =        "262--266",
  month =        oct,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Haneman:1955:CCA,
  author =       "V. S. Haneman and J. W. Senders",
  title =        "Correlation Computation on Analog Devices",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "4",
  pages =        "267--279",
  month =        oct,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1955:NNd,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "4",
  pages =        "280--282",
  month =        oct,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:23:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Neumann:1955:SODd,
  author =       "A. J. Neumann",
  title =        "Supplement: {ONR Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "2",
  number =       "4",
  pages =        "283--298",
  month =        oct,
  year =         "1955",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:51:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Householder:1956:PAA,
  author =       "Alston S. Householder",
  title =        "{Presidential Address to the ACM, Philadelphia,
                 September 14, 1955}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:24:06 1998",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gordon:1956:OPI,
  author =       "Barry Gordon",
  title =        "An Optimizing Program for the {IBM 650}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "1",
  pages =        "3--5",
  month =        jan,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Henrici:1956:SCR,
  author =       "Peter Henrici",
  title =        "A Subroutine for Computations with Rational Numbers",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "1",
  pages =        "6--9",
  month =        jan,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Henrici:1956:ACP,
  author =       "Peter Henrici",
  title =        "Automatic Computations with Power Series",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "1",
  pages =        "10--15",
  month =        jan,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:33:31 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/auto.diff.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The use of recursion relations in the calculation of
                 power series is suggested. The recursion relations for
                 two example power series are given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "point algorithms; recursion relations",
}

@Article{Wadel:1956:SDF,
  author =       "Louis B. Wadel",
  title =        "Simulation of Digital Filters on an Electronic Analog
                 Computer",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "1",
  pages =        "16--21",
  month =        jan,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Conte:1956:KTO,
  author =       "S. D. Conte and R. F. Reeves",
  title =        "A {Kutta} Third-Order Procedure for Solving
                 Differential Equations Requiring Minimal Storage",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "1",
  pages =        "22--25",
  month =        jan,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Young:1956:REA,
  author =       "Robert L. Young",
  title =        "Report on Experiments in Approximating the Solution of
                 a Differential Equation",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "1",
  pages =        "26--28",
  month =        jan,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stark:1956:RCN,
  author =       "R. H. Stark",
  title =        "Rates of Convergence in Numerical Solution of the
                 Diffusion Equation",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "1",
  pages =        "29--40",
  month =        jan,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1956:NNa,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "1",
  pages =        "41--43",
  month =        jan,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1956:DCNa,
  author =       "Anonymous",
  title =        "{Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "1",
  pages =        "44--64",
  month =        jan,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:51:17 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Perkins:1956:EPC,
  author =       "Robert Perkins",
  title =        "{EASIAC}, a Pseudo-Computer",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "2",
  pages =        "65--72",
  month =        apr,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "One of the primary functions of the MIDAC installation
                 at the University of Michigan is the instruction of
                 beginners in the various aspects of digital machine use
                 including programming and coding. \ldots{} In
                 conducting these courses it was soon found to be
                 extremely difficult, in five or six instruction
                 periods, to bring a complete newcomer up to the point
                 where he can code and check out on MIDAC anything more
                 than a rather trivial routine. As might be expected the
                 difficulty centers around problems of scaling,
                 instruction modification and binary representation.
                 \ldots{} To alleviate these problems it was decided
                 that a new computer was needed: one designed to make
                 programming easier. At the cost of some of MIDAC's
                 speed and capacity plus two or three man-months of
                 programming time EASIAC, the EASy Instruction Automatic
                 Computer, was realized as a translation-interpretation
                 program in MIDAC.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  remark =       "Early example of a decimal floating-point machine.",
}

@Article{Hammersley:1956:CMC,
  author =       "J. M. Hammersley",
  title =        "Conditional {Monte Carlo}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "2",
  pages =        "73--76",
  month =        apr,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Glantz:1956:NM,
  author =       "Herbert T. Glantz",
  title =        "A Note on Microprogramming",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "2",
  pages =        "77--84",
  month =        apr,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Householder:1956:BNA,
  author =       "Alston S. Householder",
  title =        "Bibliography on Numerical Analysis",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "2",
  pages =        "85--100",
  month =        apr,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hoover:1956:WTD,
  author =       "William R. Hoover and John J. Wedel and Joseph R.
                 Bruman",
  title =        "Wind Tunnel Data Reduction Using Paper-Tape Storage
                 Media",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "2",
  pages =        "101--109",
  month =        apr,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1956:NNb,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "2",
  pages =        "110--111",
  month =        apr,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1956:BRa,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "2",
  pages =        "112--113",
  month =        apr,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 22:33:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1956:DCNb,
  author =       "Anonymous",
  title =        "{Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "2",
  pages =        "114--128",
  month =        apr,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:51:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lebedev:1956:HSE,
  author =       "S. A. Lebedev",
  title =        "The High-Speed Electronic Calculating Machine of the
                 {Academy of Sciences} of the {U.S.S.R.}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "129--133",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Translated by Curtis D. Benster.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Friend:1956:SEC,
  author =       "Edward Harry Friend",
  title =        "Sorting on Electronic Computer Systems",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "134--168",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Isaac:1956:SAC,
  author =       "E. J. Isaac and R. C. Singleton",
  title =        "Sorting by Address Calculation",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "169--174",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bracken:1956:GSH,
  author =       "Robert H. Bracken and Bruce G. Oldfield",
  title =        "A General System for Handling Alphameric Information
                 on the {IBM 701} Computer",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "175--180",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bauer:1956:ICS,
  author =       "Walter F. Bauer",
  title =        "An Integrated Computation System for the {ERA-1103}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "181--185",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Heizer:1956:TFS,
  author =       "L. E. Heizer and S. J. Abraham",
  title =        "Transfer Function Simulation by Means of Amplifiers
                 and Potentiometers",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "186--198",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Macon:1956:GED,
  author =       "Nathaniel Macon and Margaret Baskervill",
  title =        "On the Generation of Errors in the Digital Evaluation
                 of Continued Fractions",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "199--202",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Downing:1956:SIC,
  author =       "A. C. {Downing, Jr.} and A. S. Householder",
  title =        "Some Inverse Characteristic Value Problems",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "203--207",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lotkin:1956:NMM,
  author =       "Mark Lotkin",
  title =        "A Note on the Midpoint Method of Integration",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "208--211",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 19:00:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Keitel:1956:EMT,
  author =       "Glenn H. Keitel",
  title =        "An Extension of {Milne}'s Three-Point Method",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "212--222",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{vonHoldt:1956:IPC,
  author =       "Richard Elton {von Holdt}",
  title =        "An Iterative Procedure for the Calculation of the
                 Eigenvalues and Eigenvectors of a Real Symmetric
                 Matrix",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "223--238",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:25:33 1998",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1956:BRb,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "239--239",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1956:NNc,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "240--243",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1956:DCNc,
  author =       "Anonymous",
  title =        "{Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "3",
  pages =        "244--263",
  month =        jul,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:51:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1956:EN,
  author =       "Anonymous",
  title =        "{Editor}'s Note",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "265--265",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Melahn:1956:DCV,
  author =       "Wesley S. Melahn",
  title =        "A Description of a Cooperative Venture in the
                 Production of an Automatic Coding System",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "266--271",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Baker:1956:PCS,
  author =       "Charles L. Baker",
  title =        "The {PACT I} Coding System for the {IBM Type 701}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "272--278",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145%2F320843.320845",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mock:1956:LOP,
  author =       "Owen R. Mock",
  title =        "Logical Organization of the {PACT I} Compiler",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "279--287",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145%2F320843.320846",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Miller:1956:PCI,
  author =       "Robert C. {Miller, Jr.} and Bruce G. Oldfield",
  title =        "Producing Computer Instructions for the {PACT I}
                 Compiler",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "288--291",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145%2F320843.320847",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jun 11 18:09:16 1999",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hempstead:1956:PLE,
  author =       "Gus Hempstead and Jules I. Schwartz",
  title =        "{PACT} Loop Expansion",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "292--298",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Derr:1956:SAA,
  author =       "J. I. Derr and R. C. Luke",
  title =        "Semi-Automatic Allocation of Data Storage for {PACT
                 I}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "299--308",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Greenwald:1956:CAU,
  author =       "I. D. Greenwald and H. G. Martin",
  title =        "Conclusions After Using the {PACT I} Advanced Coding
                 Technique",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "309--313",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Householder:1956:CMI,
  author =       "Alston S. Householder",
  title =        "On the Convergence of Matrix Iterations",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "314--324",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fisher:1956:HOD,
  author =       "Michael E. Fisher",
  title =        "Higher Order Differences in the Analogue Solution of
                 Partial Differential Equations",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "325--347",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brown:1956:PPM,
  author =       "J. H. Brown and John W. {Carr III} and Boyd Larrowe
                 and J. R. McReynolds",
  title =        "Prevention of Propagation of Machine Error in Long
                 Problems",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "348--354",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 23:46:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mason:1956:DAC,
  author =       "Robert M. Mason",
  title =        "The Digital Approximation of Contours",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "355--359",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 00:30:38 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

%% Page 364 is notice page
@Article{Jeffrey:1956:AAD,
  author =       "Richard C. Jeffrey",
  title =        "Arithmetical Analysis of Digital Computing Nets",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "360--375",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:03:29 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Cordray:1957:RRP}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1956:BRc,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "376--378",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:04:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1956:NNd,
  author =       "Anonymous",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "379--382",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:04:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1956:DCNd,
  author =       "Anonymous",
  title =        "{Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "3",
  number =       "4",
  pages =        "383--403",
  month =        oct,
  year =         "1956",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 21:51:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Householder:1957:RPA,
  author =       "Alston S. Householder",
  title =        "Retiring Presidential Address",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "1--4",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Carr:1957:IPA,
  author =       "John W. {Carr III}",
  title =        "Inaugural Presidential Address",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "5--7",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:29 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Steel:1957:PI,
  author =       "T. B. {Steel, Jr.}",
  title =        "{Pact IA}",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "8--11",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bauer:1957:SGP,
  author =       "Walter F. Bauer and George P. West",
  title =        "A System for General-Purpose Analog-Digital
                 Computation",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "12--17",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Conte:1957:SIF,
  author =       "S. D. Conte",
  title =        "A Stable Implicit Finite Difference Approximation to a
                 Fourth Order Parabolic Equation",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "18--23",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:37 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Luke:1957:RAE,
  author =       "Yudell L. Luke",
  title =        "Rational Approximations to the Exponential Function",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "24--29",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/320856.320862",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:39 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shenitzer:1957:CAC,
  author =       "A. Shenitzer",
  title =        "{Chebyshev} Approximation of a Continuous Function by
                 a Class of Functions",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "30--35",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Atta:1957:EPE,
  author =       "Susie E. Atta",
  title =        "Effect of Propagated Error on Inverse of {Hilbert}
                 Matrix",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "36--40",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lehmer:1957:SCR,
  author =       "D. H. Lehmer",
  title =        "Sorting Cards with Respect to a Modulus",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "41--46",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:49 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Huffman:1957:DUH,
  author =       "David A. Huffman",
  title =        "The Design and Use of Hazard-Free Switching Networks",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "47--62",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wang:1957:VTT,
  author =       "Hao Wang",
  title =        "A Variant to {Turing}'s Theory of Computing Machines",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "63--92",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1957:BRa,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "93--94",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:55 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alt:1957:NNa,
  author =       "F. L. Alt",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "95--96",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldstein:1957:DCNa,
  author =       "Gordon D. Goldstein",
  title =        "{Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "1",
  pages =        "97--120",
  month =        jan,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:59:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chung:1957:TIC,
  author =       "J. H. Chung and C. C. Gotlieb",
  title =        "Test of an Inventory Control System on {FERUT}",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "121--130",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bracken:1957:ISC,
  author =       "R. H. Bracken and H. E. Tillitt",
  title =        "Information Searching with the 701 Calculator",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "131--136",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harlow:1957:HPI,
  author =       "Francis H. Harlow",
  title =        "Hydrodynamic Problems Involving Large Fluid
                 Distortions",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "137--142",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Leichner:1957:DCC,
  author =       "Gene H. Leichner",
  title =        "Designing Computer Circuits With a Computer",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "143--147",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ward:1957:HMS,
  author =       "James A. Ward",
  title =        "The Down-Hill Method of Solving $f(z) = 0$",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "148--150",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:04 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yates:1957:APR,
  author =       "F. Yates and S. Lipton",
  title =        "An Automatic Programming Routine for the {Elliott}
                 401",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "151--156",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mercer:1957:MP,
  author =       "Robert J. Mercer",
  title =        "Micro-Programming",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "157--171",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Swift:1957:MFM,
  author =       "Charles J. Swift",
  title =        "Machine Features for a More Automatic Monitoring
                 System on Digital Computers",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "172--173",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kister:1957:EC,
  author =       "J. Kister and P. Stein and S. Ulam and W. Walden and
                 M. Wells",
  title =        "Experiments in Chess",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "174--177",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Glantz:1957:RID,
  author =       "Herbert T. Glantz",
  title =        "On the Recognition of Information With a Digital
                 Computer",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "178--188",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:14 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Miehle:1957:BTF,
  author =       "William Miehle",
  title =        "{Burroughs} Truth Function Evaluator",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "189--192",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:15 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Burks:1957:LAPa,
  author =       "Arthur W. Burks and Hao Wang",
  title =        "The Logic of Automata, {Part I}",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "193--218",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:16 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1957:BRb,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "219--220",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:17 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alt:1957:NNb,
  author =       "F. L. Alt",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "221--224",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldstein:1957:DCNb,
  author =       "Gordon D. Goldstein",
  title =        "{Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "2",
  pages =        "225--244",
  month =        apr,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:22 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Oettinger:1957:AIA,
  author =       "Anthony G. Oettinger",
  title =        "Account Identification for Automatic Data Processing",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "245--253",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gorn:1957:SPM,
  author =       "Saul Gorn",
  title =        "Standardized Programming Methods and Universal
                 Coding",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "254--273",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lipton:1957:TPT,
  author =       "S. Lipton",
  title =        "Two Programming Techniques for One-Plus-One Address
                 Computers",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "274--278",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Burks:1957:LAPb,
  author =       "Arthur W. Burks and Hao Wang",
  title =        "The Logic of Automata, {Part II}",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "279--297",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Givens:1957:CVV,
  author =       "Wallace Givens",
  title =        "The Characteristic Value-Vector Problem",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "298--307",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dwyer:1957:MRM,
  author =       "Paul S. Dwyer and Bernard A. Galler",
  title =        "The Method of Reduced Matrices for a General
                 Transportation Problem",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "308--313",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Thompson:1957:BMS,
  author =       "Gene Thomas Thompson",
  title =        "On {Bateman}'s Method for Solving Linear Integral
                 Equations",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "314--328",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:29 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Halton:1957:MIE,
  author =       "J. H. Halton and D. C. Hanscomb",
  title =        "A Method of Increasing the Efficiency of {Monte Carlo}
                 Integration",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "329--340",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldstein:1957:BLA,
  author =       "Allen A. Goldstein and Norman Levine and James B.
                 Hereshoff",
  title =        "On the ``Best'' and ``Least ${Q}$th'' Approximation of
                 an Overdetermined System of Linear Equations",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "341--347",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rowan:1957:PTS,
  author =       "T. C. Rowan",
  title =        "Psychological Tests and Selection of Computer
                 Programmers",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "348--353",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Israel:1957:STT,
  author =       "David R. Israel",
  title =        "Simulation Techniques for the Test and Evaluation of
                 Real-Time Computer Programs",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "354--361",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1957:BRc,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "362--366",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alt:1957:NNc,
  author =       "F. L. Alt",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "367--370",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldstein:1957:DCNc,
  author =       "Gordon D. Goldstein",
  title =        "{Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "3",
  pages =        "371--391",
  month =        jul,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Williams:1957:CFE,
  author =       "Theodore J. Williams and R. Curtis Johnson and Arthur
                 Rose",
  title =        "Computations in the Field of Engineering Chemistry",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "393--419",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Weinberger:1957:SDE,
  author =       "A. Weinberger and H. Loberman",
  title =        "Symbolic Designations for Electrical Connections",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "420--427",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Loberman:1957:FPC,
  author =       "H. Loberman and A. Weinberger",
  title =        "Formal Procedures for Connecting Terminals with a
                 Minimum Total Wire Length",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "428--437",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:55 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Nelson:1957:SCS,
  author =       "R. T. Nelson and J. R. Jackson",
  title =        "{SWAC} Computations for Some $m \times n$ Scheduling
                 Problems",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "438--441",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Boyell:1957:PMI,
  author =       "Roger L. Boyell",
  title =        "Programmed Multiplication on the {IBM 407}",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "442--449",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ercoli:1957:EDO,
  author =       "Paolo Ercoli and Roberto Vacca",
  title =        "Errors Due to Overflow in Arithmetic Operations
                 Particularly as Regards {FINAC} Electronic Computer",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "450--455",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 08 09:28:48 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See letter \cite{Ercoli:1960:LEE}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "floating-point arithmetic; overflow",
}

@Article{Macon:1957:CLP,
  author =       "Nathaniel Macon",
  title =        "Condensation and Look-Up Procedures for Double Entry
                 Tables",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "456--458",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pope:1957:MFR,
  author =       "David A. Pope and C. Tompkins",
  title =        "Maximizing Functions of Rotations---Experiments
                 Concerning Speed of Diagonalization of Symmetric
                 Matrices Using {Jacobi}'s Method",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "459--466",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:59 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "eig; Jacobi's method; nla",
}

@Article{Crandall:1957:ORF,
  author =       "Stephen H. Crandall",
  title =        "Optimum Recurrence Formulas for a Fourth Order
                 Parabolic Partial Differential Equation",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "467--471",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sherman:1957:DTP,
  author =       "Bernard Sherman",
  title =        "Determination of Three Percentiles of the $\omega_n$
                 Distribution Function",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "472--476",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gerberich:1957:CCM,
  author =       "C. L. Gerberich and W. C. Sangren",
  title =        "Codes for the Classical Membrane Problem",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "477--486",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:01 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Minnick:1957:TAP,
  author =       "Robert C. Minnick",
  title =        "{Tshebysheff} Approximations for Power Series",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "487--504",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:02 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{deVogelaere:1959:RPT}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lehmer:1957:CNS,
  author =       "Emma Lehmer and H. S. Vandiver",
  title =        "On the Computation of the Number of Solutions of
                 Certain Trinomial Congruences",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "505--510",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bazilevskii:1957:UED,
  author =       "IU. IA. Bazilevsk\t{\i\i}",
  title =        "The Universal Electronic Digital Machine ({URAL}) for
                 Engineering Research",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "511--519",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:04 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1957:CMC,
  author =       "Anonymous",
  title =        "Conference on Matrix Computations",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "520--523",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:04 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cordray:1957:RRP,
  author =       "R. E. Cordray and Robert M. Mason",
  title =        "Remarks on a Recent Paper: ``{Arithmetical} Analysis
                 of Digital Computing Nets''",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "524--529",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Jeffrey:1956:AAD}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1957:BRd,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "530--533",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alt:1957:NNd,
  author =       "F. L. Alt",
  title =        "News and Notices",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "534--540",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldstein:1957:DCNd,
  author =       "Gordon D. Goldstein",
  title =        "{Digital Computer Newsletter}",
  journal =      j-J-ACM,
  volume =       "4",
  number =       "4",
  pages =        "541--558",
  month =        oct,
  year =         "1957",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brown:1958:LT,
  author =       "A. F. R. Brown",
  title =        "Language Translation",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "1--8",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ascher:1958:SEU,
  author =       "Marcia Ascher and George E. Forsythe",
  title =        "{SWAC} Experiments on the Use of Orthogonal
                 Polynomials for Data Fitting",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "9--21",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:11 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Spitzbart:1958:CFC,
  author =       "A. Spitzbart and D. L. Shell",
  title =        "A {Chebycheff} Fitting Criterion",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "22--31",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Laasonen:1958:TED,
  author =       "Pentti Laasonen",
  title =        "On the Truncation Error of Discrete Approximations to
                 the Solutions of {Dirichlet} Problems in a Domain with
                 Corners",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "32--38",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:30:58 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Carr:1958:EBR,
  author =       "John W. {Carr III}",
  title =        "Error Bounds for the {Runge--Kutta} Single-Step
                 Integration Process",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "39--44",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Franklin:1958:NSC,
  author =       "J. N. Franklin",
  title =        "On the Numerical Solution of Characteristic Equations
                 in Flutter Analysis",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "45--51",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bashkow:1958:CPR,
  author =       "T. R. Bashkow",
  title =        "A ``Curve Plotting'' Routine for the Inverse {Laplace}
                 Transform of Rational Functions",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "52--56",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:31:21 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Scott:1958:APF,
  author =       "A. E. Scott",
  title =        "Automatic Preparation of Flow Chart Listings",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "57--66",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hirschhorn:1958:SCB,
  author =       "Edwin Hirschhorn",
  title =        "Simplification of a Class of {Boolean} Functions",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "67--75",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Baumann:1958:HSR,
  author =       "D. M. Baumann",
  title =        "A High-Scanning-Rate Storage Device for Computer
                 Applications",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "76--88",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Zaroodny:1958:ASP,
  author =       "Serge J. Zaroodny and Tadeusz Leser",
  title =        "{AYDAR}, Special Purpose Analog Machine for Yaw Data
                 Reduction",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "89--99",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Givens:1958:CMC,
  author =       "Wallace Givens",
  title =        "Conference on Matrix Computations",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "100--115",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1958:BRa,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "116--116",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1958:A,
  author =       "Anonymous",
  title =        "Announcement",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "1",
  pages =        "117--117",
  month =        jan,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{deWitte:1958:EII,
  author =       "Leendeert de Witte and Kenneth P. Fournier",
  title =        "Evaluation of Integrals Involving Combinations of
                 {Bessel} Functions and Circular Functions",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "2",
  pages =        "119--126",
  month =        apr,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:46 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Causey:1958:SEB,
  author =       "Robert L. Causey",
  title =        "On Some Error Bounds of {Givens}",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "2",
  pages =        "127--131",
  month =        apr,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dennis:1958:HSC,
  author =       "Jack B. Dennis",
  title =        "A High-Speed Computer Technique for the Transportation
                 Problem",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "2",
  pages =        "132--153",
  month =        apr,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Frank:1958:FZA,
  author =       "Werner L. Frank",
  title =        "Finding Zeros of Arbitrary Functions",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "2",
  pages =        "154--160",
  month =        apr,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ehrlich:1958:NMS,
  author =       "L. W. Ehrlich",
  title =        "A Numerical Method of Solving a Heat Flow Problem with
                 Moving Boundary",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "2",
  pages =        "161--176",
  month =        apr,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Raney:1958:SF,
  author =       "George N. Raney",
  title =        "Sequential Functions",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "2",
  pages =        "177--180",
  month =        apr,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:55 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Copi:1958:REL,
  author =       "Irving M. Copi and Calvin C. Elgot and Jesse B.
                 Wright",
  title =        "Realization of Events by Logical Nets",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "2",
  pages =        "181--196",
  month =        apr,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:59:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "regular expressions",
}

@Article{Hamming:1958:BRb,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "2",
  pages =        "197--203",
  month =        apr,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:03:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Householder:1958:ASM,
  author =       "A. S. Householder",
  title =        "The Approximate Solution of Matrix Problems",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "3",
  pages =        "205--243",
  month =        jul,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:52 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "iter; linear system; nla",
}

@Article{denBroeder:1958:PSD,
  author =       "George G. {den Broeder, Jr.} and Harry J. Smith",
  title =        "A Property of Semi-Definite {Hermitian} Matrices",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "3",
  pages =        "244--245",
  month =        jul,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bauer:1958:MMI,
  author =       "F. L. Bauer",
  title =        "On Modern Matrix Iteration Processes of {Bernoulli}
                 and {Graeffe} Type",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "3",
  pages =        "246--257",
  month =        jul,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:55 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Bernoulli's method; Graeffe's method; nla; nlop;
                 polynomial",
}

@Article{Cole:1958:NNS,
  author =       "R. W. Cole",
  title =        "A Note on Numerical Solution of Certain Linear
                 Boundary Value Problems",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "3",
  pages =        "258--260",
  month =        jul,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bofinger:1958:PPP,
  author =       "Eve Bofinger and V. J. Bofinger",
  title =        "On a Periodic Property of Pseudo-Random Sequences",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "3",
  pages =        "261--265",
  month =        jul,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1958:LSU,
  author =       "Seymour Ginsburg",
  title =        "On the Length of the Smallest Uniform Experiment Which
                 Distinguishes the Terminal States of a Machine",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "3",
  pages =        "266--280",
  month =        jul,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lesh:1958:MSD,
  author =       "F. Lesh",
  title =        "Methods of Simulating a Differential Analyzer on a
                 Digital Computer",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "3",
  pages =        "281--288",
  month =        jul,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goodman:1958:COL,
  author =       "N. R. Goodman and S. Katz",
  title =        "Calculating Open Loop Transfer Functions from Closed
                 Loop Measurements",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "3",
  pages =        "289--297",
  month =        jul,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:06:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1958:BRc,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "3",
  pages =        "298--308",
  month =        jul,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tillitt:1958:CPY,
  author =       "Harley Tillitt",
  title =        "Computer Programming for Young Students",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "309--318",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:14 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blumenthal:1958:DMF,
  author =       "Sherman Blumenthal",
  title =        "A Dual Master File System for a Tape Processing
                 Computer",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "319--327",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:16 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Korolev:1958:CCC,
  author =       "L. N. Korolev",
  title =        "Coding and Code Compression",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "328--330",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:16 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Translated by Morris D. Friedman.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Markov:1958:ICS,
  author =       "A. A. Markov",
  title =        "On the Inversion Complexity of a System of Functions",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "331--334",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:17 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Translated by Morris D. Friedman.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Householder:1958:GER,
  author =       "Alston S. Householder",
  title =        "Generated Error in Rotational Tridiagonalization",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "335--338",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:17 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Householder:1958:UTN,
  author =       "Alston S. Householder",
  title =        "Unitary Triangularization of a Nonsymmetric Matrix",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "339--342",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:18 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Householder transformation; nla; qrd",
}

@Article{Moshman:1958:ASE,
  author =       "Jack Moshman",
  title =        "The Application of Sequential Estimation to Computer
                 Simulation and {Monte Carlo} Procedures",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "343--352",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Certaine:1958:SPR,
  author =       "J. Certaine",
  title =        "On Sequences of Pseudo-Random Numbers of Maximal
                 Length",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "353--356",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fisher:1958:PMA,
  author =       "Michael E. Fisher",
  title =        "Proposed Methods for the Analog Solution of
                 {Fredholm}'s Integral Equation",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "357--369",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Laasonen:1958:SPD,
  author =       "Pentti Laasonen",
  title =        "On the Solution of {Poisson}'s Difference Equation",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "370--382",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:24 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Berman:1958:MTM,
  author =       "Martin F. Berman",
  title =        "A Method for Transposing a Matrix",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "383--384",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Wheeler:1959:LEM}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Young:1958:ASR,
  author =       "Frederick H. Young",
  title =        "Analysis of Shift Register Counters",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "385--388",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:29 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1958:BRd,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "389--396",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1958:AI,
  author =       "Anonymous",
  title =        "Author Index, 1954--1958",
  journal =      j-J-ACM,
  volume =       "5",
  number =       "4",
  pages =        "397--403",
  month =        oct,
  year =         "1958",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{McGee:1959:GKS,
  author =       "W. C. McGee",
  title =        "Generalization: {Key} to Successful Electronic Data
                 Processing",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "1",
  pages =        "1--23",
  month =        jan,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 10:29:47 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Description of early system with Data Dictionaries for
                 tape files.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Zarechnak:1959:TLL,
  author =       "Michael Zarechnak",
  title =        "Three Levels of Linguistic Analysis in Machine
                 Translation",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "1",
  pages =        "24--32",
  month =        jan,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Eldred:1959:TRB,
  author =       "Richard D. Eldred",
  title =        "Test Routines Based on Symbolic Logical Statements",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "1",
  pages =        "33--36",
  month =        jan,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:00:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1959:SPC,
  author =       "R. W. Hamming",
  title =        "Stable Predictor-Corrector Methods for Ordinary
                 Differential Equations",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "1",
  pages =        "37--47",
  month =        jan,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:02 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Douglas:1959:REN,
  author =       "Jim {Douglas, Jr.}",
  title =        "Round-Off Error in the Numerical Solution of the Heat
                 Equation",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "1",
  pages =        "48--58",
  month =        jan,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldstine:1959:JMR,
  author =       "H. H. Goldstine and F. J. Murray and J. von Neumann",
  title =        "The {Jacobi} Method for Real Symmetric Matrices",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "1",
  pages =        "59--96",
  month =        jan,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lance:1959:SAT,
  author =       "G. N. Lance",
  title =        "Solution of Algebraic and Transcendental Equations on
                 an Automatic Digital Computer",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "1",
  pages =        "97--101",
  month =        jan,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Li:1959:ODC,
  author =       "Shu-T'ien Li",
  title =        "Origin and Development of the {Chinese} Abacus",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "1",
  pages =        "102--110",
  month =        jan,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{deVogelaere:1959:RPT,
  author =       "Ren{\'e} de Vogelaere",
  title =        "Remarks on the Paper ``{Tchebysheff} Approximations
                 for Power Series''",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "1",
  pages =        "111--114",
  month =        jan,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Minnick:1957:TAP}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1959:BRa,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "1",
  pages =        "115--120",
  month =        jan,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bauer:1959:APP,
  author =       "Walter F. Bauer and Mario L. Juncosa and Alan J.
                 Perlis",
  title =        "{ACM} Publications Policies and Plans",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "121--122",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shell:1959:SSC,
  author =       "Donald L. Shell",
  title =        "The {\sc Share} 709 System: a Cooperative Effort",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "123--127",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Greenwald:1959:SSP,
  author =       "Irwin D. Greenwald and Maureen Kane",
  title =        "The {\sc Share} 709 System: {Programming} and
                 Modification",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "128--133",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:59:14 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Boehm:1959:SSM,
  author =       "E. M. Boehm and T. B. {Steel, Jr.}",
  title =        "The {\sc Share} 709 System: {Machine} Implementation
                 of Symbolic Programming",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "134--140",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{DiGri:1959:SSI,
  author =       "Vincent J. DiGri and Jane E. King",
  title =        "The {\sc Share} 709 System: {Input-Output}
                 Translation",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "141--144",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/320964.320969",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:15 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mock:1959:SSP,
  author =       "Owen Mock and Charles J. Swift",
  title =        "The {\sc Share} 709 System: {Programmed} Input-Output
                 Buffering",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "145--151",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:16 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bratman:1959:SSS,
  author =       "Harvey Bratman and Ira V. {Boldt, Jr.}",
  title =        "The {\sc Share} 709 System: {Supervisory} Control",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "152--155",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hildebrandt:1959:REI,
  author =       "Paul Hildebrandt and Harold Isbitz",
  title =        "Radix Exchange---An Internal Sorting Method for
                 Digital Computers",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "156--163",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Marimont:1959:NMC,
  author =       "Rosalind B. Marimont",
  title =        "A New Method for Checking the Consistency of
                 Precedence Matrices",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "164--171",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:24 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Joachim:1959:ME,
  author =       "Gertrud S. Joachim",
  title =        "Memory Efficiency",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "172--175",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldstine:1959:PDN,
  author =       "H. H. Goldstine and L. P. Horowitz",
  title =        "A Procedure for the Diagonalization of Normal
                 Matrices",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "176--195",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:26 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "eig; nla; normal matrix",
}

@Article{Milne:1959:SNS,
  author =       "W. E. Milne and R. R. Reynolds",
  title =        "Stability of a Numerical Solution of Differential
                 Equations",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "196--203",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/320964.320976",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In 1926 Milne [1] published a numerical method for the
                 solution of ordinary differential equations. This
                 method turns out to be unstable, as shown by Muhin [2],
                 Hildebrand [3], Liniger [4], and others. Instability
                 was not too serious in the day of desk calculators but
                 is fatal in the modern era of high speed computers. The
                 basic cause of the instability in this particular
                 method is the use of Simpson's rule to perform the
                 final integration. Simpson's rule integrates over two
                 intervals, and under certain conditions can produce an
                 error which alternates in sign from step to step and
                 which increases in magnitude exponentially. It is the
                 purpose of this paper to show that the occasional
                 application of Newton's ``three eighths'' quadrature
                 formula over three intervals can effectively damp out
                 the unwanted oscillation without harm to the desired
                 solution.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ehrlich:1959:MCS,
  author =       "Louis W. Ehrlich",
  title =        "{Monte Carlo} Solutions of Boundary Value Problems
                 Involving the Difference Analogue of
                 $\partial^2u/\partial x^2 + \partial^2u/\partial y^2 +
                 ({K}/y)(\partial u/\partial y) = 0$",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "204--218",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:29 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Morrison:1959:NQM,
  author =       "David Morrison",
  title =        "Numerical Quadrature in Many Dimensions",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "219--222",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Caldwell:1959:NDM,
  author =       "George C. Caldwell",
  title =        "A Note on the Downhill Method",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "223--225",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Milnes:1959:BCS,
  author =       "Harold W. Milnes and Renfrey B. Potts",
  title =        "Boundary Contraction Solution of {Laplace}'s
                 Differential Equation",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "226--235",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cuthill:1959:MNB,
  author =       "Elizabeth H. Cuthill and Richard S. Varga",
  title =        "A Method of Normalized Block Iteration",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "236--244",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Curtis:1959:FCF,
  author =       "H. Allen Curtis",
  title =        "A Functional Canonical Form",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "245--258",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1959:RSS,
  author =       "Seymour Ginsburg",
  title =        "On the Reduction of Superfluous States in a Sequential
                 Machine",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "259--282",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:37 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blum:1959:EDF,
  author =       "Marvin Blum",
  title =        "On Exponential Digital Filters",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "283--304",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:37 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wheeler:1959:LEM,
  author =       "D. J. Wheeler and H. P. F. Swinnerton-Dyer",
  title =        "Letter to the Editor: ``{A} Method for Transposing a
                 Matrix''",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "305--305",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:39 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Berman:1958:MTM}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1959:BRb,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "2",
  pages =        "306--312",
  month =        apr,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Leiner:1959:PNM,
  author =       "A. L. Leiner and W. A. Notz and J. L. Smith and A.
                 Weinberger",
  title =        "{PILOT} --- a New Multiple Computer System",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "313--335",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wilkinson:1959:SRM,
  author =       "J. H. Wilkinson",
  title =        "Stability of the Reduction of a Matrix to Almost
                 Triangular and Triangular Forms by Elementary
                 Similarity Transformations",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "336--359",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:14 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fike:1959:NPC,
  author =       "C. T. Fike",
  title =        "Note on the Practical Computation of Proper Values",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "360--362",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:15 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wilf:1959:SCN,
  author =       "Herbert S. Wilf",
  title =        "A Stability Criterion for Numerical Integration",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "363--365",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:16 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Corbato:1959:GSB,
  author =       "Fernando J. Corbat{\'o} and Jack L. Uretsky",
  title =        "Generation of Spherical {Bessel} Functions in Digital
                 Computers",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "366--375",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:17 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/elefunt.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Muller:1959:CMG,
  author =       "Mervin E. Muller",
  title =        "A Comparison of Methods for Generating Normal Deviates
                 on Digital Computers",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "376--383",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/320986.320992",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:33:26 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  descriptors =  "RVG",
  fjournal =     "Journal of the ACM",
  HDnumber =     "87",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ralston:1959:FQF,
  author =       "A. Ralston",
  title =        "A Family of Quadrature Formulas Which Achieve High
                 Accuracy in Composite Rules",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "384--394",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:17 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Curtis:1959:ADP,
  author =       "Philip C. {Curtis, Jr.} and Werner L. Frank",
  title =        "An Algorithm for the Determination of the Polynomial
                 of Best Minimax Approximation to a Function Defined on
                 a Finite Point Set",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "395--404",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Netherwood:1959:LMT,
  author =       "Douglas B. Netherwood",
  title =        "Logic Matrices and the Truth Function Problem",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "405--414",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ashenhurst:1959:UFP,
  author =       "Robert L. Ashenhurst and Nicholas Metropolis",
  title =        "Unnormalized Floating Point Arithmetic",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "415--428",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/320986.320996",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68.00",
  MRnumber =     "MR0105833 (21 \#4568)",
  MRreviewer =   "H. H. Goldstine",
  bibdate =      "Fri Dec 08 13:06:24 1995",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/m/metropolis-nicholas.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  ZMnumber =     "0121.12102",
  abstract =     "Algorithms for floating point computer arithmetic are
                 described, in which fractional parts are not subject to
                 the usual normalization convention. These algorithms
                 give results in a form which furnishes some indication
                 of their degree of precision. An analysis of one-stage
                 error propagation is developed for each operation; a
                 suggested statistical model for long-run error
                 propagation is also set forth.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blair:1959:CTM,
  author =       "Charles R. Blair",
  title =        "On Computer Transcription of Manual {Morse}",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "429--442",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1959:BRc,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "3",
  pages =        "443--458",
  month =        jul,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:07:22 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Nagler:1959:AS,
  author =       "H. Nagler",
  title =        "Amphisbaenic Sorting",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "4",
  pages =        "459--468",
  month =        oct,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 22:44:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also
                 \cite{Lively:1960:LER,Nagler:1961:LEA,Goetz:1961:LEI}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lieblein:1959:GAV,
  author =       "Julius Lieblein",
  title =        "A General Analysis of Variance Scheme Applicable to a
                 Computer With a Very Large Memory",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "4",
  pages =        "469--475",
  month =        oct,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gauss:1959:CMO,
  author =       "E. J. Gauss",
  title =        "A Comparison of Machine Organizations by Their
                 Performance of the Iteration Solution of Linear
                 Equations",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "4",
  pages =        "476--485",
  month =        oct,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 10:27:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Gauss:1960:CCM}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bellman:1959:ADP,
  author =       "Richard Bellman and John Holland and Robert Kalaba",
  title =        "On an Application of Dynamic Programming to the
                 Synthesis of Logical Systems",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "4",
  pages =        "486--493",
  month =        oct,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sheldon:1959:SNS,
  author =       "J. W. Sheldon",
  title =        "On the Spectral Norms of Several Iterative Processes",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "4",
  pages =        "494--505",
  month =        oct,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hoffman:1959:MSB,
  author =       "Walter Hoffman and Richard Pavley",
  title =        "A Method for the Solution of the ${N}$th Best Path
                 Problem",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "4",
  pages =        "506--514",
  month =        oct,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{DiDonato:1959:NFC,
  author =       "A. R. DiDonato and A. V. Hershey",
  title =        "New Formulas for Computing Incomplete Elliptic
                 Integrals of the First and Second Kind",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "4",
  pages =        "515--526",
  month =        oct,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Green:1959:ETA,
  author =       "Bert F. {Green, Jr.} and J. E. Keith Smith and Laura
                 Klem",
  title =        "Empirical Tests of an Additive Random Number
                 Generator",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "4",
  pages =        "527--537",
  month =        oct,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:10:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Curtis:1959:MCF,
  author =       "H. Allen Curtis",
  title =        "Multifunctional Circuits in Functional Canonical
                 Form",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "4",
  pages =        "538--547",
  month =        oct,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1959:BRd,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "6",
  number =       "4",
  pages =        "548--556",
  month =        oct,
  year =         "1959",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:01 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ferguson:1960:IOB,
  author =       "David E. Ferguson",
  title =        "Input-Output Buffering and {Fortran}",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "1--9",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stein:1960:CAD,
  author =       "Marvin L. Stein and Jack Rose",
  title =        "Changing from Analog to Digital Programming by Digital
                 Techniques",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "10--23",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bellman:1960:SMA,
  author =       "Richard Bellman",
  title =        "Sequential Machines, Ambiguity, and Dynamic
                 Programming",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "24--28",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Juncosa:1960:ICR,
  author =       "M. L. Juncosa and T. W. Mullikin",
  title =        "On the Increase of Convergence Rates of Relaxation
                 Procedures for Elliptic Partial Differential
                 Equations",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "29--36",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chow:1960:BCS,
  author =       "Tse-Sun Chow and Harold Willis Milnes",
  title =        "Boundary Contraction Solution of {Laplace}'s
                 Differential Equation {II}",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "37--45",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Milne:1960:SNS,
  author =       "W. E. Milne and R. R. Reynolds",
  title =        "Stability of a Numerical Solution of Differential
                 Equations---{Part II}",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "46--56",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Galler:1960:GTC,
  author =       "B. A. Galler and D. P. Rozenburg",
  title =        "A Generalization of a Theorem of {Carr} on Error
                 Bounds for {Runge--Kutta} Procedures",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "57--60",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anderson:1960:NMS,
  author =       "W. H. Anderson and R. B. Ball and J. R. Voss",
  title =        "A Numerical Method for Solving Control Differential
                 Equations on Digital Computers",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "61--68",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Weeg:1960:TEG,
  author =       "Gerard P. Weeg",
  title =        "Truncation Error in the {Graeffe} Root-Squaring
                 Method",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "69--71",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Coveyou:1960:SCG,
  author =       "R. R. Coveyou",
  title =        "Serial Correlation in the Generation of Pseudo-Random
                 Numbers",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "72--74",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rotenburg:1960:NPR,
  author =       "A. Rotenburg",
  title =        "A New Pseudo-Random Number Generator",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "75--77",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:32 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  descriptors =  "RNG; linear congruential generator",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldstine:1960:FRP,
  author =       "H. H. Goldstine",
  title =        "Footnote to a Recent Paper",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "78--79",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/bibnet/authors/v/von-neumann-john.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In a recent paper [1] I stated that von Neumann had
                 originated the suggestion for the use of Schur's
                 canonical form for arbitrary matrices. I have since
                 learned that the suggestion actually is due in the
                 first instance to John Greenstadt, who brought it to
                 von Neumann's attention. The history of this is rather
                 interesting and was communicated to me in a letter from
                 John Greenstadt, which I quote below. ``The full story
                 is, that the triangularization occurred to me early in
                 1953, after trying in vain to find a general iterative
                 diagonalization procedure, even where one knew that it
                 was possible to diagonalize (defective degeneracy being
                 the impossible case). It seemed to me that one thing
                 that made for the stability of the Jacobi method was
                 the fact that all the elements in the transformation
                 matrix were less than 1. A natural generalization
                 embodying this requirement was to consider unitary
                 transformations. Then, a quick check of Murnaghan's
                 book showed that one could hope only to triangularize,
                 but that this was always possible. ``I did some hand
                 calculations on this, and lo and behold! it converged
                 in the few cases I tried. I then programmed it for the
                 CPC and tried many other cases. For several months
                 thereafter, Kogbetliantz, John Sheldon, and I tried to
                 prove convergence, when the algorithm involved the
                 sequential annihilation of off-diagonal elements. We
                 (particularly Sheldon) tried many approaches, but with
                 no hint of success. Finally, in the latter part of
                 1953, we decided to ask von Neumann, who was then a
                 consultant for IBM, when he was in New York at our
                 offices. ``I had prepared a writeup describing the
                 procedure, but von Neumann (rightly) didn't want to
                 bother reading it, so I explained it to him in about
                 two minutes. He spent the next 15 minutes thinking up
                 all the approaches we had thought of in three or four
                 months, plus a few ones --- all, however, without
                 promise.'' At this point he decided that it was a
                 nontrivial problem, and perhaps not worth it anyway,
                 and immediately suggested minimizing the sum of squares
                 of subdiagonal elements, which is, of course, the truly
                 natural generalization of the Jacobi method. For the
                 next 15 minutes he investigated the case when it would
                 be impossible to make an improvement for a particular
                 pivotal element and found that these cases were of
                 measure zero. ``I recoded my procedure for the 701 and
                 tried many other matrices of various sizes. I myself
                 never had a failure, but it has since been demonstrated
                 that the method will indeed fail for a class of
                 matrices. Hence, a proof is clearly impossible.
                 However, I think a statistical proof is possible, along
                 lines suggested by Kogbetliantz, which, however, I have
                 not been able to find. I do not think von Neumann's
                 variation of the method would fail. (However, it is
                 more complicated and time consuming.)''",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1960:BR,
  author =       "R. W. Hamming",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "1",
  pages =        "80--86",
  month =        jan,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gelernter:1960:FCL,
  author =       "Herbert Gelernter and J. R. Hansen and C. L.
                 Gerberich",
  title =        "A {Fortran}-Compiled List-Processing Language",
  journal =      j-j-ACM,
  volume =       "7",
  number =       "2",
  pages =        "87--101",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:52 1994",
  bibsource =    "Ai/lisp.bib; Compiler/garbage.collection.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Prawitz:1960:MPP,
  author =       "Dag Prawitz and H{\aa}kan Prawitz and Neri Voghera",
  title =        "A Mechanical Proof Procedure and its Realization in an
                 Electronic Computer",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "102--128",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Salton:1960:NMP,
  author =       "Gerard Salton",
  title =        "A New Method for the Payment of Bills and the Transfer
                 of Credit",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "140--149",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Maehly:1960:MFR,
  author =       "Hans J. Maehly",
  title =        "Methods for Fitting Rational Approximations, {Part I}:
                 Telescoping Procedures for Continued Fractions",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "150--162",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Esch:1960:NSC,
  author =       "Robin E. Esch",
  title =        "A Necessary and Sufficient Condition for Stability of
                 Partial Difference Equation Problems",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "163--175",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:04:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alonso:1960:SMT,
  author =       "R. Alonso",
  title =        "A Starting Method for the Three-Point {Adams}
                 Predictor-Corrector Method",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "176--180",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Flinn:1960:MFM,
  author =       "E. A. Flinn",
  title =        "A Modification of {Filon}'s Method of Numerical
                 Integration",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "181--184",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:02 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Morrison:1960:RUT,
  author =       "David D. Morrison",
  title =        "Remarks on the Unitary Triangularization of a
                 Nonsymmetric Matrix",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "185--186",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:04 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lively:1960:LER,
  author =       "J. A. Lively",
  title =        "Letter to the Editor: {Remarks} on ``{Amphisbaenic}
                 Sorting''",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "187--187",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See
                 \cite{Nagler:1959:AS,Nagler:1961:LEA,Goetz:1961:LEI}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gauss:1960:CCM,
  author =       "E. J. Gauss",
  title =        "Corrigendum: ``{A} Comparison of Machine Organizations
                 by Their Performance of the Iteration Solution of
                 Linear Equations''",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "188--188",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Gauss:1959:CMO}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1960:BR,
  author =       "Anonymous",
  title =        "Book Reviews",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "189--200",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "The {\em Book Reviews\/} contributions move to {\em
                 ACM Computing Reviews\/} after this issue.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Davis:1960:CPQ,
  author =       "Martin Davis and Hilary Putman",
  title =        "A Computing Procedure for Quantification Theory",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "3",
  pages =        "201--215",
  month =        jul,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:02 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/constr.logic.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Logic",
}

@Article{Maron:1960:RPI,
  author =       "M. E. Maron and J. L. Kuhns",
  title =        "On Relevance, Probabilistic Indexing and Information
                 Retrieval",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "3",
  pages =        "216--244",
  month =        jul,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:19 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/bibdb.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Freiberger:1960:CFF,
  author =       "Walter F. Freiberger and Richard H. Jones",
  title =        "Computation of the Frequency Function of a Quadratic
                 Form in Random Normal Variables",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "3",
  pages =        "245--250",
  month =        jul,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gill:1960:ANN,
  author =       "Arthur Gill",
  title =        "Analysis of Nets by Numerical Methods",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "3",
  pages =        "251--254",
  month =        jul,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harary:1960:CPM,
  author =       "Frank Harary",
  title =        "On the Consistency of Precedence Matrices",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "3",
  pages =        "255--259",
  month =        jul,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ortega:1960:SST,
  author =       "J. M. Ortega",
  title =        "On {Sturm} Sequences for Tridiagonal Matrices",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "3",
  pages =        "260--263",
  month =        jul,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Conte:1960:ADM,
  author =       "Samuel D. Conte and Ralph T. Dames",
  title =        "On an Alternating Direction Method for Solving the
                 Plate Problem with Mixed Boundary Conditions",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "3",
  pages =        "264--273",
  month =        jul,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Frank:1960:SLS,
  author =       "Werner L. Frank",
  title =        "Solution of Linear Systems by {Richardson}'s Method",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "3",
  pages =        "274--286",
  month =        jul,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:37 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fitzpatrick:1960:SBR,
  author =       "G. B. Fitzpatrick",
  title =        "Synthesis of Binary Ring Counters of Given Periods",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "3",
  pages =        "287--297",
  month =        jul,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Prather:1960:CAD,
  author =       "Ronald Prather",
  title =        "Computational Aids for Determining the Minimal Form of
                 a Truth Function",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "4",
  pages =        "299--310",
  month =        oct,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:02 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1960:CPP,
  author =       "Seymour Ginsburg",
  title =        "Connective Properties Preserved in Minimal State
                 Machines",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "4",
  pages =        "311--325",
  month =        oct,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Miller:1960:IPF,
  author =       "C. E. Miller and A. W. Tucker and R. A. Zemlin",
  title =        "Integer Programming Formulation of Traveling Salesman
                 Problems",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "4",
  pages =        "326--329",
  month =        oct,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kleinfeld:1960:TEV,
  author =       "Erwin Kleinfeld",
  title =        "Techniques for Enumerating {Veblen-Wedderburn}
                 Systems",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "4",
  pages =        "330--337",
  month =        oct,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Osborne:1960:PCM,
  author =       "E. E. Osborne",
  title =        "On Pre-Conditioning of Matrices",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "4",
  pages =        "338--345",
  month =        oct,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:09 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "nla; preconditioning; scaling",
}

@Article{Bareiss:1960:RPM,
  author =       "Erwin H. Bareiss",
  title =        "Resultant Procedure and the Mechanization of the
                 {Graeffe} Process",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "4",
  pages =        "346--386",
  month =        oct,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gordon:1960:NMC,
  author =       "N. L. Gordon and A. H. Flasterstein",
  title =        "A Note on a Method of Computing the Gamma Function",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "4",
  pages =        "387--388",
  month =        oct,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Flores:1960:CTA,
  author =       "Ivan Flores",
  title =        "Computer Time for Address Calculation Sorting",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "4",
  pages =        "389--409",
  month =        oct,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:12 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wadey:1960:FPA,
  author =       "W. G. Wadey",
  title =        "Floating-Point Arithmetics",
  journal =      j-J-ACM,
  volume =       "7",
  number =       "2",
  pages =        "129--139",
  month =        apr,
  year =         "1960",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "65.00 (68.00)",
  MRnumber =     "22\#6090",
  bibdate =      "Fri Dec 08 14:44:46 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Three types of floating-point arithmetics with error
                 control are discussed and compared with conventional
                 floating-point arithmetic. General multiplication and
                 division shift criteria are derived (for any base) for
                 Metropolis-style arithmetics. The limitations and most
                 suitable range of application for each arithmetic are
                 discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  reviewer =     "C. B. Haselgrove",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Keller:1961:FAP,
  author =       "Herbert B. Keller",
  title =        "Finite Automata, Pattern Recognition and Perceptrons",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "1",
  pages =        "1--20",
  month =        jan,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 23:15:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gautschi:1961:RCC,
  author =       "Walter Gautschi",
  title =        "Recursive Computation of Certain Integrals",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "1",
  pages =        "21--40",
  month =        jan,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 23:16:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Flores:1961:AIC,
  author =       "Ivan Flores",
  title =        "Analysis of Internal Computer Sorting",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "1",
  pages =        "41--80",
  month =        jan,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 23:16:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Goetz:1961:LEI}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1961:STA,
  author =       "Seymour Ginsburg",
  title =        "Sets of Tapes Accepted by Different Types of
                 Automata",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "1",
  pages =        "81--86",
  month =        jan,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:46 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fraenkel:1961:UIC,
  author =       "Aviezri S. Fraenkel",
  title =        "The User of Index Calculus and {Mersenne} Primes for
                 the Design of a High-Speed Digital Multiplier",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "1",
  pages =        "87--96",
  month =        jan,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Leiner:1961:SGP,
  author =       "A. L. Leiner and W. W. Youden",
  title =        "A System for Generating ``Pronounceable'' Names Using
                 a Computer",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "1",
  pages =        "97--103",
  month =        jan,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:01:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Denman:1961:CGO,
  author =       "Harry H. Denman",
  title =        "Computer Generation of Optimized Subroutines",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "1",
  pages =        "104--116",
  month =        jan,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 23:02:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Gardner:1961:LEO}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Nagler:1961:LEA,
  author =       "H. Nagler",
  title =        "Letter to the Editor: an Answer to {Mr. J. A.
                 Lively}'s Remarks on the Paper ``{Amphisbaenic}
                 Sorting''",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "1",
  pages =        "117--117",
  month =        jan,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:37:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See
                 \cite{Lively:1960:LER,Nagler:1959:AS,Goetz:1961:LEI}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Knuth:1961:MDL,
  author =       "Donald E. Knuth",
  title =        "Minimizing Drum Latency Time",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "119--150",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 00:23:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lehmer:1961:MMS,
  author =       "D. H. Lehmer",
  title =        "A Machine Method for Solving Polynomial Equations",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "151--162",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:26 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Lehmer's method; nlop; polynomial",
}

@Article{Greenberger:1961:NNP,
  author =       "Martin Greenberger",
  title =        "Notes on a New Pseudo-Random Number Generator",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "163--167",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:28 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The IBM RNG!",
  descriptors =  "RNG; linear congruential generator",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lombardi:1961:SHF,
  author =       "Lionello Lombardi",
  title =        "System Handling of Functional Operators",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "168--185",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:29 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Calingaert:1961:TDP,
  author =       "Peter Calingaert",
  title =        "Two-Dimensional Parity Checking",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "186--200",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Walsh:1961:CFM,
  author =       "John E. Walsh",
  title =        "Computer-Feasible Method for Handling Incomplete Data
                 in Regression Analysis",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "201--211",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hooke:1961:DSS,
  author =       "Robert Hooke and T. A. Jeeves",
  title =        "``Direct Search'' Solution of Numerical and
                 Statistical Problems",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "212--229",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Totschek:1961:IRT,
  author =       "R. Totschek and R. C. Wood",
  title =        "An Investigation of Real-Time Solution of the
                 Transportation Problem",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "230--239",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gutenmakher:1961:PUI,
  author =       "L. I. Gutenmakher and G. E. Vleduts",
  title =        "The Prospects for the Utilization of
                 Informational-Logical Machines in Chemistry ({USSR})",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "240--251",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brigham:1961:GSP,
  author =       "R. C. Brigham and P. D. Burgess",
  title =        "Generalized Simulation of Post Office Systems",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "252--259",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gurk:1961:DSI,
  author =       "Herbert M. Gurk and Jack Minker",
  title =        "The Design and Simulation of an Information Processing
                 System",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "260--270",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stiles:1961:AFI,
  author =       "H. Edmund Stiles",
  title =        "The Association Factor in Information Retrieval",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "2",
  pages =        "271--279",
  month =        apr,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:37 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/bibdb.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wilkinson:1961:EAD,
  author =       "J. H. Wilkinson",
  title =        "Error Analysis of Direct Methods of Matrix Inversion",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "281--330",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:51 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "lud; nla; rounding error",
}

@Article{Johansen:1961:MGM,
  author =       "Donald E. Johansen",
  title =        "A Modified {Givens} Method for the Eigenvalue
                 Evaluation of Large Matrices",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "331--335",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chow:1961:NSN,
  author =       "Tse-Sun Chow and Harold Willis Milnes",
  title =        "Numerical Solution of the {Neumann} and Mixed Boundary
                 Value Problems by Boundary Contraction",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "336--358",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Parter:1961:SCR,
  author =       "Seymour V. Parter",
  title =        "Some Computational Results on ``Two-line'' Iterative
                 Methods for the Biharmonic Difference Equation",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "359--365",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Klopfenstein:1961:ZNF,
  author =       "R. W. Klopfenstein",
  title =        "Zeros of Nonlinear Functions",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "366--373",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:55 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Campbell:1961:NCT,
  author =       "Edwin S. Campbell and R. Buehler and J. O.
                 Hirschfelder and D. Hughes",
  title =        "Numerical Construction of {Taylor} Series
                 Approximations for a Set of Simultaneous First Order
                 Differential Equations",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "374--383",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lee:1961:CAM,
  author =       "C. Y. Lee",
  title =        "Categorizing Automata by ${W}$-Machine Programs",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "384--399",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:42:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1961:CSI,
  author =       "Seymour Ginsburg",
  title =        "Compatibility of States in Input-Independent
                 Machines",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "400--403",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Maron:1961:AIE,
  author =       "M. E. Maron",
  title =        "Automatic Indexing: an Experiment Inquiry",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "404--417",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gauss:1961:LLW,
  author =       "E. J. Gauss",
  title =        "Locating the Largest Word in a File Using a Modified
                 Memory",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "418--425",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:08:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Heller:1961:SAM,
  author =       "J. Heller",
  title =        "Sequencing Aspects of Multiprogramming",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "426--439",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ormsby:1961:DNF,
  author =       "Joseph F. A. Ormsby",
  title =        "Design of Numerical Filters with Applications to
                 Missile Data Processing",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "3",
  pages =        "440--466",
  month =        jul,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:01 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arbib:1961:TMF,
  author =       "Michael Arbib",
  title =        "{Turing} Machines, Finite Automata and Neural Nets",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "467--475",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Watanabe:1961:SSS,
  author =       "Shigere Watanabe",
  title =        "$5$-Symbol $8$-State and $5$-Symbol $6$-State
                 Universal {Turing} Machines",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "476--483",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 01 16:57:47 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Curtis:1961:GTC,
  author =       "H. Allen Curtis",
  title =        "A Generalized Tree Circuit",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "484--496",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

%% Page 252 is title page
@Article{Chu:1961:SMS,
  author =       "J. T. Chu",
  title =        "Some Methods for Simplifying Switching Circuits Using
                 ``Don't Care'' Conditions",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "497--512",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Schwartz:1961:ASP,
  author =       "Eugene S. Schwartz",
  title =        "An Automatic Sequencing Procedure With Application to
                 Parallel Programming",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "513--537",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bourne:1961:SMS,
  author =       "Charles P. Bourne and Donald F. Ford",
  title =        "A Study of Methods for Systematically Abbreviating
                 {English} Words and Names",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "538--552",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Doyle:1961:SRM,
  author =       "Lauren B. Doyle",
  title =        "Semantic Road Maps for Literature Searchers",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "553--578",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

%% Page 570 is notice page
@Article{Floyd:1961:DLS,
  author =       "Robert W. Floyd",
  title =        "A Descriptive Language for Symbol Manipulation",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "579--584",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ott:1961:DSM,
  author =       "Gene Ott and Neil H. Feinstein",
  title =        "Design of Sequential Machines from Their Regular
                 Expressions",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "585--600",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hibbard:1961:LUB,
  author =       "Thomas N. Hibbard",
  title =        "Least Upper Bounds on Minimal Terminal State
                 Experiments for Two Classes of Sequential Machines",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "601--612",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Spielberg:1961:RPS,
  author =       "Kurt Spielberg",
  title =        "Representation of Power Series in Terms of
                 Polynomials, Rational Approximations and Continued
                 Fractions",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "613--627",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:22 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Osborne:1961:LSS,
  author =       "E. E. Osborne",
  title =        "On Least Squares Solutions of Linear Equations",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "628--636",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:22 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Cited in {\AA ke Bj\"orck's} bibliography on least
                 squares, which is available by anonymous ftp from {\tt
                 math.liu.se} in {\tt pub/references}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "least squares; linear system; nla",
}

@Article{Froese:1961:ERK,
  author =       "Charlotte Froese",
  title =        "An Evaluation of {Runge--Kutta} Type Methods for
                 Higher Order Differential Equations",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "637--644",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blum:1961:ABB,
  author =       "E. K. Blum and P. C. {Curtis, Jr.}",
  title =        "Asymptotic Behavior of the Best Polynomial
                 Approximation",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "645--647",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gardner:1961:LEO,
  author =       "R. J. Gardner and T. H. Gosling",
  title =        "Letter to the Editor: ``{Optimized} Subroutines''",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "648--649",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Denman:1961:CGO}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goetz:1961:LEI,
  author =       "Martin Goetz",
  title =        "Letter to the Editor: ``{Internal} Sorting and
                 External Merging''",
  journal =      j-J-ACM,
  volume =       "8",
  number =       "4",
  pages =        "649--650",
  month =        oct,
  year =         "1961",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See
                 \cite{Nagler:1959:AS,Lively:1960:LER,Flores:1961:AIC,Nagler:1961:LEA}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brooker:1962:GTP,
  author =       "R. A. Brooker and D. Morris",
  title =        "A General Translation Program for Phrase Structure
                 Languages",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "1--10",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Warshall:1962:TBM,
  author =       "Stephen Warshall",
  title =        "A Theorem on {Boolean} Matrices",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "11--12",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/logic.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hibbard:1962:SCP,
  author =       "Thomas N. Hibbard",
  title =        "Some Combinatorial Properties of Certain Trees With
                 Applications to Sorting and Searching",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "13--28",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:39:52 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Description of a binary tree algorithm.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Williams:1962:APS,
  author =       "Leland H. Williams",
  title =        "Algebra of Polynomials in Several Variables for a
                 Digital Computer",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "29--40",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:31:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Estrin:1962:OFP,
  author =       "G. Estrin and C. R. Viswanathan",
  title =        "Organization of a ``Fixed-Plus-Variable'' Structure
                 Computer for Computation of Eigenvalues and
                 Eigenvectors of Real Symmetric Matrices",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "41--60",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:31:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Estrin:1962:CAO}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bellman:1962:DPT,
  author =       "Richard Bellman",
  title =        "Dynamic Programming Treatment of the Travelling
                 Salesman Problem",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "61--63",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:01 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Milne:1962:FOM,
  author =       "W. E. Milne and R. R. Reynolds",
  title =        "Fifth-Order Methods for the Numerical Solution of
                 Ordinary Differential Equations",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "64--70",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:17 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{vonHoldt:1962:ITD,
  author =       "Richard E. {von Holdt}",
  title =        "Inversion of Triple-Diagonal Compound Matrices",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "71--83",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:25:38 1998",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

%% Page 150 is notice page
@Article{Phillips:1962:TNS,
  author =       "David L. Phillips",
  title =        "A Technique for the Numerical Solution of Certain
                 Integral Equations of the First Kind",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "84--97",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Morrison:1962:OMS,
  author =       "D. Morrison",
  title =        "Optimal Mesh Size in the Numerical Integration of an
                 Ordinary Differential Equation",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "98--103",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:22 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Crane:1962:SGC,
  author =       "Roger L. Crane and Robert J. Lambert",
  title =        "Stability of a Generalized Corrector Formula",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "104--117",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:24 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hansen:1962:QJM,
  author =       "Eldon R. Hansen",
  title =        "On Quasicyclic {Jacobi} Methods",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "118--135",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:24 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "nla",
}

@Article{Lombardi:1962:MSN,
  author =       "Lionello Lombardi",
  title =        "Mathematical Structure of Nonarithmetic Data
                 Processing Procedures",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "1",
  pages =        "136--159",
  month =        jan,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:02:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bottenbruch:1962:SUA,
  author =       "H. Bottenbruch",
  title =        "Structure and Use of {ALGOL 60}",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "2",
  pages =        "161--221",
  month =        apr,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arden:1962:ATB,
  author =       "Bruce W. Arden and Bernard A. Galler and Robert M.
                 Graham",
  title =        "An Algorithm for Translating {Boolean} Expressions",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "2",
  pages =        "222--239",
  month =        apr,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alt:1962:DPR,
  author =       "Franz L. Alt",
  title =        "Digital Pattern Recognition by Moments",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "2",
  pages =        "240--258",
  month =        apr,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:54 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Doyle:1962:OUS,
  author =       "W. Doyle",
  title =        "Operations Useful for Similarity-Invariant Pattern
                 Recognition",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "2",
  pages =        "259--267",
  month =        apr,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Smith:1962:MAN,
  author =       "D. R. Smith and C. H. Davidson",
  title =        "Maintained Activity in Neural Nets",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "2",
  pages =        "268--279",
  month =        apr,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kramer:1962:NSC,
  author =       "Henry P. Kramer",
  title =        "A Note on the Self-Consistency Definitions of
                 Generalization and Inductive Inference",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "2",
  pages =        "280--281",
  month =        apr,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:57 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/colt.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bose:1962:SP,
  author =       "R. C. Bose and R. J. Nelson",
  title =        "A Sorting Problem",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "2",
  pages =        "282--296",
  month =        apr,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:05:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Holland:1962:OLT,
  author =       "John H. Holland",
  title =        "Outline for a Logical Theory of Adaptive Systems",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "3",
  pages =        "297--314",
  month =        jul,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:23 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/alife.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Early work on genetic algorithms. Reprinted in
                 \cite{Burks:1970:ECA}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Friedman:1962:DPC,
  author =       "Joyce Friedman",
  title =        "A Decision Procedure for Computations of Finite
                 Automata",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "3",
  pages =        "315--323",
  month =        jul,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Curtis:1962:MRV,
  author =       "H. Allen Curtis",
  title =        "Multiple Reduction of Variable Dependency of
                 Sequential Machines",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "3",
  pages =        "324--344",
  month =        jul,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Weeg:1962:SAO,
  author =       "G. P. Weeg",
  title =        "The Structure of an Automaton and Its
                 Operation-Preserving Transformation Group",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "3",
  pages =        "345--349",
  month =        jul,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1962:TFL,
  author =       "Seymour Ginsburg and H. Gordon Rice",
  title =        "Two Families of Languages Related to {ALGOL}",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "3",
  pages =        "350--371",
  month =        jul,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sobel:1962:OSN,
  author =       "Sheldon Sobel",
  title =        "Oscillating Sort --- a New Sort Merging Technique",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "3",
  pages =        "372--374",
  month =        jul,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bailey:1962:SFS,
  author =       "John S. Bailey and George Epstein",
  title =        "Single Function Shifting Counters",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "3",
  pages =        "375--378",
  month =        jul,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

%% Page 422 is blank
@Article{Peterka:1962:MOS,
  author =       "James J. Peterka",
  title =        "A Method for Obtaining Specific Values of
                 Compiling-Parameter Functions",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "3",
  pages =        "379--386",
  month =        jul,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Holdiman:1962:MTR,
  author =       "Thomas A. Holdiman",
  title =        "Management Techniques for Real Time Computer
                 Programming",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "3",
  pages =        "387--404",
  month =        jul,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Weintraub:1962:CBP,
  author =       "Sol Weintraub",
  title =        "Cumulative Binomial Probabilities",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "3",
  pages =        "405--407",
  month =        jul,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:09:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dulmage:1962:MAH,
  author =       "A. L. Dulmage and N. S. Mendelsohn",
  title =        "Matrices Associated with the {Hitchcock} Problem",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "409--418",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kurtzberg:1962:AMA,
  author =       "Jerome M. Kurtzberg",
  title =        "On Approximation Methods for the Assignment Problem",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "419--439",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jones:1962:ANA,
  author =       "Terence G. Jones",
  title =        "An Algorithm for the Numerical Application of a Linear
                 Operator",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "440--449",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Douglas:1962:ADM,
  author =       "Jim {Douglas, Jr.} and James E. Gunn",
  title =        "Alternating Direction Methods for Parabolic Systems in
                 $m$ Space Variables",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "450--456",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chase:1962:SPP,
  author =       "P. E. Chase",
  title =        "Stability Properties of Predictor-Corrector Methods
                 for Ordinary Differential Equations",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "457--468",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fleck:1962:IGA,
  author =       "A. C. Fleck",
  title =        "Isomorphism Groups of Automata",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "469--476",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cantor:1962:APB,
  author =       "David G. Cantor",
  title =        "On the Ambiguity Problem of {Backus} Systems",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "477--479",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Grau:1962:TOS,
  author =       "A. A. Grau",
  title =        "A Translator-Oriented Symbolic Programming Language",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "480--487",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Falkoff:1962:APS,
  author =       "A. D. Falkoff",
  title =        "Algorithms for Parallel-Search Memories",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "488--511",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:36 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Baker:1962:IRB,
  author =       "Frank B. Baker",
  title =        "Information Retrieval Based Upon Latent Class
                 Analysis",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "512--521",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:37 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Estrin:1962:CAO,
  author =       "G. Estrin and C. R. Viswanathan",
  title =        "Correction and Addendum: ``{Organization} of a
                 `Fixed-Plus-Variable' Structure Computer for
                 Computation of Eigenvalues and Eigenvectors of Real
                 Symmetric Matrices''",
  journal =      j-J-ACM,
  volume =       "9",
  number =       "4",
  pages =        "522--522",
  month =        oct,
  year =         "1962",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:11:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Estrin:1962:OFP}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hartmanis:1963:FRS,
  author =       "J. Hartmanis",
  title =        "Further Results on the Structure of Sequential
                 Machines",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "78--88",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Gluss:1963:MOS,
  author =       "Brian Gluss",
  title =        "A Method for Obtaining Suboptimal Group-Testing
                 Policies Using Dynamic Programming and Information
                 Theory",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "89--96",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Twomey:1963:NSF,
  author =       "S. Twomey",
  title =        "On the Numerical Solution of {Fredholm} Integral
                 Equations of the First Kind by the Inversion of the
                 Linear System Produced by Quadrature",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "97--101",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Hansen:1963:DM,
  author =       "Eldon R. Hansen",
  title =        "On the {Danilewski} Method",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "102--109",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Gill:1963:WDP,
  author =       "Arthur Gill",
  title =        "On a Weight Distribution Problem, with Application to
                 the Design of Stochastic Generators",
  journal =      j-J-ACM,
  volume =       "10",
  number =       "1",
  pages =        "110--122",
  month =        jan,
  year =         "1963",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321150.321159",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Corbato:1963:CJM,
  author =       "F. J. Corbat{\'{o}}",
  title =        "On the Coding of {Jacobi}'s Method for Computing
                 Eigenvalues and Eigenvectors of Symmetric Matrices",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "123--125",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:42:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Allard:1963:MCR,
  author =       "J. L. Allard and A. R. Dobell and T. E. Hull",
  title =        "Mixed Congruential Random Number Generators for
                 Decimal Machines",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "131--141",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Hibbard:1963:SSA,
  author =       "Thomas N. Hibbard",
  title =        "A Simple Sorting Algorithm",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "142--150",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Borko:1963:ADC,
  author =       "Harold Borko and Myrna Bernick",
  title =        "Automatic Document Classification",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "151--162",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:45:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Borko:1964:ADC}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Robinson:1963:TPC,
  author =       "J. A. Robinson",
  title =        "Theorem-Proving on the Computer",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "163--174",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Ginsburg:1963:OWP,
  author =       "Seymour Ginsburg and G. F. Rose",
  title =        "Operations Which Preserve Definability in Languages",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "175--195",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Gorn:1963:DGA,
  author =       "Saul Gorn",
  title =        "Detection of Generative Ambiguities in Context-Free
                 Mechanical Languages",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "196--208",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Liu:1963:SVA,
  author =       "C. N. Liu",
  title =        "A State Variable Assignment Method for Asynchronous
                 Sequential Switching Circuits",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "209--216",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 00:43:09 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/async.circuits.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{House:1963:ECP,
  author =       "R. W. House and T. Rado",
  title =        "Erratum: ``{On} a Computer Program for Obtaining
                 Irreducible Representations for Two-Level Multiple
                 Input-Output Logical Systems''",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "256--256",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 22:00:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{House:1963:CPO}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Maehly:1963:MFR,
  author =       "Hans J. Maehly",
  title =        "Methods for Fitting Rational Approximations, Parts
                 {II} and {III}",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "257--278",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Ralston:1963:ERF,
  author =       "Anthony Ralston",
  title =        "On Economization of Rational Functions",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "279--282",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:43:11 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Valentine:1963:AMP,
  author =       "Charles W. Valentine and C. Peter {Van Dine}",
  title =        "An Algorithm for Mimimax Polynomial Curve-Fitting of
                 Discrete Data",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "283--290",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:43:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Hull:1963:EPC,
  author =       "T. E. Hull and A. L. Creemer",
  title =        "Efficiency of Predictor-Corrector Procedures",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "291--301",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Hartley:1963:MCC,
  author =       "H. O. Hartley and D. L. Harris",
  title =        "{Monte Carlo} Computations in Normal Correlation
                 Problems",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "302--306",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Floyd:1963:SAO,
  author =       "Robert W. Floyd",
  title =        "Syntactic Analysis and Operator Precedence",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "316--333",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Klein:1963:CAG,
  author =       "Sheldon Klein and Robert F. Simmons",
  title =        "A Computational Approach to Grammatical Coding of
                 {English} Words",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "334--347",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Friedman:1963:CPS,
  author =       "Joyce Friedman",
  title =        "A Computer Program for a Solvable Case of the Decision
                 Problem",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "348--356",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Berlekamp:1963:PDD,
  author =       "Elwyn R. Berlekamp",
  title =        "Program for Double-Dummy Bridge Problems --- a New
                 Strategy for Mechanical Game Playing",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "357--364",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Farr:1963:LPS,
  author =       "Edwin H. Farr",
  title =        "Lattice Properties of Sequential Machines",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "365--385",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Curtis:1963:UDT,
  author =       "H. Allen Curtis",
  title =        "Use of Decomposition Theory in the Solution of the
                 State Assignment Problem of Sequential Machines",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "386--411",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 00:47:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Lee-Whiting:1963:EFC,
  author =       "G. E. Lee-Whiting",
  title =        "Erratum: ``{Formulas} for Computing Incomplete
                 Elliptic Integrals of the First and Second Kinds''",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "412--412",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:59:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Lee-Whiting:1963:FCI}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Salton:1963:ADR,
  author =       "Gerard Salton",
  title =        "Associative Document Retrieval Techniques Using
                 Bibliographic Information",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "440--457",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Mattson:1963:FWC,
  author =       "R. L. Mattson and O. Firschein",
  title =        "Feature Word Construction for Use with Pattern
                 Recognition Algorithms: an Experimental Study",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "458--477",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:43:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Ginsburg:1963:QCF,
  author =       "Seymour Ginsburg and Edwin H. Spanier",
  title =        "Quotients of Context-Free Languages",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "487--492",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Simon:1963:EHC,
  author =       "Herbert A. Simon",
  title =        "Experiments with a Heuristic Compiler",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "493--506",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Slagle:1963:HPS,
  author =       "James R. Slagle",
  title =        "A Heuristic Program that Solves Symbolic Integration
                 Problems in Freshman Calculus",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "507--520",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Oehmke:1963:SAI,
  author =       "Robert H. Oehmke",
  title =        "On the Structures of an Automaton and Its Input
                 Semigroup",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "521--525",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Rabin:1963:WHT,
  author =       "Michael O. Rabin and Hao Wang",
  title =        "Words in the History of a {Turing} Machine with a
                 Fixed Input",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "526--527",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Ritchie:1963:FAS,
  author =       "Robert W. Ritchie",
  title =        "Finite Automata and the Set of Squares",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "528--531",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Ben-Israel:1963:EMC,
  author =       "A. Ben-Israel and S. J. Wersan",
  title =        "An Elimination Method for Computing the Generalized
                 Inverse of an Arbitrary Complex Matrix",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "532--537",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Grau:1963:RNR,
  author =       "A. A. Grau",
  title =        "On the Reduction of Number Range in the Use of the
                 {Graeffe} Process",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "538--544",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Rich:1963:MFA,
  author =       "Robert P. Rich and Harry Shaw",
  title =        "A Method for Finding All the Zeros of $f(z)$",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "545--549",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Freudenstein:1963:NSS,
  author =       "Ferdinand Freudenstein and Bernard Roth",
  title =        "Numerical Solution of Systems of Nonlinear Equations",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "550--556",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Emanuel:1963:WSC,
  author =       "George Emanuel",
  title =        "The {Wilf} Stability Criterion for Numerical
                 Integration",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "557--561",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Curtis:1963:GTC,
  author =       "H. Allen Curtis",
  title =        "Generalized Tree Circuit---The Basic Building Block of
                 an Extended Decomposition Theory",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "562--581",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 22:00:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Youden:1963:IV,
  author =       "W. W. Youden",
  title =        "Index, Volumes 1--10 (1954--1963)",
  journal =      j-J-ACM,
  volume =       "10",
  pages =        "583--646",
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 22:00:24 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  xxmonth =      "none",
  xxnumber =     "none",
}

@Article{Friedman:1963:SDP,
  author =       "Joyce Friedman",
  title =        "A Semi-Decision Procedure for the Functional
                 Calculus",
  journal =      j-J-ACM,
  volume =       "10",
  number =       "1",
  pages =        "1--24",
  month =        jan,
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 23:17:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harrison:1963:NCI,
  author =       "Michael A. Harrison",
  title =        "The Number of Classes of Invertible {Boolean}
                 Functions",
  journal =      j-J-ACM,
  volume =       "10",
  number =       "1",
  pages =        "25--28",
  month =        jan,
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 23:19:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1963:SRU,
  author =       "Seymour Ginsburg and Gene F. Rose",
  title =        "Some Recursively Unsolvable Problems in {ALGOL}-Like
                 Languages",
  journal =      j-J-ACM,
  volume =       "10",
  number =       "1",
  pages =        "29--47",
  month =        jan,
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 23:19:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{House:1963:CPO,
  author =       "R. W. House and T. Rado",
  title =        "On a Computer Program for Obtaining Irreducible
                 Representations for Two-Level Multiple Input-Output
                 Logical Systems",
  journal =      j-J-ACM,
  volume =       "10",
  number =       "1",
  pages =        "48--77",
  month =        jan,
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{House:1963:ECP}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lee-Whiting:1963:FCI,
  author =       "G. E. Lee-Whiting",
  title =        "Formulas for Computing Incomplete Elliptic Integrals
                 of the First and Second Kinds",
  journal =      j-J-ACM,
  volume =       "10",
  number =       "2",
  pages =        "126--130",
  month =        apr,
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 22:55:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Lee-Whiting:1963:EFC}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shepherdson:1963:CRF,
  author =       "J. C. Shepherdson and H. E. Sturgis",
  title =        "Computability of Recursive Functions",
  journal =      j-J-ACM,
  volume =       "10",
  number =       "2",
  pages =        "217--255",
  month =        apr,
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 00:47:23 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Math/hilbert10.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Trainiter:1963:ARA,
  author =       "M. Trainiter",
  title =        "Addressing for Random-Access Storage with Multiple
                 Bucket Capabilities",
  journal =      j-J-ACM,
  volume =       "10",
  number =       "3",
  pages =        "307--315",
  month =        jul,
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 21 10:19:36 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Schwartz:1963:DMR,
  author =       "Eugene S. Schwartz",
  title =        "A Dictionary for Minimum Redundancy Encoding",
  journal =      j-J-ACM,
  volume =       "10",
  number =       "4",
  pages =        "413--439",
  month =        oct,
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 00:43:54 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Data on and use of word frequencies.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Baber:1963:TST,
  author =       "R. L. Baber",
  title =        "Tape Searching Techniques",
  journal =      j-J-ACM,
  volume =       "10",
  number =       "4",
  pages =        "478--486",
  month =        oct,
  year =         "1963",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 00:43:33 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Backspacing versus rewinding (no backward reading) to
                 known records.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rutledge:1964:IPS,
  author =       "J. D. Rutledge",
  title =        "On {Ianov}'s Program Schemata",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "1--9",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brown:1964:TSA,
  author =       "R. R. Brown",
  title =        "Tape Sets and Automata",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "10--14",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cocke:1964:UTS,
  author =       "John Cocke and Marvin Minsky",
  title =        "Universality of Tag Systems with ${P} = 2$",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "15--20",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Farber:1964:SSM,
  author =       "D. J. Farber and R. E. Griswold and I. P. Polonsky",
  title =        "{SNOBOL}, a String Manipulation Language",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "21--30",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321203.321207",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:44:13 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/reynolds.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  checked =      "19 July 1993",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hull:1964:MCR,
  author =       "T. E. Hull and A. R. Dobell",
  title =        "Mixed Congruential Random Number Generators for Binary
                 Machines",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "31--40",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321203.321208",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "Random number generators of the mixed congruential
                 type have recently been proposed. They appear to have
                 some advantages over those of the multiplicative type,
                 except that their statistical behavior is
                 unsatisfactory in some cases. It is shown theoretically
                 that a certain class of these mixed generators should
                 be expected to fail statistical tests for randomness.
                 Extensive testing confirms this hypothesis and makes
                 possible a more precise definition of the
                 unsatisfactory class. It is concluded that the
                 advantages of mixed generators can be realized only in
                 special circumstances. On machines with relatively
                 short multiplication times the multiplicative
                 generators are to be preferred.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stockmal:1964:CPR,
  author =       "Frank Stockmal",
  title =        "Calculations with Pseudo-Random Numbers",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "41--52",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321203.321209",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{LaBudde:1964:TNC,
  author =       "C. Donald {La Budde}",
  title =        "Two New Classes of Algorithms for Finding the
                 Eigenvalues and Eigenvectors of Real Symmetric
                 Matrices",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "53--58",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:44:38 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/gvl.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stoer:1964:DMC,
  author =       "Josef Stoer",
  title =        "A Direct Method for {Chebyshev} Approximation by
                 Rational Functions",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "59--69",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pickard:1964:TGS,
  author =       "William F. Pickard",
  title =        "Tables of the Generalized {Stirling} Numbers of the
                 First Kind",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "70--78",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Giammo:1964:MMA,
  author =       "T. Giammo",
  title =        "A Mathematical Model for the Automatic Scaling of a
                 Function",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "79--83",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yoeli:1964:ATA,
  author =       "Michael Yoeli and Shlomo Rinon",
  title =        "Application of Ternary Algebra to the Study of Static
                 Hazards",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "84--97",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gauss:1964:EPS,
  author =       "E. J. Gauss",
  title =        "Estimation of Power Spectral Density by Filters",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "98--103",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pollack:1964:MRC,
  author =       "Maurice Pollack",
  title =        "Message Route Control in a Large Teletype Network",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "1",
  pages =        "104--116",
  month =        jan,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cooper:1964:FRD,
  author =       "William S. Cooper",
  title =        "Fact Retrieval and Deductive Question-Answering
                 Information Retrieval Systems",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "117--137",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Borko:1964:ADC,
  author =       "Harold Borko and Myrna Bernick",
  title =        "Automatic Document Classification. {Part II}.
                 {Additional} Experiments",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "138--151",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:45:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Borko:1963:ADC}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Schroeder:1964:IDS,
  author =       "R. Schroeder",
  title =        "Input Data Source Limitations for Real-Time Operation
                 of Digital Computers",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "152--158",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:13:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Randell:1964:SST,
  author =       "B. Randell and L. J. Russell",
  title =        "Single-Scan Techniques for the Translation of
                 Arithmetic Expressions in {ALGOL 60}",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "159--167",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ashenhurst:1964:FEU,
  author =       "R. L. Ashenhurst",
  title =        "Function Evaluation in Unnormalized Arithmetic",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "168--187",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

%% Page 202 is notice page
@Article{Gragg:1964:GMP,
  author =       "William B. Gragg and Hans J. Stetter",
  title =        "Generalized Multistep Predictor-Corrector Methods",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "188--209",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tornheim:1964:CMI,
  author =       "Leonard Tornheim",
  title =        "Convergence of Multipoint Iterative Methods",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "210--220",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 00:45:13 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "iter; multipoint method; nlop",
}

@Article{Ferguson:1964:MCI,
  author =       "James Ferguson",
  title =        "Multivariable curve interpolation",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "221--228",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 3 22:44:40 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pickard:1964:TSS,
  author =       "William F. Pickard",
  title =        "Tables for the Step-by-Step Integration of Ordinary
                 Differential Equations of the First Order",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "229--233",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hemmerle:1964:ASS,
  author =       "W. J. Hemmerle",
  title =        "Algebraic Specification of Statistical Models for
                 Analysis of Variance Computations",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "234--239",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Smith:1964:DCS,
  author =       "K. U. Smith and S. D. Ansell and J. Koehler and G. H.
                 Servos",
  title =        "Digital Computer System for Dynamic Analysis of Speech
                 and Sound Feedback Mechanisms",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "2",
  pages =        "240--251",
  month =        apr,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Slagle:1964:EAF,
  author =       "James R. Slagle",
  title =        "An Efficient Algorithm for Finding Certain
                 Minimum-Cost Procedures for Making Binary Decisions",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "3",
  pages =        "253--264",
  month =        jul,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:33:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Flores:1964:DWT,
  author =       "Ivan Flores",
  title =        "Derivation of a Waiting-Time Factor for a
                 Multiple-Bank Memory",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "3",
  pages =        "265--282",
  month =        jul,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lawler:1964:AMB,
  author =       "Eugene L. Lawler",
  title =        "An Approach to Multilevel {Boolean} Minimization",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "3",
  pages =        "283--294",
  month =        jul,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cohn:1964:PLM,
  author =       "Martin Cohn",
  title =        "Properties of Linear Machines",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "3",
  pages =        "296--301",
  month =        jul,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1964:SMM,
  author =       "Seymour Ginsburg and Thomas N. Hibbard",
  title =        "Solvability of Machine Mappings of Regular Sets to
                 Regular Sets",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "3",
  pages =        "302--312",
  month =        jul,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Elgot:1964:RMA,
  author =       "C. C. Elgot and J. D. Rutledge",
  title =        "{RS}-Machines with Almost Blank Tape",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "3",
  pages =        "313--337",
  month =        jul,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 23:22:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Winograd:1964:IEL,
  author =       "S. Winograd",
  title =        "Input-Error-Limiting Automata",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "3",
  pages =        "338--351",
  month =        jul,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gershinsky:1964:AHI,
  author =       "Morris Gershinsky and David A. Levine",
  title =        "{Aitken-Hermite} Interpolation",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "3",
  pages =        "352--356",
  month =        jul,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kronmal:1964:EPN,
  author =       "Richard Kronmal",
  title =        "Evaluation of a Pseudorandom Normal Number Generator",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "3",
  pages =        "357--363",
  month =        jul,
  year =         "1964",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321229.321238",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 00:45:35 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  descriptors =  "RVG",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Elgot:1964:RAS,
  author =       "Calvin C. Elgot and Abraham Robinson",
  title =        "Random-Access Stored Program Machines, an Approach to
                 Programming Languages",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "4",
  pages =        "365--399",
  month =        oct,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:52:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Klingman:1964:NPA,
  author =       "W. R. Klingman and D. M. Himmelblau",
  title =        "Nonlinear Programming with the Aid of a
                 Multiple-Gradient Summation Technique",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "4",
  pages =        "400--415",
  month =        oct,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:24:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hartt:1964:SAP,
  author =       "Kenneth Hartt",
  title =        "Some Analytical Procedures for Computers and their
                 Applications to a Class of Multidimensional Integrals",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "4",
  pages =        "416--421",
  month =        oct,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pyle:1964:GIC,
  author =       "L. Duane Pyle",
  title =        "Generalized Inverse Computations Using the Gradient
                 Projection Method",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "4",
  pages =        "422--428",
  month =        oct,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Krider:1964:FAA,
  author =       "Lee Krider",
  title =        "A Flow Analysis Algorithm",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "4",
  pages =        "429--436",
  month =        oct,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{OConnor:1964:MIM,
  author =       "John O'Connor",
  title =        "Mechanized Indexing Methods and their Testing",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "4",
  pages =        "437--449",
  month =        oct,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sackman:1964:ICO,
  author =       "Harold Sackman and J. B. Munson",
  title =        "Investigation of Computer Operating Time and System
                 Capacity for Man-Machine Digital Systems",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "4",
  pages =        "450--464",
  month =        oct,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Edwards:1964:CPP,
  author =       "A. Wood Edwards and Robert L. Chambers",
  title =        "Can {A} Priori Probabilities Help in Character
                 Recognition?",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "4",
  pages =        "465--470",
  month =        oct,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dressler:1964:ERT,
  author =       "R. F. Dressler and W. Werner",
  title =        "Error Rates for Two Methods of Statistical Pattern
                 Recognition",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "4",
  pages =        "471--480",
  month =        oct,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:23:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brzozowski:1964:DRE,
  author =       "Janusz A. Brzozowski",
  title =        "Derivatives of Regular Expressions",
  journal =      j-J-ACM,
  volume =       "11",
  number =       "4",
  pages =        "481--494",
  month =        oct,
  year =         "1964",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:53:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Curtis:1965:TMS,
  author =       "M. W. Curtis",
  title =        "A {Turing} Machine Simulator",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "1--13",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{McLure:1965:PLS,
  author =       "Robert M. McLure",
  title =        "A Programming Language for Simulating Digital
                 Systems",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "14--22",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:47:01 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Robinson:1965:MOL,
  author =       "J. A. Robinson",
  title =        "A Machine-Oriented Logic Based on the Resolution
                 Principle",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "23--41",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:47:12 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/CLiCS.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "foundations; history; Prolog; resolution;
                 unification",
}

@Article{Greibach:1965:NNF,
  author =       "Sheila A. Greibach",
  title =        "A New Normal-Form Theorem for Context-Free Phrase
                 Structure Grammars",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "42--52",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wolman:1965:FOC,
  author =       "Eric Wolman",
  title =        "A Fixed Optimum Cell-Size for Records of Various
                 Lengths",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "53--70",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:47:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Glass:1965:SSM,
  author =       "H. Glass and L. Cooper",
  title =        "Sequential Search: a Method for Solving Constrained
                 Optimized Problems",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "71--82",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{MacLaren:1965:URN,
  author =       "M. Donald MacLaren and George Marsaglia",
  title =        "Uniform Random Number Generators",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "83--89",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321250.321257",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "65.15",
  MRnumber =     "30 \#687 (MR 170449)",
  bibdate =      "Mon Jan 22 17:05:44 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/m/marsaglia-george.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 MathSciNet database",
  ZMnumber =     "0143.40101",
  abstract =     "This paper discusses the testing of methods for
                 generating uniform random numbers in a computer---the
                 commonly used multiplicative and mixed congruential
                 generators as well as two new methods. Tests proposed
                 here are more stringent than those usually applied,
                 because the usual tests for randomness have passed
                 several of the commonly-used procedures which
                 subsequently gave poor results in actual Monte Carlo
                 calculations. The principal difficulty seems to be that
                 certain simple functions of $n$-tuples of uniform
                 random numbers do not have the distribution that
                 probability theory predicts.\par

                 Two alternative generating methods are described, one
                 of them using a table of uniform numbers, the other one
                 combining two congruential generators. Both of these
                 methods passed the tests, whereas the conventional
                 multiplicative and mixed congruential methods did
                 not.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "numerical analysis",
  oldlabel =     "MacLarenM65",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/jacm/MacLarenM65",
}

@Article{Booker:1965:NES,
  author =       "Aaron Booker",
  title =        "Numerical Evaluation of Symmetric Polynomials",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "90--94",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hockney:1965:FDS,
  author =       "R. W. Hockney",
  title =        "A Fast Direct Solution of {Poisson}'s Equation Using
                 {Fourier} Analysis",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "95--113",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 00:46:32 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "direct Poisson solver; FFT; nla",
}

@Article{Bramble:1965:ASM,
  author =       "J. H. Bramble and B. E. Hubbard",
  title =        "Approximation of Solutions of Mixed Boundary Value
                 Problems for {Poisson}'s Equation by Finite
                 Differences",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "114--123",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Butcher:1965:MMM,
  author =       "J. C. Butcher",
  title =        "A Modified Multistep Method for the Numerical
                 Integration of Ordinary Differential Equations",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "124--135",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anders:1965:EBN,
  author =       "Edward B. Anders",
  title =        "An Error Bound for a Numerical Filtering Technique",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "136--140",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gill:1965:ASS,
  author =       "Arthur Gill",
  title =        "Analysis and Synthesis of Stable Linear Sequential
                 Circuits",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "1",
  pages =        "141--149",
  month =        jan,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:47:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Broome:1965:DOS,
  author =       "Paul W. Broome",
  title =        "Discrete Orthogonal Sequences",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "151--168",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 23:26:46 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Moursund:1965:EMR,
  author =       "David G. Moursund",
  title =        "Examination of Multiple Roots and Root Clusters of a
                 Polynomial Using the {Bernoulli} Procedure",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "169--174",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Glauz:1965:NSO,
  author =       "R. D. Glauz",
  title =        "On the Numerical Solution of Ordinary and Partial
                 Differential Equations Using Integral Relations",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "175--180",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dunham:1965:CPM,
  author =       "Charles B. Dunham",
  title =        "Convergence Problems in {Maehly}'s Second Method",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "181--186",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Weeg:1965:AGD,
  author =       "G. P. Weeg",
  title =        "The Automorphism Group of the Direct Product of
                 Strongly Related Automata",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "187--195",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 00:13:55 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Weeg:1967:CAG}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lin:1965:CST,
  author =       "Shen Lin and Tibor Rado",
  title =        "Computer Studies of {Turing} Machine Problems",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "196--212",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chu:1965:ODF,
  author =       "J. T. Chu",
  title =        "Optimum Decision Functions for Computer Character
                 Recognition",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "213--226",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Crane:1965:PCA,
  author =       "R. L. Crane and R. W. Klopfenstein",
  title =        "A Predictor-Corrector Algorithm with an Increased
                 Range of Absolute Stability",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "227--241",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kanner:1965:NBC,
  author =       "Herbert Kanner",
  title =        "Number Base Conversion in Significant Digit
                 Arithmetic",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "242--246",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Penney:1965:BSC,
  author =       "Walter Penney",
  title =        "A ``Binary'' System for Complex Numbers",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "247--248",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sanders:1965:DAC,
  author =       "Jerry Sanders",
  title =        "Document Association and Classification Based on
                 ${L}$-Languages",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "249--253",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:42:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Glicksman:1965:CME,
  author =       "Stephen Glicksman",
  title =        "Concerning the Merging of Equal Length Tape Files",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "254--258",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:24:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dixon:1965:COS,
  author =       "W. J. Dixon and R. A. Kronmal",
  title =        "The Choice of Origin and Scale for Graphs",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "259--261",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sheng:1965:TLE,
  author =       "C. L. Sheng",
  title =        "Threshold Logic Elements Used as a Probability
                 Transformer",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "262--276",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:30:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Sheng:1965:CTL}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Winograd:1965:TRP,
  author =       "S. Winograd",
  title =        "On the Time Required to Perform Addition",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "277--285",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stineman:1965:DTD,
  author =       "R. W. Stineman",
  title =        "Digital Time-Domain Analysis of Systems with Widely
                 Separated Poles",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "2",
  pages =        "286--294",
  month =        apr,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fraser:1965:SMC,
  author =       "W. Fraser",
  title =        "A Survey of Methods for Computing Minimax and
                 Near-Minimax Polynomial Approximations for Functions of
                 a Single Independent Variable",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "295--314",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321281.321282",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/elefunt.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Methods are described for the derivation of minimax
                 and near-minimax polynomial approximations. For minimax
                 approximations techniques are considered for both
                 analytically defined functions and functions defined by
                 a table of values. For near-minimax approximations
                 methods of determining the coefficients of the
                 Fourier--Chebyshev expansion are first described. These
                 consist of the rearrangement of the coefficients of a
                 power polynomial, and also direct determination of the
                 coefficients from the integral which defines them, or
                 the differential equation which defines the function.
                 Finally there is given a convenient modification of an
                 interpolation scheme which finds coefficients of a
                 near-minimax approximation without requiring numerical
                 integration or the numerical solution of a system of
                 equations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yershov:1965:OVM,
  author =       "A. P. Yersh{\'{o}}v",
  title =        "One View of Man-Machine Interaction (Translated by
                 {Nicholas Zvegintzov})",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "315--325",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Conn:1965:ODS,
  author =       "Richard W. Conn and Richard E. von Holdt",
  title =        "An Online Display for the Study of Approximating
                 Functions",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "326--349",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Menon:1965:PCC,
  author =       "M. V. Menon",
  title =        "On a Problem Concerning a Central Storage Device
                 Served by Multiple Terminals",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "350--355",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Winters:1965:MML,
  author =       "William K. Winters",
  title =        "A Modified Method of Latent Class Analysis for File
                 Organization in Information Retrieval",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "356--363",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mileto:1965:SCA,
  author =       "Franco Mileto and Gianfranco Putzolu",
  title =        "Statistical Complexity of Algorithms for {Boolean}
                 Function Minimization",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "364--375",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:14:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Mileto:1966:CSC}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{SimoesPereira:1965:BME,
  author =       "J. M. S. {Sim{\~o}es Pereira}",
  title =        "On the {Boolean} Matrix Equation
                 {$M'=\vee_{i=1}M^i$}",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "376--382",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:41:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{SimoesPereira:1967:CBM}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Moursund:1965:CSL,
  author =       "David Moursund",
  title =        "{Chebyshev} Solution of $n + 1$ Linear Equations in
                 $n$ Unknowns",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "383--387",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fischer:1965:GPO,
  author =       "Patrick C. Fischer",
  title =        "Generation of Primes by a One-Dimensional Real-Time
                 Iterative Array",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "388--394",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 22:17:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Newman:1965:LMU,
  author =       "D. J. Newman",
  title =        "Location of the Maximum on Unimodal Surfaces",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "395--398",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Paz:1965:UDS,
  author =       "A. Paz and B. Peleg",
  title =        "Ultimate-Definite and Symmetric-Definite Events and
                 Automata",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "399--410",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yoeli:1965:GCD,
  author =       "Michael Yoeli",
  title =        "Generalized Cascade Decompositions of Automata",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "411--422",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1965:MLT,
  author =       "Seymour Ginsburg and Edwin H. Spanier",
  title =        "Mappings of Languages by Two-Tape Devices",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "423--434",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 00:47:10 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/logic.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  comment =      "Introduces shuffle operator",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sheng:1965:CTL,
  author =       "C. L. Sheng",
  title =        "Correction: ``{Threshold} Logic Elements Used as a
                 Probability Transformer''",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "3",
  pages =        "435--435",
  month =        jul,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:24:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Sheng:1965:TLE}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Meyers:1965:MCN,
  author =       "Leroy F. Meyers",
  title =        "Morphological Classification in the {National Bureau
                 of Standards} Mechanical Translation System",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "437--472",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:56:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Doyle:1965:ACR,
  author =       "Lauren B. Doyle",
  title =        "Is Automatic Classification a Reasonable Application
                 of Statistical Analysis of Text?",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "473--489",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:50:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{OConnor:1965:ASR,
  author =       "John O'Connor",
  title =        "Automatic Subject Recognition in Scientific Papers:
                 {An} Empirical Study",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "490--515",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Golomb:1965:BP,
  author =       "Solomon W. Golomb and Leonard D. Baumert",
  title =        "Backtrack Programming",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "516--524",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 00:50:33 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/constr.logic.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "graph coloring related algorithm",
}

@Article{Srinivasan:1965:ISC,
  author =       "A. V. Srinivasan",
  title =        "An Investigation of Some Computational Aspects of
                 Integer Programming",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "525--535",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wos:1965:ECS,
  author =       "Lawrence Wos and George A. Robinson and Daniel F.
                 Carson",
  title =        "Efficiency and Completeness of the Set of Support
                 Strategy in Theorem Proving",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "536--541",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:51:05 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rao:1965:MMA,
  author =       "T. R. N. Rao and N. Zierler",
  title =        "On Mappings for Modular Arithmetic, {I}",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "542--544",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Berkovits:1965:MMA,
  author =       "S. Berkovits and M. Schlessing and N. Zierler",
  title =        "On Mappings for Modular Arithmetic, {II}",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "545--546",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anderson:1965:IPN,
  author =       "Donald G. Anderson",
  title =        "Iterative Procedures for Nonlinear Integral
                 Equations",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "547--560",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Barnes:1965:GAS,
  author =       "Bruce Barnes",
  title =        "Groups of Automorphisms and Sets of Equivalence
                 Classes of Input for Automata",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "561--565",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fleck:1965:AGA,
  author =       "A. C. Fleck",
  title =        "On the Automorphism Group of an Automaton",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "566--569",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fischer:1965:FTM,
  author =       "Patrick C. Fischer",
  title =        "On Formalisms for {Turing} Machines",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "570--580",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chang:1965:ART,
  author =       "Wei Chang and Donald J. Wong",
  title =        "Analysis of Real Time Multiprogramming",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "581--588",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dennis:1965:SDM,
  author =       "Jack B. Dennis",
  title =        "Segmentation and the Design of Multiprogrammed
                 Computer Systems",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "589--602",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 08:47:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dantzig:1965:UPF,
  author =       "G. B. Dantzig and R. P. Harvey and R. D. McKnight",
  title =        "Updating the Product Form of the Inverse for the
                 Revised Simplex Method ({A} Summary)",
  journal =      j-J-ACM,
  volume =       "12",
  number =       "4",
  pages =        "603--603",
  month =        oct,
  year =         "1965",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 21:52:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "The complete paper is published in {\em Proceedings of
                 the 20th National Conference of the Association for
                 Computing Machinery, Cleveland, August 1965}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arden:1966:PAS,
  author =       "B. W. Arden and B. A. Galler and T. C. O'Brien and F.
                 H. Westervelt",
  title =        "Program and Addressing Structure in a Time-Sharing
                 Environment",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "1--16",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yershov:1966:AAP,
  author =       "A. P. Yersh{\'{o}}v",
  title =        "{ALPHA}---An Automatic Programming System of High
                 Efficiency",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "17--24",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 30 16:00:04 1996",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Schwartz:1966:LPC,
  author =       "J. Schwartz",
  title =        "Large Parallel Computers",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "25--32",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gill:1966:RIO,
  author =       "A. Gill",
  title =        "Realization of Input-Output Relations by Sequential
                 Machines",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "33--42",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Horwitz:1966:IRA,
  author =       "L. P. Horwitz and R. M. Karp and R. E. Miller and S.
                 Winograd",
  title =        "Index Register Allocation",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "43--61",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 3 22:59:07 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "optimization compilation assignment classic",
}

@Article{Ginsburg:1966:ACF,
  author =       "Seymour Ginsburg and Joseph Ullian",
  title =        "Ambiguity in Context Free Languages",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "62--89",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 10 11:15:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gilbert:1966:SAL,
  author =       "Philip Gilbert",
  title =        "On the Syntax of Algorithmic Languages",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "90--107",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:16:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dunham:1966:CPM,
  author =       "Charles B. Dunham",
  title =        "Convergence Problems in {Maehly}'s Second Method:
                 {Part II}",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "108--113",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Byrne:1966:PRK,
  author =       "George D. Byrne and Robert J. Lambert",
  title =        "Pseudo-{Runge--Kutta} Methods Involving Two Points",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "114--123",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Maddison:1966:PNL,
  author =       "R. N. Maddison",
  title =        "A Procedure for Nonlinear Least Squares Refinement in
                 Adverse Practical Conditions",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "124--134",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Barlow:1966:MSR,
  author =       "C. A. {Barlow, Jr.} and E. L. Jones",
  title =        "A Method for the Solution of Roots of a Nonlinear
                 Equation and for Solution of the General Eigenvalue
                 Problem",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "135--142",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tsuda:1966:NLE,
  author =       "Takao Tsuda and Hiroshi Matsumoto",
  title =        "A Note on Linear Extrapolation of Multivariable
                 Functions by the {Monte Carlo} Method",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "143--150",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harrison:1966:AES,
  author =       "Michael A. Harrison",
  title =        "On Asymptotic Estimates in Switching and Automata
                 Theory",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "151--157",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Salomaa:1966:TCA,
  author =       "Arto Salomaa",
  title =        "Two Complete Axiom Systems for the Algebra of Regular
                 Events",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "158--169",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/math.prog.construction.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Trauth:1966:GTA,
  author =       "Charles A. {Trauth, Jr.}",
  title =        "Group-Type Automata",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "1",
  pages =        "170--175",
  month =        jan,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:34:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kleinrock:1966:SPM,
  author =       "Leonard Kleinrock",
  title =        "Sequential Processing Machines ({S.P.M.}) Analyzed
                 with a Queueing Theory Model",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "179--193",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:35:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Weiss:1966:VPI,
  author =       "Ruth A. Weiss",
  title =        "{BE VISION}, a Package of {IBM 7090 FORTRAN}
                 Programs to Draw Orthographic Views of Combinations of
                 Plane and Quadric Surfaces",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "194--204",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; curves and surfaces; graphics",
}

@Article{Welch:1966:MAC,
  author =       "John T. {Welch, Jr.}",
  title =        "A Mechanical Analysis of the Cyclic Structure of
                 Undirected Linear Graphs",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "205--210",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ramamoorthy:1966:AGC,
  author =       "C. V. Ramamoorthy",
  title =        "Analysis of Graphs by Connectivity Considerations",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "211--222",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cook:1966:SDP,
  author =       "Stephen A. Cook",
  title =        "The Solvability of the Derivability Problem for
                 One-Normal Systems",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "223--225",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Maurer:1966:TCI,
  author =       "Ward Douglas Maurer",
  title =        "A Theory of Computer Instructions",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "226--235",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kobayashi:1966:CPD,
  author =       "Kojiro Kobayashi and Shigeru Sekiguchi",
  title =        "On the Class of Predicates Decidable by Two-Way
                 Multitape Finite Automata",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "236--261",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Holtz:1966:SRD,
  author =       "Howard Holtz and C. T. Leondes",
  title =        "The Synthesis of Recursive Digital Filters",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "262--280",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Minsky:1966:USN,
  author =       "Marvin Minsky and Seymour Papert",
  title =        "Unrecognizable Sets of Numbers",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "281--286",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Usmani:1966:BVT,
  author =       "Riaz A. Usmani",
  title =        "Boundary Value Techniques for the Numerical Solution
                 of Certain Initial Value Problems in Ordinary
                 Differential Equations",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "287--295",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rabinowitz:1966:NEC,
  author =       "Philip Rabinowitz",
  title =        "Numerical Experiments in Conformal Mapping by the
                 Method of Orthonormal Polynomials",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "296--303",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:36:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bledsoe:1966:SRM,
  author =       "W. W. Bledsoe",
  title =        "Some Results on Multicategory Pattern Recognition",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "2",
  pages =        "304--316",
  month =        apr,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Krishnamoorthi:1966:TSO,
  author =       "B. Krishnamoorthi and Roger C. Wood",
  title =        "Time-Shared Operations with Both Interarrival and
                 Service Times Exponential",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "317--338",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Reinwald:1966:CLE,
  author =       "Lewis T. Reinwald and Richard M. Soland",
  title =        "Conversion of Limited-Entry Decision Tables to Optimal
                 Computer Programs {I}: {Minimum} Average Processing
                 Time",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "339--358",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hooper:1966:MPN,
  author =       "Philip K. Hooper",
  title =        "Monogenic Post Normal Systems of Arbitrary Degree",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "359--363",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1966:PUI,
  author =       "Seymour Ginsburg and Joseph Ullian",
  title =        "Preservation of Unambiguity and Inherent Ambiquity in
                 Context-Free Languages",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "364--368",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Porter:1966:UMG,
  author =       "Sigmund N. Porter",
  title =        "Use of Multiwrite for General Programmability of
                 Search Memories",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "369--373",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Krogh:1966:PCM,
  author =       "Fred T. Krogh",
  title =        "Predictor-Corrector Methods of High Order With
                 Improved Stability Characteristics",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "374--385",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chartres:1966:ACP,
  author =       "Bruce A. Chartres",
  title =        "Automatic Controlled Precision Calculations",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "386--403",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 28 16:23:06 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Recent developments in computer design and error
                 analysis have made feasible the use of variable
                 precision arithmetic and the preparation of programs
                 that automatically determine their own precision
                 requirements. Such programs enable the user to specify
                 the accuracy he wants, and yield answers guaranteed to
                 lie within the bounds prescribed. A class of such
                 programs, called ``contracting error programs'', is
                 defined in which the precision is determined by
                 prescribing error bounds on the data. A variant of
                 interval arithmetic is defined which enables a limited
                 class of algorithms to be programmed as contracting
                 error programs. A contracting error program for the
                 solution of simultaneous linear equations is described,
                 demonstrating the application of the idea to a wider
                 class of problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{MacLaren:1966:ISR,
  author =       "M. Donald MacLaren",
  title =        "Internal Sorting by Radix Plus Sifting",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "404--411",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bailey:1966:GSE,
  author =       "John S. Bailey",
  title =        "Generalized Single-Ended Counters",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "412--418",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Weeks:1966:NIL,
  author =       "William T. Weeks",
  title =        "Numerical Inversion of {Laplace} Transforms Using
                 {Laguerre} Functions",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "419--429",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 22:00:46 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  descriptors =  "Mathematics; Laplace transform; inversion",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1966:CIF,
  author =       "R. W. Hamming and R. S. Pinkham",
  title =        "A Class of Integration Formulas",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "430--438",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Erdelyi:1966:ROL,
  author =       "Ivan Erdelyi",
  title =        "On the ``Reverse Order Law'' Related to the
                 Generalized Inverse of Matrix Products",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "439--443",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Overheu:1966:AMS,
  author =       "D. L. Overheu",
  title =        "An Abstract Machine for Symbolic Computation",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "444--468",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mileto:1966:CSC,
  author =       "Franco Mileto and Gianfranco Potzolu",
  title =        "Corrigenda: ``{Statistical} Complexity of Algorithms
                 for {Boolean} Function Minimization''",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "3",
  pages =        "469--469",
  month =        jul,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:36:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Mileto:1965:SCA}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenfeld:1966:SOD,
  author =       "Azriel Rosenfeld and John L. Pfaltz",
  title =        "Sequential Operations in Digital Picture Processing",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "471--494",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:40:47 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blum:1966:FSD,
  author =       "E. K. Blum",
  title =        "A Formal System of Differentiation",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "495--504",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anders:1966:ERI,
  author =       "Edward B. Anders",
  title =        "An Extension of {Romberg} Integration Procedures to
                 ${N}$-Variables",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "505--510",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:37:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dubey:1966:SDC,
  author =       "Satya D. Dubey",
  title =        "Statistical Determination of Certain Mathematical
                 Constants and Functions Using Computers",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "511--525",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Toyoda:1966:AAA,
  author =       "Junichi Toyoda and Yoshikazu Tezuka and Yoshiro
                 Kasahara",
  title =        "Analysis of the Address Assignment Problem for
                 Clustered Keys",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "526--532",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:41:45 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hennie:1966:TTS,
  author =       "F. C. Hennie and R. E. Stearns",
  title =        "Two-Tape Simulations of Multitape {Turing} Machines",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "533--546",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 22:17:46 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chaitin:1966:LPC,
  author =       "Gregory J. Chaitin",
  title =        "On the Length of Programs for Computing Finite Binary
                 Sequences",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "547--569",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321356.321363",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 26 12:46:16 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "The use of Turing machines for calculating finite
                 binary sequences is studied from the point of view of
                 information theory and the theory of recursive
                 functions. Various results are obtained concerning the
                 number of:instructions ia programs. A modified form of
                 Turing machine is studied from the same point of view.
                 Aa application to the problem of defining a patternless
                 sequence is proposed in terms of the concepts here
                 developed.",
  acknowledgement = ack-ds # " and " # ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  rawdata =      "Chaitin, Gregory J. (1966) ``On the Lengths of
                 Programs for Computing Finite Binary Sequences,'' {\it
                 Journal of the ACM}, {\bf13}(4):547--569, October.",
}

@Article{Parikh:1966:CFL,
  author =       "Rohit J. Parikh",
  title =        "On Context-Free Languages",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "570--581",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 22:17:46 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Greibach:1966:URL,
  author =       "Sheila A. Greibach",
  title =        "The Unsolvability of the Recognition of Linear
                 Context-Free Languages",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "582--587",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hibbard:1966:IIA,
  author =       "Thomas N. Hibbard and Joseph Ullian",
  title =        "The Independence of Inherent Ambiguity From
                 Complementedness Among Context-Free Languages",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "588--593",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 22:17:46 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hooper:1966:IPP,
  author =       "Philip K. Hooper",
  title =        "The Immortality Problem for Post Normal Systems",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "594--599",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shaw:1966:DAC,
  author =       "H. Shaw",
  title =        "Discrete Analogs for Continuous Filters",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "600--604",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Negron:1966:DOT,
  author =       "C. D. Negron",
  title =        "Digital One-Third Octave Spectral Analysis",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "605--614",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:59:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mamelak:1966:PCL,
  author =       "J. S. Mamelak",
  title =        "The Placement of Computer Logic Modules",
  journal =      j-J-ACM,
  volume =       "13",
  number =       "4",
  pages =        "615--629",
  month =        oct,
  year =         "1966",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 22:01:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Perlis:1967:SAS,
  author =       "Alan J. Perlis",
  title =        "The Synthesis of Algorithmic Systems",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "1--9",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321371.321372",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:37:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  remark =       "This is the 1966 ACM Turing Award Lecture, and the
                 first award.",
}

@Article{Wunderlich:1967:SPD,
  author =       "Marvin C. Wunderlich",
  title =        "Sieving Procedures on a Digital Computer",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "10--19",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:08:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lewis:1967:SDS,
  author =       "P. A. W. Lewis and P. B. Baxendale and J. L. Bennett",
  title =        "Statistical Discrimination of the Synonymy\slash
                 Antonymy Relationship Between Words",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "20--44",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:08:39 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brans:1967:CPN,
  author =       "Carl H. Brans",
  title =        "A Computer Program for the Nonnumerical Testing and
                 Reduction of Sets of Algebraic Partial Differential
                 Equations",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "45--62",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 23:40:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chartres:1967:CEB,
  author =       "Bruce A. Chartres and James C. Geuder",
  title =        "Computable Error Bounds for Direct Solution of Linear
                 Equations",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "63--71",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:48:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stewart:1967:MDM,
  author =       "G. W. {Stewart III}",
  title =        "A Modification of {Davidon}'s Minimization Method to
                 Accept Difference Approximations to Derivatives",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "72--83",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:42:13 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "nlop; quasi-Newton",
}

@Article{Butcher:1967:MGR,
  author =       "John C. Butcher",
  title =        "A Multistep Generalization of {Runge--Kutta} Methods
                 With Four or Five Stages",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "84--99",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 23:41:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Coveyou:1967:FAU,
  author =       "R. R. Coveyou and R. D. MacPherson",
  title =        "{Fourier} Analysis of Uniform Random Number
                 Generators",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "100--119",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321371.321379",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 22 07:42:22 2011",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "A method of analysis of uniform random number
                 generators is developed, applicable to almost all
                 practical methods of generation. The method is that of
                 Fourier analysis of the output sequences of such
                 generators. With this tool it is possible to understand
                 and predict relevant statistical properties of such
                 generators and compare and evaluate such methods. Many
                 such analyses and comparisons have been carried out.
                 The performance of these methods as implemented on
                 differing computers is also studied. The main practical
                 conclusions of the study are: (a) Such a priori
                 analysis and prediction of statistical behavior of
                 uniform random number generators is feasible. (b) The
                 commonly used multiplicative congruence method of
                 generation is satisfactory with careful choice of the
                 multiplier for computers with an adequate ($\geq
                 \approx 35$-bit) word length. (c) Further work may be
                 necessary on generators to be used on machines of
                 shorter word length.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  descriptors =  "Shift register sequences; method; spectral analysis;
                 interdependence; multidimensional uniformity; RNG;
                 test",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  remark =       "This article is believed to be the origin of the
                 spectral test for randomness.",
}

@Article{Young:1967:BWO,
  author =       "Tzay Y. Young",
  title =        "Binomial-Weighted Orthogonal Polynomials",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "120--127",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:09:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Collins:1967:SRP,
  author =       "George E. Collins",
  title =        "Subresultants and Reduced Polynomial Remainder
                 Sequences",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "128--142",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:49:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shaw:1967:MMM,
  author =       "Brian Shaw",
  title =        "Modified Multistep Methods Based on a Nonpolynomial
                 Interpolant",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "143--154",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:38:12 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kohfeld:1967:MMM,
  author =       "J. J. Kohfeld and G. T. Thompson",
  title =        "Multistep Methods With Modified Predictors and
                 Correctors",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "155--166",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:09:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yasuhara:1967:RPN,
  author =       "Ann Yasuhara",
  title =        "A Remark on Post Normal Systems",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "167--171",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:09:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1967:SAC,
  author =       "Seymour Ginsburg and Sheila A. Greibach and Michael A.
                 Harrison",
  title =        "Stack Automata and Compiling",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "1",
  pages =        "172--201",
  month =        jan,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 21:21:37 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Minnick:1967:SMR,
  author =       "Robert C. Minnick",
  title =        "Survey of Microcellular Research",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "203--241",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 3 23:43:37 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kleinrock:1967:TSS,
  author =       "Leonard Kleinrock",
  title =        "Time-shared Systems: a Theoretical Treatment",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "242--261",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Models are analyzed in which time-shared computer
                 usage is obtained by giving each request a fixed
                 quantum $q$ of time on the processor, after which the
                 request is placed at the end of a queue of other
                 requests; the queue of requests is constantly cycled,
                 giving each user $q$ seconds on the machine per cycle.
                 The case for which $q\rightarrow0$ (a processor-shared
                 model) is then analyzed using methods from queueing
                 theory. A general time-shared facility is \ldots{}.",
  descriptors =  "M/M/1; processor sharing; HOL priority; time sharing",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shemer:1967:SMC,
  author =       "Jack E. Shemer",
  title =        "Some Mathematical Considerations of Time-Sharing
                 Scheduling Algorithms",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "262--272",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:09:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chu:1967:EPD,
  author =       "J. T. Chu and J. C. Chueh",
  title =        "Error Probability in Decision Functions for Character
                 Recognition",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "273--280",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:48:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Martin:1967:MCS,
  author =       "David Martin and Gerald Estrin",
  title =        "Models of Computations and Systems---Evaluation of
                 Vertex Probabilities in Graph Models of Computations",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "281--299",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:09:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Waite:1967:PDM,
  author =       "William M. Waite",
  title =        "Path Detection in Multidimensional Iterative Arrays",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "300--310",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:09:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Moore:1967:CAS,
  author =       "J. B. Moore",
  title =        "A Convergent Algorithm for Solving Polynomial
                 Equations",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "311--315",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:09:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Moler:1967:IRF,
  author =       "Cleve B. Moler",
  title =        "Iterative Refinement in Floating Point",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "316--321",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:38:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "ir; iterative refinement; lud; nla",
}

@Article{Blum:1967:MIT,
  author =       "Manuel Blum",
  title =        "A Machine-Independent Theory of the Complexity of
                 Recursive Functions",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "322--336",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Math/hilbert10.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  comment =      "Russki{\u\i perevod v sb. Problemy matem. logiki. M.:
                 Mir, 1970.- S.401-422.}",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Westlake:1967:URN,
  author =       "W. J. Westlake",
  title =        "A Uniform Random Number Generator Based on the
                 Combination of Two Congruential Generators",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "337--340",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321386.321396",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 22 07:42:23 2011",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/bibnet/authors/m/marsaglia-george.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "A method of generating pseudo-random uniform numbers
                 based on the combination of two congruential generators
                 is described. It retains two of the desirable features
                 of congruential generators, namely, the long cycle and
                 the case of implementation on a digital computer.
                 Furthermore, unlike the method of combining
                 congruential generators recently proposed by MacLaren
                 and Marsaglia, it does not require the retention in
                 computer memory of a table of generated numbers. The
                 generator gave completely satisfactory results on a
                 fairly stringent series of statistical tests.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  descriptors =  "RNG",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mancino:1967:RIS,
  author =       "O. G. Mancino",
  title =        "Resolution by Iteration of Some Nonlinear Systems",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "341--350",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:15 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Krogh:1967:TIN,
  author =       "Fred T. Krogh",
  title =        "A Test for Instability in the Numerical Solution of
                 Ordinary Differential Equations",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "351--354",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginzburg:1967:PCE,
  author =       "A. Ginzburg",
  title =        "A Procedure for Checking Equality of Regular
                 Expressions",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "355--362",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:10:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cryer:1967:NSQ,
  author =       "C. W. Cryer",
  title =        "On the Numerical Solution of a Quasi-Linear Elliptic
                 Equation",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "363--375",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:10:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Natapoff:1967:ITC,
  author =       "Alan Natapoff",
  title =        "Irreducible Topological Components of an Arbitrary
                 {Boolean} Truth Function and Generation of Their
                 Minimal Coverings",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "376--381",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pickett:1967:NCA,
  author =       "H. E. Pickett",
  title =        "Note Concerning the Algebraic Theory of Automata",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "382--388",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1967:OWS,
  author =       "Seymour Ginsburg and Sheila A. Greibach and Michael A.
                 Harrison",
  title =        "One-Way Stack Automata",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "389--418",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:51:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{SimoesPereira:1967:CBM,
  author =       "J. M. S. {Sim{\~o}es Pereira}",
  title =        "Corrigendum: {``On the Boolean Matrix Equation $M' =
                 \vee_{i = 1} M^i$''}",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "419--420",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 28 08:29:05 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{SimoesPereira:1965:BME}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Weeg:1967:CAG,
  author =       "G. P. Weeg",
  title =        "Corrigendum: {``The Automorphism Group of the Direct
                 Product of Strongly Related Automata''}",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "2",
  pages =        "421--421",
  month =        apr,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:26:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Weeg:1965:AGD}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gaver:1967:PMM,
  author =       "D. P. {Gaver, Jr.}",
  title =        "Probability Models for Multiprogramming Computer
                 Systems",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "423--438",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A probabilistic model is developed for a
                 multiprogramming computer configuration, one in which
                 several program segments are simultaneously in main
                 memory (core). The model relates speed and number of
                 input-output devices, core size, and central processor
                 speed(?) to central processor and system productivity.
                 Incorporated in the model are parameters describing the
                 statistical variability of input-output and central
                 processor activities.",
  descriptors =  "Model; multiprogramming; computer system",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Manacher:1967:PSR,
  author =       "G. K. Manacher",
  title =        "Production and Stabilization of Real-Time Task
                 Schedules",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "439--465",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brzozowski:1967:RSE,
  author =       "J. A. Brzozowski",
  title =        "Roots of Star Events",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "466--477",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:46:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Karp:1967:SBS,
  author =       "Richard M. Karp",
  title =        "Some Bounds on the Storage Requirements of Sequential
                 Machines and {Turing} Machines",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "478--489",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{McNaughton:1967:PG,
  author =       "Robert McNaughton",
  title =        "Parenthesis Grammars",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "490--500",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenkrantz:1967:MEN,
  author =       "Daniel J. Rosenkrantz",
  title =        "Matrix Equations and Normal Forms for Context-Free
                 Grammars",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "501--507",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:44 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Oliver:1967:AFE,
  author =       "I. Oliver",
  title =        "Analysis of Factorial Experiments Using Generalized
                 Matrix Operations",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "508--519",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:49 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Klee:1967:MCC,
  author =       "Victor Klee",
  title =        "A Method for Constructing Circuit Codes",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "520--528",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mowle:1967:AGS,
  author =       "Frederic J. Mowle",
  title =        "An Algorithm for Generating Stable Feedback Shift
                 Registers of Order $n$",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "529--542",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rigal:1967:CGS,
  author =       "J. L. Rigal and J. Gaches",
  title =        "On the Compatibility of a Given Solution With the Data
                 of a Linear System",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "543--548",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "backward perturbation; la; nla; pert",
}

@Article{Hicks:1967:NSP,
  author =       "J. S. Hicks and J. Wei",
  title =        "Numerical Solution of Parabolic Partial Differential
                 Equations With Two-Point Boundary Conditions by Use of
                 the Method of Lines",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "549--562",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:10:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Karp:1967:OCU,
  author =       "Richard M. Karp and Raymond E. Miller and Shmuel
                 Winograd",
  title =        "The Organization of Computations for Uniform
                 Recurrence Relations",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "563--590",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Carroll:1967:APP,
  author =       "A. B. Carroll and R. T. Wetherald",
  title =        "Applications of Parallel Processing to Numerical
                 Weather Prediction",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "3",
  pages =        "591--614",
  month =        jul,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/ovr.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

%% Page 164 is notice page
@Article{Knuth:1967:PLA,
  author =       "Donald E. Knuth and Richard H. Bigelow",
  title =        "Programming Languages for Automata",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "615--635",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:20:22 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Floyd:1967:NA,
  author =       "Robert W. Floyd",
  title =        "Nondeterministic Algorithms",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "636--644",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 5 19:43:36 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/constr.logic.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenberg:1967:RTD,
  author =       "Arnold L. Rosenberg",
  title =        "Real-Time Definable Languages",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "645--662",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:11:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hartmanis:1967:MRC,
  author =       "J. Hartmanis",
  title =        "On Memory Requirements for Context-Free Language
                 Recognition",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "663--665",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:11:11 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gill:1967:PDS,
  author =       "Arthur Gill and J. Robert Flexer",
  title =        "Periodic Decomposition of Sequential Machines",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "666--676",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:11:12 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aanderaa:1967:SHP,
  author =       "St{\aa}l Aanderaa and Patrick C. Fischer",
  title =        "The Solvability of the Halting Problem for $2$-State
                 Post Machines",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "677--682",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 01 16:57:50 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Barnes:1967:MEI,
  author =       "Bruce H. Barnes and John M. Fitzgerald",
  title =        "Minimal Experiments for Input-Independent Machines",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "683--686",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:45:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Slagle:1967:ATP,
  author =       "James R. Slagle",
  title =        "Automatic Theorem Proving with Renamable and Semantic
                 Resolution",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "687--697",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:20:51 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wos:1967:CDT,
  author =       "Lawrence Wos and George A. Robinson and Daniel F.
                 Carson and Leon Shalla",
  title =        "The Concept of Demodulation in Theorem Proving",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "698--709",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 3 23:55:44 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fairthorne:1967:MIF,
  author =       "Robert A. Fairthorne",
  title =        "Morphology of ``Information Flow''",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "710--719",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:50:24 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shapiro:1967:ARP,
  author =       "Marvin B. Shapiro",
  title =        "An Algorithm for Reconstructing Protein and {RNA}
                 Sequences",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "720--731",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 5 19:44:47 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  comment =      "An algorithm for deriving the primary sequence of a
                 protein or {RNA} is presented. The data is in the form
                 of short sequences of letters which must be fitted
                 together to form the unknown complete sequence. A
                 computer program for carrying out the steps is
                 described, with an example. It is shown that the
                 algorithm cannot make an error and empirical results
                 are given which illustrate the successful use of the
                 algorithm in reconstructing complete sequences known to
                 be solvable.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sigillito:1967:CMA,
  author =       "V. G. Sigillito",
  title =        "On a Continuous Method of Approximating Solutions of
                 the Heat Equation",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "732--741",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:12:22 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Reinwald:1967:CLE,
  author =       "Lewis T. Reinwald and Richard M. Soland",
  title =        "Conversion of Limited-Entry Decision Tables to Optimal
                 Computer Programs {II}: {Minimum} Storage Requirement",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "742--756",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 4 00:12:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pease:1967:MIU,
  author =       "Marshall C. Pease",
  title =        "Matrix Inversion Using Parallel Processing",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "757--764",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:45:11 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/OVR.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "inverse matrix; linear system; lud; nla; prll",
}

@Article{Odell:1967:CFP,
  author =       "P. L. Odell and H. P. Decell",
  title =        "On Computing the Fixed-Point Probability Vector of
                 Ergodic Transition Matrices",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "765--768",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:45:12 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brush:1967:SOD,
  author =       "D. G. Brush and J. J. Kohfeld and G. T. Thompson",
  title =        "Solution of Ordinary Differential Equations Using Two
                 ``Off-Step'' Points",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "769--784",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 04 00:12:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{VanGelder:1967:SNR,
  author =       "A. {Van Gelder}",
  title =        "Some New Results in Pseudo-Random Number Generation",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "785--792",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321420.321437",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:50:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/bibnet/authors/m/marsaglia-george.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "Pseudo-random number generators of the power residue
                 (sometimes called congruential or multiplicative) type
                 are discussed and results of statistical tests
                 performed on specific examples of this type are
                 presented. Tests were patterned after the methods of
                 MacLaren and Marsaglia (M\&M). The main result
                 presented is the discovery of several power residue
                 generators which performed well in these tests. This is
                 important because, of all the generators using standard
                 methods (including power residue) that were tested by
                 M\&M, none gave satisfactory results. The overall
                 results here provide further evidence for their
                 conclusion that the types of tests usually encountered
                 in the literature do not provide an adequate index of
                 the behavior of $n$-tuples of consecutively generated
                 numbers. In any Monte Carlo or simulation problem where
                 $n$ supposedly independent random numbers are required
                 at each step, this behavior is likely to be important.
                 Finally, since the tests presented here differ in
                 certain details from those of M\&M, some of their
                 generators were retested as a check. A cross-check
                 shows that results are compatible; in particular, if a
                 generator failed one of their tests badly, it also
                 failed the present author's corresponding test badly.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Winograd:1967:TRP,
  author =       "S. Winograd",
  title =        "On the Time Required to Perform Multiplication",
  journal =      j-J-ACM,
  volume =       "14",
  number =       "4",
  pages =        "793--802",
  month =        oct,
  year =         "1967",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wilkes:1968:CTN,
  author =       "Maurice V. Wilkes",
  title =        "Computers Then and Now",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "1",
  pages =        "1--7",
  month =        jan,
  year =         "1968",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321439.321440",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:45:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Reminiscences on the early developments leading to
                 large scale electronic computers show that it took much
                 longer than was expected for the first of the more
                 ambitious and fully engineered computers to be
                 completed and prove themselves in practical operation.
                 Comments on the present computer field assess the needs
                 for future development.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  remark =       "This is the 1967 ACM Turing Award Lecture.",
}

@Article{Salton:1968:CEI,
  author =       "G. Salton and M. E. Lesk",
  title =        "Computer Evaluation of Indexing and Text Processing",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "1",
  pages =        "8--36",
  month =        jan,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wirth:1968:PPL,
  author =       "Niklaus Wirth",
  title =        "{PL360}, a Programming Language for the 360
                 Computers",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "1",
  pages =        "37--74",
  month =        jan,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:10:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Wirth:1968:CPP}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Echols:1968:SIL,
  author =       "Robert E. Echols and Leon Cooper",
  title =        "Solution of Integer Linear Programming Problems by
                 Direct Search",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "1",
  pages =        "75--84",
  month =        jan,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:45:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Slagle:1968:EMT,
  author =       "James R. Slagle and Philip Bursky",
  title =        "Experiments With a Multipurpose, Theorem-Proving
                 Heuristic Program",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "1",
  pages =        "85--99",
  month =        jan,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:21:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Strand:1968:SEN,
  author =       "Otto Neall Strand and Ed R. Westwater",
  title =        "Statistical Estimation of the Numerical Solution of a
                 {Fredholm} Integral Equation of the First Kind",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "1",
  pages =        "100--114",
  month =        jan,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:46:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dubner:1968:NIL,
  author =       "H. Dubner and J. Abate",
  title =        "Numerical Inversion of {Laplace} Transforms by
                 Relating Them to the Finite {Fourier} Cosine
                 Transform",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "1",
  pages =        "115--123",
  month =        jan,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 8 22:02:07 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "In this paper the problem of readily determining the
                 inverse La-place transform numerically is discussed.
                 Because the resultant inverse function is given as a
                 Fourier cosine series, the procedure requires only
                 about ten FORTRAN statements and uses only cosines and
                 exponentials. The basis of the method hinges on the
                 fact that in evaluating the inverse Laplace transform
                 integral there exists a freedom in choosing the contour
                 of integration.",
  descriptors =  "Laplace transform; numerical method",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kaplan:1968:SCR,
  author =       "Donald M. Kaplan",
  title =        "Some Completeness Results in the Mathematical Theory
                 of Computation",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "1",
  pages =        "124--134",
  month =        jan,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/Constr.logic.prog.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bavel:1968:STP,
  author =       "Zamir Bavel",
  title =        "Structure and Transition-Preserving Functions of
                 Finite Automata",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "1",
  pages =        "135--158",
  month =        jan,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Waksman:1968:PN,
  author =       "Abraham Waksman",
  title =        "A Permutation Network",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "1",
  pages =        "159--163",
  month =        jan,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:00:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Waksman:1968:CPN}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sklansky:1968:FPT,
  author =       "J. Sklansky and M. Finkelstein and E. C. Russell",
  title =        "A Formalism for Program Translation",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "165--175",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gilmore:1968:SPA,
  author =       "P. A. Gilmore",
  title =        "Structuring of Parallel Algorithms",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "176--192",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/OVR.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kubert:1968:PRF,
  author =       "B. Kubert and J. Szabo and S. Guilieri",
  title =        "The Perspective Representation of Functions of Two
                 Variables",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "193--204",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "height field",
}

@Article{Morse:1968:MMA,
  author =       "Stephen P. Morse",
  title =        "A Mathematical Model for the Analysis of Contour-Line
                 Data",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "205--220",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 5 23:40:35 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Orden:1968:BSA,
  author =       "A. Orden and V. Nalbandian",
  title =        "A Bidirectional Simplex Algorithm",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "221--235",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 5 23:41:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Loveland:1968:MTP,
  author =       "Donald W. Loveland",
  title =        "Mechanical Theorem-Proving by Model Elimination",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "236--251",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 18:45:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Loveland:1969:EMT}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pease:1968:AFF,
  author =       "Marshall C. Pease",
  title =        "An Adaptation of the Fast {Fourier} Transform for
                 Parallel Processing",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "252--264",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 5 19:46:47 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Zeleznik:1968:QNM,
  author =       "Frank J. Zeleznik",
  title =        "Quasi-{Newton} Methods for Nonlinear Equations",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "265--271",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Morris:1968:CSM,
  author =       "Gerald L. Morris and Patrick L. Odell",
  title =        "Common Solutions for $n$ Matrix Equations With
                 Applications",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "272--274",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aberth:1968:ACN,
  author =       "Oliver Aberth",
  title =        "Analysis in the Computable Number Field",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "275--299",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Schutzenberger:1968:RAS,
  author =       "Marcel Paul Sch{\"{u}}tzenberger",
  title =        "A Remark on Acceptable Sets of Numbers",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "300--303",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yeh:1968:GPA,
  author =       "Raymond T. Yeh",
  title =        "Generalized Pair Algebra With Applications to Automata
                 Theory",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "304--316",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hopcroft:1968:DUQ,
  author =       "J. E. Hopcroft and J. D. Ullman",
  title =        "Decidable and Undecidable Questions About Automata",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "317--324",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 21:24:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hartmanis:1968:CCO,
  author =       "J. Hartmanis",
  title =        "Computational Complexity of One-Tape {Turing} Machine
                 Computations",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "325--339",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Waksman:1968:CPN,
  author =       "Abraham Waksman",
  title =        "Corrigendum: ``{A} Permutation Network''",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "2",
  pages =        "340--340",
  month =        apr,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 21:25:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Waksman:1968:PN}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Coffman:1968:ATT,
  author =       "E. G. {Coffman, Jr.}",
  title =        "Analysis of Two Time-Sharing Algorithms Designed for
                 Limited Swapping",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "341--353",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Oct 23 00:15:58 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Time-sharing algorithms are discussed which are
                 designed primarily for the reduction of swapping
                 without intolerable changes in the waiting time
                 distributions. A particular class of such algo-rithms
                 in which conventional procedures are modified by making
                 the quantum allocation dependent on input activity is a
                 given a more detailed treatment. Queueing models
                 corresponding to these algorithms are devised and then
                 analyzed for obtaining the wait.t",
  descriptors =  "Analysis; time sharing; algorithm; queueing system;
                 model; waiting time",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Comba:1968:PDI,
  author =       "Paul G. Comba",
  title =        "A Procedure for Detecting Intersections of
                 Three-Dimensional Objects",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "354--366",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Andrews:1968:RM,
  author =       "Peter B. Andrews",
  title =        "Resolution With Merging",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "367--381",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 21:21:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Andrews:1968:CCR}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hartmanis:1968:RPA,
  author =       "J. Hartmanis and H. Shank",
  title =        "On the Recognition of Primes by Automata",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "382--389",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kohfeld:1968:MNM,
  author =       "J. J. Kohfeld and G. T. Thompson",
  title =        "A Modification of {Nordsieck}'s method Using an
                 ``Off-Step'' Point",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "390--401",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Zielke:1968:IMS,
  author =       "Gerhard Zielke",
  title =        "Inversion of Modified Symmetric Matrices",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "402--408",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Griffiths:1968:UEP,
  author =       "T. V. Griffiths",
  title =        "The Unsolvability of the Equivalence Problem for
                 ${\Lambda}$-Free Nondeterministic Generalized
                 Machines",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "409--413",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hopcroft:1968:RBT,
  author =       "John E. Hopcroft and Jeffrey D. Ullman",
  title =        "Relations Between Time and Tape Complexities",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "414--427",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 21:24:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1968:OWN,
  author =       "Seymour Ginsburg and Michael A. Harrison",
  title =        "One-Way Nondeterministic Real-Time List-Storage
                 Languages",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "428--446",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chartres:1968:USD,
  author =       "B. A. Chartres and J. J. Florentin",
  title =        "A Universal Syntax-Directed Top-Down Analyzer",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "447--464",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:47:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lewis:1968:SDT,
  author =       "P. M. {Lewis II} and R. E. Stearns",
  title =        "Syntax-Directed Transduction",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "3",
  pages =        "465--488",
  month =        jul,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:47:46 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wirth:1968:CPP,
  author =       "Niklaus Wirth",
  title =        "Corrigendum: ``{PL360}, a Programming Language for
                 the 360 Computers''",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "489--489",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:00:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Wirth:1968:PPL}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1968:CJA,
  author =       "Anonymous",
  title =        "Contributions to the {Journal of the Association for
                 Computing Machinery}; {ACM} Author Instructions for
                 Manuscript Documentation Unit; Categories of the
                 Computing Sciences",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "490--492",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 05 23:48:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gotlieb:1968:SCI,
  author =       "C. C. Gotlieb and S. Kumar",
  title =        "Semantic Clustering of Index Terms",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "493--513",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Morrison:1968:PPA,
  author =       "Donald R. Morrison",
  title =        "{PATRICIA}--Practical Algorithm To Retrieve
                 Information Coded in Alphanumeric",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "514--534",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:21:57 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Trie structure based on character keys for branching.
                 Keys are abbreviated. Structure is primary memory
                 oriented.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lowe:1968:IDB,
  author =       "Thomas C. Lowe",
  title =        "The Influence of Data Base Characteristics and Usage
                 on Direct Access File Organization",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "535--548",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 5 23:50:07 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Analysis of text data files using an index or linkage
                 to index terms.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Coffman:1968:FQM,
  author =       "Edward G. Coffman and Leonard Kleinrock",
  title =        "Feedback Queueing Models for Time-Shared Systems",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "549--576",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 5 23:50:40 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Time-shared processing systems are studied by
                 considering priority disciplines operating in a
                 stochastic environment. Results are obtained for the
                 average time spent in the system, conditioned on the
                 length of required service. Two distinct feedback
                 models with a single quantum-controlled service are
                 considered. The first is a round-robin (RR) system and
                 the second is a feedback (FBn) system with $N$
                 queues.",
  descriptors =  "Feedback queue; model; analysis; priority; round
                 robin; time sharing; computer system",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Abate:1968:QAI,
  author =       "Joseph Abate and Harvey Dubner and Sheldon B.
                 Weinberg",
  title =        "Queueing Analysis of the {IBM 2314} Disk Storage
                 Facility",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "577--589",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 12 22:26:11 1981",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Os/storage.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Queueing",
}

@Article{Reiter:1968:SPC,
  author =       "Raymond Reiter",
  title =        "Scheduling Parallel Computations",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "590--599",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:48:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Montanari:1968:MOS,
  author =       "U. Montanari",
  title =        "A Method for Obtaining Skeletons Using a
                 Quasi-{Euclidean} Distance",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "600--624",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Quinlan:1968:FDP,
  author =       "J. R. Quinlan and E. B. Hunt",
  title =        "A Formal Deductive Problem-Solving System",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "625--646",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aho:1968:IGE,
  author =       "Alfred V. Aho",
  title =        "Indexed Grammars --- An Extension of Context-Free
                 Grammars",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "647--671",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:26:59 1998",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenberg:1968:IRT,
  author =       "Arnold L. Rosenberg",
  title =        "On the Independence of Real-Time Definability and
                 Certain Structural Properties of Context-Free
                 Languages",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "672--679",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cudia:1968:DUF,
  author =       "Dennis F. Cudia and Wilson E. Singletary",
  title =        "Degrees of Unsolvability in Formal Grammars",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "680--692",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:22:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mukhopadhyay:1968:REN,
  author =       "Amar Mukhopadhyay",
  title =        "Representation of Events in the {von Neumann} Cellular
                 Model",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "693--705",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Karim:1968:TSG,
  author =       "Abbas I. Abdel Karim",
  title =        "A Theorem for the Stability of General
                 Predictor-Corrector Methods for the Solution of Systems
                 of Differential Equations",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "706--711",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dyer:1968:GMM,
  author =       "James Dyer",
  title =        "Generalized Multistep Methods in Satellite Orbit
                 Computation",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "712--719",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:10:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Andrews:1968:CCR,
  author =       "Peter B. Andrews",
  title =        "A Correction Concerning Resolution",
  journal =      j-J-ACM,
  volume =       "15",
  number =       "4",
  pages =        "720--720",
  month =        oct,
  year =         "1968",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 21:23:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Andrews:1968:RM}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Salton:1969:PJ,
  author =       "G. Salton",
  title =        "A Policy for {JACM}",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 00:14:28 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hamming:1969:OMV,
  author =       "R. W. Hamming",
  title =        "One Man's View of Computer Science",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "3--12",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321495.321497",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:49:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A number of observations and comments are directed
                 toward suggesting that more than the usual engineering
                 flavor be given to computer science. The engineering
                 aspect is important because most present difficulties
                 in this field do not involve the theoretical question
                 of whether certain things can be done, but rather the
                 practical question of how can they be accomplished well
                 and simply. The teaching of computer science could be
                 made more effective by various alterations, for
                 example, the inclusion of a laboratory course in
                 programming, the requirement for a strong minor in
                 something other than mathematics, and more practical
                 coding and less abstract theory, as well as more
                 seriousness and less game playing.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  remark =       "This is the 1968 ACM Turing Award Lecture.",
}

@Article{Brown:1969:MSC,
  author =       "W. S. Brown and J. F. Traub",
  title =        "{MERCURY}: a System for the Computer-Aided
                 Distribution of Technical Reports",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "13--25",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kochen:1969:AQA,
  author =       "Manfred Kochen",
  title =        "Automatic Question-Answering of {English}-Like
                 Questions About Simple Diagrams",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "26--48",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Guard:1969:SAM,
  author =       "J. R. Guard and F. C. Oglesby and J. H. Bennett and L.
                 G. Settle",
  title =        "Semi-Automated Mathematics",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "49--62",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Trauboth:1969:RFE,
  author =       "H. H. Trauboth",
  title =        "Recursive Formulas for the Evaluation of the
                 Convolution Integral",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "63--72",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Coffman:1969:ADI,
  author =       "E. G. {Coffman, Jr.}",
  title =        "Analysis of a Drum Input\slash Output Queue Under
                 Scheduled Operation in a Paged Computer System",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "73--90",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:49:28 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "In this paper magnetic drums in the role of auxiliary
                 memories are studied in the context of multiprogramming
                 systems featuring a paged environment. Mathematical
                 models are defined such that two extremes in scheduling
                 disciplines are represented in a sys-tem in which page
                 requests are assumed to arrive singly and at random.
                 The analysis leads to results for a measure of drum
                 uti-lization and a generating function for the queue
                 length probab.",
  descriptors =  "Analysis; scheduling; mathematical model; generating
                 function; queue length; waiting time",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Greibach:1969:IHC,
  author =       "Sheila A. Greibach",
  title =        "An Infinite Hierarchy of Context-Free Languages",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "91--106",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:49:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenkrantz:1969:PGC,
  author =       "Daniel J. Rosenkrantz",
  title =        "Programmed Grammars and Classes of Formal Languages",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "107--131",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:49:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brzozowski:1969:DRE,
  author =       "J. A. Brzozowski and Rina Cohen",
  title =        "On Decompositions of Regular Events",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "132--144",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chaitin:1969:LPC,
  author =       "Gregory J. Chaitin",
  title =        "On the Length of Programs for Computing Finite Binary
                 Sequences: {Statistical} Considerations",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "145--159",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321495.321506",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:05:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "An attempt is made to carry out a program (outlined in
                 a previous paper) for defining the concept of a random
                 or patternless, finite binary sequence, and for
                 subsequently defining a random or patternless, infinite
                 binary sequence to be a sequence whose initial segments
                 are all random or patternless finite binary sequences.
                 A definition based on the bounded-transfer Turing
                 machine is given detailed study, but insufficient
                 understanding of this computing machine precludes a
                 complete treatment. A computing machine is introduced
                 which avoids these difficulties.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hartmanis:1969:CUP,
  author =       "J. Hartmanis",
  title =        "On the Complexity of Undecidable Problems in Automata
                 Theory",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "160--167",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hopcroft:1969:SRT,
  author =       "J. E. Hopcroft and J. D. Ullman",
  title =        "Some Results on Tape-Bounded {Turing} Machines",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "168--177",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Waksman:1969:MR,
  author =       "Abraham Waksman",
  title =        "A Model of Replication",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "1",
  pages =        "178--188",
  month =        jan,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/alife.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Slagle:1969:ESP,
  author =       "James H. Slagle and John K. Dixon",
  title =        "Experiments With Some Programs That Search Game
                 Trees",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "189--207",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/tree-search.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Grzymala-Busse:1969:APA,
  author =       "Jerzy W. Grzymala-Busse",
  title =        "Automorphisms of Polyadic Automata",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "208--219",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:07:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Grzymala-Busse:1969:EAP}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Meyer:1969:NSF,
  author =       "Albert R. Meyer",
  title =        "A Note on Star-Free Events",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "220--225",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Reynolds:1969:SGR,
  author =       "B. G. Reynolds and W. F. Cutlip",
  title =        "Synchronization and General Repetitive Machines, with
                 Applications to Ultimate Definite Automata",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "226--234",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Spira:1969:TRG,
  author =       "Philip M. Spira",
  title =        "The Time Required for Group Multiplication",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "235--243",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Manna:1969:PPF,
  author =       "Zohar Manna",
  title =        "Properties of Programs and the First-Order Predicate
                 Calculus",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "244--255",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Maurer:1969:DPI,
  author =       "Herman A. Maurer",
  title =        "A Direct Proof of the Inherent Ambiguity of a Simple
                 Context-Free Language",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "256--260",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wegner:1969:TNF,
  author =       "Peter Wegner",
  title =        "Translation Networks and Function Composition",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "261--263",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Edmundson:1969:NMA,
  author =       "H. P. Edmundson",
  title =        "New Methods in Automatic Extracting",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "264--285",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Berman:1969:LAM,
  author =       "Gerald Berman",
  title =        "Lattice Approximations to the Minima of Functions of
                 Several Variables",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "286--294",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Linz:1969:LMM,
  author =       "Peter Linz",
  title =        "Linear Multistep Methods for {Volterra}
                 Integro-Differential Equations",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "295--301",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pease:1969:IMP,
  author =       "Marshall C. Pease",
  title =        "Inversion of Matrices by Partitioning",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "302--314",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:27:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Adiri:1969:TSQ,
  author =       "I. Adiri and B. Avi-Itzhak",
  title =        "A Time-Sharing Queue with a Finite Number of
                 Customers",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "315--323",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A time-sharing queue serving a finite number of
                 customers is described. It is assumed that the service
                 time and the time elapsing between termination of
                 service and the next arrival of the same customer at
                 the queue (service station) are exponential. Some
                 results are presented in terms of steady-state
                 expectations",
  descriptors =  "Analysis; time sharing; queueing system; Markov
                 process",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{DiPaola:1969:RUD,
  author =       "Robert A. {Di Paola}",
  title =        "The Recursive Unsolvability of the Decision Problem
                 for the Class of Definite Formulas",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "324--327",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:50:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Young:1969:TTE,
  author =       "Paul R. Young",
  title =        "Toward a Theory of Enumerations",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "2",
  pages =        "328--348",
  month =        apr,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Loveland:1969:SFM,
  author =       "D. W. Loveland",
  title =        "A Simplified Format for the Model Elimination
                 Theorem-Proving Procedure",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "349--363",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 18:45:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sandewall:1969:PPS,
  author =       "Erik J. Sandewall",
  title =        "A Planning Problem Solver Based on Look-Ahead in
                 Stochastic Game Trees",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "364--382",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aho:1969:NSA,
  author =       "Alfred V. Aho",
  title =        "Nested Stack Automata",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "383--406",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chaitin:1969:SSP,
  author =       "Gregory J. Chaitin",
  title =        "On the Simplicity and Speed of Programs for Computing
                 Infinite Sets of Natural Numbers",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "407--422",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:05:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kasami:1969:SAP,
  author =       "T. Kasami and K. Torii",
  title =        "A Syntax-Analysis Procedure for Unambiguous
                 Context-Free Grammars",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "423--431",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Grzymala-Busse:1969:PRR,
  author =       "Jerzy W. Grzymala-Busse",
  title =        "On the Periodic Representations and the Reducibility
                 of Periodic Automata",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "432--441",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun May 02 10:01:51 1999",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also
                 \cite{Grzymala-Busse:1969:PRR,Grzymala-Busse:1970:EPR}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Liu:1969:LFP,
  author =       "C. L. Liu",
  title =        "Lattice Functions, Pair Algebras, and Finite-State
                 Machines",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "442--454",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Moyles:1969:AFM,
  author =       "Dennis M. Moyles and Gerald L. Thompson",
  title =        "An Algorithm for Finding a Minimum Equivalent Graph of
                 a Digraph",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "455--460",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Reed:1969:GSR,
  author =       "I. S. Reed and Rein Turn",
  title =        "A Generalization of Shift-Register Sequence
                 Generators",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "461--473",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pease:1969:OLS,
  author =       "Marshall C. Pease",
  title =        "Organization of Large Scale {Fourier} Processors",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "474--482",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:27:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lyness:1969:NAS,
  author =       "J. N. Lyness",
  title =        "Notes on the Adaptive {Simpson} Quadrature Routine",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "483--495",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rahme:1969:NLN,
  author =       "H. S. Rahme",
  title =        "A New Look at the Numerical Integration of Ordinary
                 Differential Equations",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "496--506",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tal:1969:MDO,
  author =       "A. Tal",
  title =        "On Monotone Decomposable Operators",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "507--510",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shimizu:1969:SAM,
  author =       "Tamio Shimizu",
  title =        "A Stochastic Approximation Method for Optimization
                 Problems",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "3",
  pages =        "511--516",
  month =        jul,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ernst:1969:SCS,
  author =       "George W. Ernst",
  title =        "Sufficient Conditions for the Success of {GPS}",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "517--533",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Montanari:1969:CSD,
  author =       "Ugo Montanari",
  title =        "Continuous Skeletons from Digitized Images",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "534--549",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 5 19:50:25 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ullman:1969:HSA,
  author =       "J. D. Ullman",
  title =        "Halting Stack Automata",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "550--563",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gibbs:1969:CGA,
  author =       "Norman E. Gibbs",
  title =        "A Cycle Generation Algorithm for Finite Undirected
                 Linear Graphs",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "564--568",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ghosh:1969:FOS,
  author =       "S. P. Ghosh and M. E. Senko",
  title =        "File Organization: {On} the Selection of Random Access
                 Index Points for Sequential Files",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "569--579",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Btrees with probing.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Loizou:1969:NJC,
  author =       "Georghios Loizou",
  title =        "Nonnormality and {Jordan} Condition Numbers of
                 Matrices",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "580--584",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "condition; eig; la; nonormal matrix; pert",
}

@Article{Zafarullah:1969:FDS,
  author =       "A. Zafarullah",
  title =        "Finite Difference Scheme for a Third Boundary Value
                 Problem",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "585--591",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Zohar:1969:TMI,
  author =       "Shalhav Zohar",
  title =        "{Toeplitz} Matrix Inversion: {The} Algorithm of {W. F.
                 Trench}",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "592--601",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "inverse matrix; nla; Toeplitz matrix",
}

@Article{Frank:1969:AOD,
  author =       "H. Frank",
  title =        "Analysis and Optimization of Disk Storage Devices for
                 Time-Sharing Systems",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "602--620",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Oct 9 14:51:24 1981",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Analysis of seek times and queuing.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "memory hierarchy; Performance Evaluation",
}

@Article{DiPaola:1969:RSS,
  author =       "Robert A. {Di Paola}",
  title =        "Random Sets in Subrecursive Hierarchies",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "621--630",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 00:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Adiri:1969:CTS,
  author =       "Igal Adiri",
  title =        "Computer Time-Sharing Queues with Priorities",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "631--645",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 5 19:50:34 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/Pre.1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The paper deals with computer time-sharing disciplines
                 in which external priorities are introduced. For a
                 computer system under a time-sharing discipline, the
                 following priority disciplines are discussed: (a)
                 head-of-the-line; (b) preemptive repeat; and (c) mixed
                 preemptive strategy. All models in question assume that
                 customers arrive according to homogeneous Poisson
                 processes. Results are given in terms of steady-state
                 expectations.",
  descriptors =  "Time sharing; queueing system; priority",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Coffman:1969:EAD,
  author =       "E. G. {Coffman, Jr.}",
  title =        "Errata: ``{Analysis} of a Drum Input\slash Output
                 Queue Under Scheduled Operation in a Paged Computer
                 System''",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "646--646",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 16:03:16 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Grzymala-Busse:1969:EAP,
  author =       "Jerzy W. Grzymala-Busse",
  title =        "Errata: ``{Automorphisms} of Polyadic Automata''",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "646--646",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:26:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Grzymala-Busse:1969:APA}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Loveland:1969:EMT,
  author =       "Donald W. Loveland",
  title =        "Errata: ``{Mechanical} Theorem-Proving by Model
                 Elimination''",
  journal =      j-J-ACM,
  volume =       "16",
  number =       "4",
  pages =        "646--646",
  month =        oct,
  year =         "1969",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:50:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Loveland:1968:MTP}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Salton:1970:RAJ,
  author =       "G. Salton",
  title =        "On the Role of the {ACM Journal}",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 11:16:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1970:TWB,
  author =       "Seymour Ginsburg and John Hopcroft",
  title =        "Two-Way Balloon Automata and {AFL}",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "3--13",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:52:24 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Colmerauer:1970:TPR,
  author =       "Alain Colmerauer",
  title =        "Total Precedence Relations",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "14--30",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:52:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cudia:1970:GPF,
  author =       "Dennis F. Cudia",
  title =        "General Problems of Formal Grammars",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "31--43",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:25:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenberg:1970:NAC,
  author =       "Arnold L. Rosenberg",
  title =        "A Note on Ambiguity of Context-Free Languages and
                 Presentations of Semilinear Sets",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "44--50",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:52:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Corneil:1970:EAG,
  author =       "D. G. Corneil and C. C. Gotlieb",
  title =        "An Efficient Algorithm for Graph Isomorphism",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "51--64",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:16 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gurk:1970:SRI,
  author =       "Herbert M. Gurk and Jack Minker",
  title =        "Storage Requirements for Information Handling
                 Centers",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "65--77",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 22:01:49 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chand:1970:ACP,
  author =       "Donald R. Chand and Sham S. Kapur",
  title =        "An Algorithm for Convex Polytopes",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "78--86",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:18 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gustavson:1970:SGO,
  author =       "F. G. Gustavson and W. Liniger and R. Willoughby",
  title =        "Symbolic Generation of an Optimal {Crout} Algorithm
                 for Sparse Systems of Linear Equations",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "87--109",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "lud; nla; pivoting; sparse",
}

@Article{Meyer:1970:NLS,
  author =       "C. D. Meyer and R. J. Painter",
  title =        "Note on a Least Squares Inverse for a Matrix",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "110--112",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chang:1970:ASC,
  author =       "S. K. Chang and A. Gill",
  title =        "Algorithmic Solution of the Change-Making Problem",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "113--122",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Coffman:1970:WTD,
  author =       "E. G. {Coffman, Jr.} and R. R. Muntz and H. Trotter",
  title =        "Waiting Time Distributions for Processor-Sharing
                 Systems",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "123--130",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rasch:1970:QTS,
  author =       "Philip J. Rasch",
  title =        "A Queueing Theory Study of Round-Robin Scheduling of
                 Time-Shared Computer Systems",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "131--145",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "(VBI-000103)",
  descriptors =  "Time sharing; round robin",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenfeld:1970:CDP,
  author =       "Azriel Rosenfeld",
  title =        "Connectivity in Digital Pictures",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "146--160",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:32 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sklansky:1970:TCO,
  author =       "J. Sklansky",
  title =        "Thresholded Convolution Operations",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "161--165",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Breuer:1970:SCP,
  author =       "M. A. Breuer",
  title =        "Simplification of the Covering Problem with
                 Application to {Boolean} Expressions",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "166--181",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:37 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stone:1970:AMP,
  author =       "Harold S. Stone",
  title =        "An Algorithm for Modular Partitioning",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "1",
  pages =        "182--195",
  month =        jan,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:51:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Minsky:1970:FCC,
  author =       "Marvin L. Minsky",
  title =        "Form and Content in Computer Science",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "197--215",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321574.321575",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 5 19:52:01 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  remark =       "This is the 1969 ACM Turing Award Lecture.",
}

@Article{Nevins:1970:PLA,
  author =       "Arthur J. Nevins",
  title =        "A Programming Language with Automatic Goal Generation
                 and Selection",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "216--230",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:44 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bavel:1970:CRA,
  author =       "Zamir Bavel and David E. Muller",
  title =        "Connectivity and Reversibility in Automata",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "231--240",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Willis:1970:CCP,
  author =       "David G. Willis",
  title =        "Computational Complexity and Probability
                 Constructions",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "241--259",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Andrews:1970:KMC,
  author =       "H. C. Andrews and J. Kane",
  title =        "{Kronecker} Matrices, Computer Implementation, and
                 Generalized Spectra",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "260--268",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:26:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Haber:1970:SNA,
  author =       "Seymour Haber",
  title =        "Sequences of Numbers That Are Approximately Completely
                 Equidistributed",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "269--272",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321574.321580",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Henrici:1970:MSS,
  author =       "Peter Henrici",
  title =        "Methods of Search for Solving Polynomial Equations",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "273--283",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:54:55 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Lehmer's method; nlop; polynomial",
}

@Article{Rahme:1970:SAN,
  author =       "H. S. Rahme",
  title =        "Stability Analysis of a New Algorithm Used for
                 Integrating a System of Ordinary Differential
                 Equations",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "284--293",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:28:14 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Zafarullah:1970:AML,
  author =       "A. Zafarullah",
  title =        "Application of the Method of Lines to Parabolic
                 Partial Differential Equations with Error Estimates",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "294--302",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:02 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Roth:1970:ASL,
  author =       "Richard H. Roth",
  title =        "An Approach to Solving Linear Discrete Optimization
                 Problems",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "303--313",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Delbrouck:1970:FQS,
  author =       "L. E. N. Delbrouck",
  title =        "A Feedback Queueing System with Batch Arrivals, Bulk
                 Service, and Queue-Dependent Service Time",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "314--323",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Muntz:1970:PSR,
  author =       "R. R. Muntz and E. G. {Coffman, Jr.}",
  title =        "Preemptive Scheduling of Real-Time Tasks on
                 Multiprocessor Systems",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "324--338",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hodes:1970:LCG,
  author =       "Louis Hodes",
  title =        "The Logical Complexity of Geometric Properties in the
                 Plane",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "339--347",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:08 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Montanari:1970:LPD,
  author =       "G. Ugo Montanari",
  title =        "On Limit Properties in Digitization Schemes",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "348--360",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Boyle:1970:ASA,
  author =       "J. M. Boyle and A. A. Grau",
  title =        "An Algorithmic Semantics for {ALGOL 60} Identifier
                 Denotation",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "361--382",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fox:1970:ALP,
  author =       "B. L. Fox",
  title =        "Accelerating List Processing in Discrete Programming",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "383--384",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Caviness:1970:CFS,
  author =       "B. F. Caviness",
  title =        "On Canonical Forms and Simplification",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "385--396",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kagiwada:1970:IVT,
  author =       "H. H. Kagiwada and R. Kalaba",
  title =        "An Initial-Value Theory for {Fredholm} Integral
                 Equations with Semidegenerate Kernels",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "412--419",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tsuda:1970:NIM,
  author =       "Takao Tsuda and Kozo Ichida",
  title =        "Nonlinear Interpolation of Multivariable Functions by
                 the {Monte Carlo} Method",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "2",
  pages =        "420--425",
  month =        apr,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cryer:1970:ASF,
  author =       "C. W. Cryer",
  title =        "On the Approximate Solution of Free Boundary Problems
                 Using Finite Differences",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "397--411",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ramamoorthy:1970:OMH,
  author =       "C. V. Ramamoorthy and K. M. Chandy",
  title =        "Optimization of Memory Hierarchies in Multiprogrammed
                 Systems",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "426--445",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 12 12:30:13 1981",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Os/storage.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Allocate frequently used records to faster devices.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "memory hierarchy; Performance Evaluation: Analytic",
}

@Article{Shrager:1970:NRL,
  author =       "Richard I. Shrager",
  title =        "Nonlinear Regression With Linear Constraints: {An}
                 Extension of the Magnified Diagonal Method",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "446--452",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shaw:1970:PGR,
  author =       "Alan C. Shaw",
  title =        "Parsing of Graph-Representable Pictures",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "453--481",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Beus:1970:UIS,
  author =       "H. Lynn Beus",
  title =        "The Use of Information in Sorting",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "482--495",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Frazer:1970:SSA,
  author =       "W. D. Frazer and A. C. McKellar",
  title =        "{Samplesort}: a Sampling Approach to Minimal Storage
                 Tree Sorting",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "496--507",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 19:52:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stanfel:1970:TSO,
  author =       "Larry E. Stanfel",
  title =        "Tree Structures for Optimal Searching",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "508--517",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mowle:1970:CNS,
  author =       "Frederic J. Mowle",
  title =        "Controllability of Nonlinear Sequential Networks",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "518--524",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anderson:1970:LFR,
  author =       "Robert Anderson and W. W. Bledsoe",
  title =        "A Linear Format for Resolution With Merging and a New
                 Technique for Establishing Completeness",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "525--534",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Slagle:1970:ITR,
  author =       "James R. Slagle",
  title =        "Interpolation Theorems for Resolution in Lower
                 Predicate Calculus",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "535--542",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Baer:1970:LOP,
  author =       "J. L. Baer and D. P. Bovet and G. Estrin",
  title =        "Legality and Other Properties of Graph Models of
                 Computations",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "543--554",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Manna:1970:FPF,
  author =       "Zohar Manna and Amir Pnueli",
  title =        "Formalization of Properties of Functional Programs",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "3",
  pages =        "555--569",
  month =        jul,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Augustson:1970:ASG,
  author =       "J. Gary Augustson and Mack Minker",
  title =        "An Analysis of Some Graph Theoretical Cluster
                 Techniques",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "571--588",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Akima:1970:NMI,
  author =       "Hiroshi Akima",
  title =        "A New Method of Interpolation and Smooth Curve Fitting
                 Based on Local Procedures",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "589--602",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:52 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Good:1970:CIA,
  author =       "Donald I. Good and Ralph L. London",
  title =        "Computer Interval Arithmetic: {Definition} and Proof
                 of Correct Implementation",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "603--612",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gruttke:1970:PRK,
  author =       "William B. Gruttke",
  title =        "Pseudo-{Runge--Kutta} Methods of the Fifth Order",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "613--628",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hashimoto:1970:MSL,
  author =       "Masahiro Hashimoto",
  title =        "A Method for Solving Large Matrix Equations Reduced
                 from {Fredholm} Integral Equations of the Second Kind",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "629--636",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kaneko:1970:ARE,
  author =       "Toyohisa Kaneko and Bede Liu",
  title =        "Accumulation of Round-off Error in Fast {Fourier}
                 Transforms",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "637--654",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shampine:1970:EPN,
  author =       "L. F. Shampine",
  title =        "Efficiency of a Procedure for Near-Minimax
                 Approximation",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "655--660",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Smith:1970:EBZ,
  author =       "Brian T. Smith",
  title =        "Error Bounds for Zeros of a Polynomial Based Upon
                 {Gerschgorin}'s Theorems",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "661--674",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:55:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bonzon:1970:NSC,
  author =       "P. Bonzon",
  title =        "Necessary and Sufficient Conditions for Dynamic
                 Programming of Combinatorial Type",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "675--682",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:56:02 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Purdom:1970:SPB,
  author =       "Paul W. {Purdom, Jr.} and Stephen M. Stigler",
  title =        "Statistical Properties of the Buddy System",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "683--697",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:56:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chang:1970:UPI,
  author =       "C. L. Chang",
  title =        "The Unit Proof and the Input Proof in Theorem
                 Proving",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "698--707",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:56:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

%% Pages 176--176 contain ads
@Article{Pager:1970:EA,
  author =       "David Pager",
  title =        "On the Efficiency of Algorithms",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "708--714",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:56:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sethi:1970:GOC,
  author =       "Ravi Sethi and J. D. Ullman",
  title =        "The Generation of Optimal Code for Arithmetic
                 Expressions",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "715--728",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  note =         "Reprinted as pp. 229--247 in {\em Compiler
                 Techniques}, B. W. Pollack, ed., Auerbach, Princeton NJ
                 (1972).",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tsichritzis:1970:EPS,
  author =       "D. Tsichritzis",
  title =        "The Equivalence Problem of Simple Programs",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "729--738",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 11:56:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Grzymala-Busse:1970:EPR,
  author =       "Jerzy W. Grzymala-Busse",
  title =        "Errata: ``{On} the Periodic Representations and the
                 Reducibility of Periodic Automata''",
  journal =      j-J-ACM,
  volume =       "17",
  number =       "4",
  pages =        "739--739",
  month =        oct,
  year =         "1970",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:26:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Grzymala-Busse:1969:PRR}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Salton:1971:EST,
  author =       "G. Salton",
  title =        "Editorial: {Some} Thoughts on Scientific Information
                 Dissemination",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "1--3",
  month =        jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cook:1971:CPM,
  author =       "Stephen A. Cook",
  title =        "Characterizations of Pushdown Machines in Terms of
                 Time-Bounded Computers",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "4--18",
  month =        jan,
  year =         "1971",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321623.321625",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kautz:1971:ACA,
  author =       "William H. Kautz",
  title =        "An Augmented Content-Addressed Memory Array for
                 Implementation with Large-Scale Integration",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "19--33",
  month =        jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kernighan:1971:OSP,
  author =       "Brian W. Kernighan",
  title =        "Optimal Sequential Partitions of Graphs",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "34--40",
  month =        jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Abdelmalek:1971:LAD,
  author =       "Nabih N. Abdelmalek",
  title =        "Linear ${L}_1$ Approximation for a Discrete Point Set
                 and ${L}_1$ Solutions of Overdetermined Linear
                 Equations",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "41--47",
  month =        jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:46 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Benschop:1971:MSE,
  author =       "N. F. Benschop and H. C. Ratz",
  title =        "A Mean Square Estimate of the Generated Roundoff Error
                 in Constant Matrix Iterative Processes",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "48--62",
  month =        jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cryer:1971:TPA,
  author =       "Colin W. Cryer",
  title =        "Topological Problems Arising When Solving Boundary
                 Value Problems for Elliptic Partial Differential
                 Equations by the Method of Finite Differences",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "63--74",
  month =        jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:55 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dill:1971:GSS,
  author =       "C. Dill and C. W. Gear",
  title =        "A Graphical Search for Stiffly Stable Methods for
                 Ordinary Differential Equations",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "75--79",
  month =        jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:55 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aho:1971:POP,
  author =       "Alfred V. Aho and Peter J. Denning and Jeffrey D.
                 Ullman",
  title =        "Principles of Optimal Page Replacement",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "80--93",
  month =        jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 10 15:22:50 1981",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Os/storage.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "MH Software",
}

@Article{Philippatos:1971:ECI,
  author =       "G. C. Philippatos and D. R. Moscato",
  title =        "Effects of Constrained Information on Player Decisions
                 in Experimental Business Simulation: {Some} Empirical
                 Evidence",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "94--104",
  month =        Jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alexander:1971:BCD,
  author =       "J. C. Alexander and A. I. Thaler",
  title =        "The Boundary Count of Digital Pictures",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "105--112",
  month =        Jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hueckel:1971:OWL,
  author =       "Manfred H. Hueckel",
  title =        "An Operator Which Locates Edges in Digitized
                 Pictures",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "113--125",
  month =        Jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chang:1971:CLR,
  author =       "C. L. Chang and J. R. Slagle",
  title =        "Completeness of Linear Refutation for Theories with
                 Equality",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "126--136",
  month =        Jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harrison:1971:GCO,
  author =       "Michael A. Harrison and Mario Schkolnick",
  title =        "A Grammatical Characterization of One-Way
                 Nondeterministic Stack Languages",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "148--172",
  month =        Jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:55 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goffman:1971:MMA,
  author =       "William Goffman",
  title =        "A Mathematical Method for Analyzing the Growth of a
                 Scientific Discipline",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "173--185",
  month =        Jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:55 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gaver:1971:PMB,
  author =       "Donald P. {Gaver, Jr.} and Peter A. W. Lewis",
  title =        "Probability Models for Buffer Storage Allocation
                 Problems",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "186--198",
  month =        Jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 9 01:30:58 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1971.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "This paper considers some of the issues that arise
                 when messages or jobs inbound to a computer facility
                 are buffered prior to being processed. Models are
                 developed that describe (a) the results of blocking a
                 single memory unit for the use of diverse messages, (b)
                 the occupancy behavior of a buffer that is tied to a
                 single message source, and (c) the occupancy of a
                 buffer dynamically shared among many independent
                 sources.",
  descriptors =  "Buffer memory; queueing system; evaluation",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lewis:1971:CQM,
  author =       "P. A. W. Lewis and G. S. Shedler",
  title =        "A Cyclic-Queue Model of System Overhead in
                 Multiprogrammed Computer Systems",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "1",
  pages =        "199--220",
  month =        Jan,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 23:20:10 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1971.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A probabilistic model is presented of a
                 multiprogrammed computer system operating under demand
                 paging. The model contains an explicit representation
                 of system overhead, the CPU requirements and paging
                 characteristics of the program load being described
                 statistically. Expressions for steady-state CPU problem
                 program time, CPU overhead time, and channel
                 utilization are obtained. Some numerical results are
                 which quantify the gains in CPU utilization \ldots{}.",
  descriptors =  "Memory management; multiprogramming; overhead time;
                 utilization; numerical method; heuristics; loop queue;
                 channel utilization",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wilkinson:1971:SCN,
  author =       "J. H. Wilkinson",
  title =        "Some Comments from a Numerical Analyst",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "2",
  pages =        "137--147",
  month =        apr,
  year =         "1971",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321637.321638",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:00:46 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  remark =       "This is the 1970 ACM Turing Award Lecture. Subsequent
                 lectures are published in {\em Communications of the
                 ACM}. Wilkinson comments ``It is perhaps salutary to be
                 reminded that as early as 1946 Turing had considered
                 the possibility of working with both interval and
                 significant digit arithmetic and the report recalled
                 forgotten conversations, not to mention heated
                 arguments, which we had on this topic.'' He also says
                 ``I think it is of vital importance that all the work
                 that has been expended on the development of
                 satisfactory algorithms should be made fully available
                 to the people who need to use it. I would go further
                 than this and claim that it is a social duty to see
                 that this is achieved.''",
}

@Article{Bhat:1971:BPA,
  author =       "U. Narayan Bhat and Richard E. Nance",
  title =        "Busy Period Analysis of a Time-Sharing System Modeled
                 as a Semi-{Markov} Process",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "2",
  pages =        "221--238",
  month =        apr,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 9 00:04:23 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1971.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "\ldots{} working from the model of task completions as
                 a semi-Markov process, the busy period distribution of
                 the central processor is derived in terms of its
                 Laplace--Stieltjes transforms. Limiting behavior of the
                 process describing the number of tasks in queue is
                 developed for arbitrary time points as well as task
                 completion epochs. While the latter has been given in
                 earlier papers, the former represents a new result.
                 \ldots{}",
  descriptors =  "Busy period; feedback; time sharing; semi Markov
                 process; utilization; analytical model",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mylopoulos:1971:TPQa,
  author =       "J. P. Mylopoulos and T. Pavlidis",
  title =        "On the Topological Properties of Quantized Spaces.
                 {I}. The Notion of Dimension",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "2",
  pages =        "239--246",
  month =        apr,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:53:01 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mylopoulos:1971:TPQb,
  author =       "J. P. Mylopoulos and T. Pavlidis",
  title =        "On the Topological Properties of Quantized Spaces.
                 {II}. Connectivity and Order of Connectivity",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "2",
  pages =        "247--254",
  month =        apr,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:53:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Steffanelli:1971:SPT,
  author =       "R. Steffanelli and A. Rosenfeld",
  title =        "Some Parallel Thinning Algorithms for Digital
                 Pictures",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "2",
  pages =        "255--264",
  month =        apr,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Winder:1971:CPT,
  author =       "Robert O. Winder",
  title =        "{Chow} Parameters in Threshold Logic",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "2",
  pages =        "265--289",
  month =        apr,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blum:1971:EPS,
  author =       "Manuel Blum",
  title =        "On Effective Procedures for Speeding Up Algorithms",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "2",
  pages =        "290--305",
  month =        apr,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cole:1971:DPS,
  author =       "Stephen N. Cole",
  title =        "Deterministic Pushdown Store Machines and Real-Time
                 Computation",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "2",
  pages =        "306--328",
  month =        apr,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Case:1971:NDS,
  author =       "John Case",
  title =        "A Note on Degrees of Self-Describing {Turing}
                 Machines",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "329--338",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 00:24:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Smith:1971:SCU,
  author =       "Alvy Ray {Smith III}",
  title =        "Simple Computation-Universal Cellular Spaces",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "339--353",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 00:04:29 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/cellular.automata.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Proof that 1D cellular automata are capable of
                 supporting universal computation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Simon:1971:OSS,
  author =       "Richard Simon and Richard C. T. Lee",
  title =        "On the Optimal Solutions to {\sc AND\slash OR}
                 Series-Parallel Graphs",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "354--372",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mock:1971:NAN,
  author =       "M. S. Mock",
  title =        "Numerical Analysis of a Nonlinear Diffusion Problem",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "373--380",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tootill:1971:RPT,
  author =       "J. P. R. Tootill and W. D. Robinson and A. G. Adams",
  title =        "The Runs Up-and-Down Performance of {Tausworthe}
                 Pseudo-Random Number Generators",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "381--399",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321650.321657",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 22 07:42:23 2011",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1971.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Any Tausworthe generator based upon a primitive
                 trinomial over $gf(2), x^p+x^q+1$, can be represented
                 as a simple linear recurrence in $gf(2^p)$. For a
                 generator producing a sequence of $p$-bit pseudorandom
                 numbers, $(p,2^p-1)=1$, which is guaranteed by
                 Tausworthe's theory to be 1-distributed, the recurrence
                 may reveal combinatorial relationships implying a poor
                 runs up-and-down performance. This occurs when $q$ is
                 small, too near $p/2$, or nearly \ldots{}",
  descriptors =  "Tausworthe generator; shift register sequences; rng;
                 test; runtime/storage efficiency",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Burge:1971:AM,
  author =       "William H. Burge and Alan G. Konheim",
  title =        "An Accessing Model",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "400--404",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Exact solution to sector queuing in drums.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gaver:1971:ART,
  author =       "Donald P. Gaver",
  title =        "Analysis of Remote Terminal Backlogs under Heavy
                 Demand Conditions",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "405--415",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 9 00:04:35 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1971.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Models are developed to describe delays and backlogs
                 at remote terminals polled in turn by a single
                 computer. The effects modeled include transmission
                 delays caused by line noise, and the number and types
                 of terminals (passive input, and active or two-way
                 response). Use is made of the diffusion approximation
                 to state variables, the latter being especially
                 relevant when the system is heavily loaded. A limited
                 amount of mathematical and stimul",
  descriptors =  "Data network; network delay; diffusion approximation;
                 time in system; carried traffic; performance
                 evaluation; model; normal distribution; heavy load",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Robson:1971:ESS,
  author =       "J. M. Robson",
  title =        "An Estimate of the Store Size Necessary for Dynamic
                 Storage Allocation",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "416--423",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:01:19 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Related to online graph coloring.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lions:1971:SRC,
  author =       "John Lions",
  title =        "Some Results Concerning the Reduction of Binary
                 Matrices",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "424--430",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{deVries:1971:MSD,
  author =       "Ronald C. de Vries",
  title =        "Minimal Sets of Distinct Literals for a Logically
                 Passive Function",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "431--443",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hartmanis:1971:OTC,
  author =       "J. Hartmanis and J. E. Hopcroft",
  title =        "An Overview of the Theory of Computational
                 Complexity",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "3",
  pages =        "444--476",
  month =        jul,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:02:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Salton:1971:I,
  author =       "G. Salton",
  title =        "Introduction",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "477--477",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:01:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brown:1971:EAC,
  author =       "W. S. Brown",
  title =        "On {Euclid}'s Algorithm and the Computation of
                 Polynomial Greatest Common Divisors",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "478--504",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321662.321664",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:03:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brown:1971:EAT,
  author =       "W. S. Brown and J. F. Traub",
  title =        "On {Euclid}'s Algorithm and the Theory of
                 Subresultants",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "505--514",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321662.321665",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Collins:1971:CMP,
  author =       "George E. Collins",
  title =        "The Calculation of Multivariate Polynomial
                 Resultants",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "515--532",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Heindel:1971:IAA,
  author =       "Lee E. Heindel",
  title =        "Integer Arithmetic Algorithms for Polynomial Real Zero
                 Determination",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "533--548",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Martin:1971:DEA,
  author =       "William A. Martin",
  title =        "Determining the Equivalence of Algebraic Expressions
                 by Hash Coding",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "549--558",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jul 20 23:02:13 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Johnson:1971:PRZ,
  author =       "S. C. Johnson",
  title =        "On the Problem of Recognizing Zero",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "559--565",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bunch:1971:ESM,
  author =       "James R. Bunch",
  title =        "Equilibration of Symmetric Matrices in the Max-Norm",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "566--572",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "nla; scaling; symmetric matrix",
}

@Article{Rose:1971:NCO,
  author =       "Donald J. Rose",
  title =        "A Note on Consistent Ordering and Zero Circulation",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "573--575",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "iter; nla; sparse",
}

@Article{Kaplan:1971:NQI,
  author =       "M. A. Kaplan and R. A. Papetti",
  title =        "A Note on Quadrilateral Interpolation",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "576--585",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Smith:1971:MPR,
  author =       "C. S. Smith",
  title =        "Multiplicative Pseudo-Random Number Generators with
                 Prime Modulus",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "586--593",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wasserstrom:1971:SBV,
  author =       "E. Wasserstrom",
  title =        "Solving Boundary-Value Problems by Imbedding",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "594--602",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Adiri:1971:DTS,
  author =       "Igal Adiri",
  title =        "A Dynamic Time-Sharing Priority Queue",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "603--610",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:04:18 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1971.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "\ldots{} In such a priority regime, long and unknown
                 in advance service requirements in all priority classes
                 are dynamically penalized by degrading their priority
                 degree. This paper derives mathematical expressions for
                 calculating the expected total flow time of $j$-th
                 customer whose service requirement is known.",
  descriptors =  "M/M/1; time sharing; priority; feedback; analytical
                 model; dynamic priority; single server; queueing
                 system",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Adiri:1971:NSM,
  author =       "Igal Adiri",
  title =        "A Note on Some Mathematical Models of Time-Sharing
                 Systems",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "611--615",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 00:04:52 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1971.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "This note deals with time-sharing disciplines where
                 the arrival process is homogeneous poisson and service
                 requirements are exponentially distributed. The
                 investigated regimes are: (A) ordinary round-robin (R.
                 R.), (B) R. R. with the quantum allocated to a customer
                 is a function of the number of quanta he has already
                 received. \ldots{}",
  descriptors =  "Analytical model; feedback; time sharing; M/M/1; round
                 robin; queueing approximation",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Irani:1971:NLC,
  author =       "K. B. Irani and V. L. Wallace",
  title =        "On Network Linguistics and the Conversational Design
                 of Queueing Networks",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "616--629",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:03:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Reiter:1971:TRO,
  author =       "Raymond Reiter",
  title =        "Two Results on Ordering for Resolution with Merging
                 and Linear Format",
  journal =      j-J-ACM,
  volume =       "18",
  number =       "4",
  pages =        "630--646",
  month =        oct,
  year =         "1971",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 9 00:04:57 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Salton:1972:EWC,
  author =       "G. Salton",
  title =        "Editorial: {What} Is Computer Science?",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:44 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fleck:1972:CSA,
  author =       "A. C. Fleck and S. T. Hedetniemi and R. H. Oehmke",
  title =        "{\cal S}-Semigroups of Automata",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "3--10",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 00:19:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pavlidis:1972:LCF,
  author =       "T. Pavlidis",
  title =        "Linear and Context-Free Graph Grammars",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "11--22",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:44 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Earnest:1972:AGO,
  author =       "C. P. Earnest and K. G. Balke and J. Anderson",
  title =        "Analysis of Graphs by Ordering of Nodes",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "23--42",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Weinblatt:1972:NSA,
  author =       "Herbert Weinblatt",
  title =        "A New Search Algorithm for Finding the Simple Cycles
                 of a Finite Directed Graph",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "43--56",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chen:1972:MRM,
  author =       "Y. E. Chen and D. L. Epley",
  title =        "Memory Requirements in a Multiprocessing Environment",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "57--69",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Heacox:1972:ATT,
  author =       "Harry C. {Heacox, Jr.} and Paul W. {Purdom, Jr.}",
  title =        "Analysis of Two Time-Sharing Queueing Models",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "70--91",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:04:59 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1972.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Two time-sharing models are described. One is the
                 conventional round-robin model. The second model is a
                 modification of the round-robin system in which the
                 amount of service per pass depends on the rate at which
                 programs arrive in the system. The models are analyzed
                 under the assumption of constant, nonzero overhead when
                 the processor swaps one program for another.
                 Expressions are derived for the mean waiting time and
                 system cost.",
  descriptors =  "Analysis; time sharing; queueing system; model; round
                 robin; waiting time; cost",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Konheim:1972:SLS,
  author =       "Alan G. Konheim and Bernd Meister",
  title =        "Service in a Loop System",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "92--108",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1972.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The statistical behaviour of a loop service system is
                 studied. The system consists of a main station, a
                 server and $N$ stations arranged on a loop. Customers
                 arrive at each station according to a random process.
                 The server makes successive tours along the loop
                 bringing customers from the $N$ stations to the main
                 station. Two related measures of the grade of service
                 are considered: the average queue length and virtual
                 waiting time at each station.",
  descriptors =  "Loop system; queue length; virtual waiting time;
                 random process",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lee:1972:FLR,
  author =       "Richard C. T. Lee",
  title =        "Fuzzy Logic and the Resolution Principle",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "109--119",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Slagle:1972:ATP,
  author =       "James R. Slagle",
  title =        "Automatic Theorem Proving with Built-in Theories
                 Including Equality, Partial Ordering, and Sets",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "120--135",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:28:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blikle:1972:AUC,
  author =       "Andrzej Blikle",
  title =        "Addressless Units for Carrying Out Loop-Free
                 Computations",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "136--157",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Borodin:1972:CCE,
  author =       "A. Borodin",
  title =        "Computational Complexity and the Existence of
                 Complexity Gaps",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "158--174",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 23:26:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Borodin:1972:CCC}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Constable:1972:OG,
  author =       "Robert L. Constable",
  title =        "The Operator Gap",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "175--183",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Zadeh:1972:TEE,
  author =       "Norman Zadeh",
  title =        "Theoretical Efficiency of the {Edmonds-Karp} Algorithm
                 for Computing Maximal Flows",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "1",
  pages =        "184--192",
  month =        jan,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/netflow.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Greibach:1972:MA,
  author =       "Sheila Greibach and Seymour Ginsburg",
  title =        "Multitape {AFA}",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "193--221",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Santos:1972:NBG,
  author =       "Eugene S. Santos",
  title =        "A Note on Bracketed Grammars",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "222--224",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:44 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aho:1972:WMS,
  author =       "A. V. Aho and P. J. Denning and J. D. Ullman",
  title =        "Weak and Mixed Strategy Precedence Parsing",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "225--243",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:05:15 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mulligan:1972:CBA,
  author =       "Gordon D. Mulligan and D. G. Corneil",
  title =        "Corrections to {Bierstone}'s Algorithm for Generating
                 Cliques",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "244--247",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:40:24 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "graph coloring related topics",
}

@Article{Edmonds:1972:TIA,
  author =       "Jack Edmonds and Richard M. Karp",
  title =        "Theoretical Improvements in Algorithmic Efficiency for
                 Network Flow Problems",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "248--264",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:05:44 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/netflow.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hammer:1972:MPB,
  author =       "Peter L. Hammer and Uri N. Peled",
  title =        "On the Maximization of a Pseudo-{Boolean} Function",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "265--282",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Selkow:1972:OPC,
  author =       "Stanley M. Selkow",
  title =        "One-Pass Complexity of Digital Picture Properties",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "283--295",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:44 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Landweber:1972:RPA,
  author =       "L. H. Landweber and E. L. Robertson",
  title =        "Recursive Properties of Abstract Complexity Classes",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "296--308",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenberg:1972:ADG,
  author =       "Arnold L. Rosenberg",
  title =        "Addressable Data Graphs",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "309--340",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tarjan:1972:SUN,
  author =       "Robert Tarjan",
  title =        "Sorting Using Networks of Queues and Stacks",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "341--346",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{vanWestrhenen:1972:SST,
  author =       "S. C. {van Westrhenen}",
  title =        "Statistical Studies of Theoremhood in Classical
                 Propositional and First Order Predicate Calculus",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "347--365",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:25:54 1998",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Loveland:1972:UVS,
  author =       "D. W. Loveland",
  title =        "A Unifying View of Some Linear {Herbrand} Procedures",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "2",
  pages =        "366--384",
  month =        apr,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{McAfee:1972:ADS,
  author =       "J. McAfee and L. Presser",
  title =        "An Algorithm for the Design of Simple Precedence
                 Grammars",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "385--395",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ellis:1972:HPP,
  author =       "Clarence A. Ellis",
  title =        "The Halting Problem for Probabilistic Context-Free
                 Generators",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "396--399",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Even:1972:PGT,
  author =       "S. Even and A. Pnueli and A. Lempel",
  title =        "Permutation Graphs and Transitive Graphs",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "400--410",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pfaltz:1972:GS,
  author =       "John L. Pfaltz",
  title =        "Graph Structures",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "411--422",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:44 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yen:1972:FLA,
  author =       "Jin Y. Yen",
  title =        "Finding the Lengths of All Shortest Paths in
                 ${N}$-Node Nonnegative-Distance Complete Networks Using
                 $1/2 {N}^3$ Additions and ${N}^3$ Comparisons",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "423--424",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stanfel:1972:PAD,
  author =       "L. E. Stanfel",
  title =        "Practical Aspects of Doubly Chained Trees for
                 Retrieval",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "425--436",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Huang:1972:IPM,
  author =       "Nancy M. Huang and Randall E. Cline",
  title =        "Inversion of Persymmetric Matrices Having {Toeplitz}
                 Inverses",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "437--444",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mitrani:1972:NMS,
  author =       "I. Mitrani",
  title =        "Nonpriority Multiprogramming Systems Under Heavy
                 Demand Conditions --- Customers' Viewpoint",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "445--452",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:27:04 1998",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Nance:1972:BPA,
  author =       "Richard E. Nance and U. Narayan Bhat and Billy G.
                 Claybrook",
  title =        "Busy Period Analysis of a Time-Sharing System:
                 Transform Inversion",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "453--463",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kleinrock:1972:PSQ,
  author =       "L. Kleinrock and R. R. Muntz",
  title =        "Processor Sharing Queueing Models of Mixed Scheduling
                 Disciplines for Time Shared Systems",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "464--482",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1972.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "(VBI-001294)",
  descriptors =  "Processor sharing",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Schultz:1972:SMM,
  author =       "Gary D. Schultz",
  title =        "A Stochastic Model for Message Assembly Buffering with
                 a Comparison of Block Assignment Strategies",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "483--495",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:44 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Slagle:1972:AFL,
  author =       "James R. Slagle",
  title =        "An Approach for Finding ${C}$-Linear Complete
                 Inference Systems",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "496--516",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:29:04 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bruno:1972:EAC,
  author =       "J. Bruno and K. Steiglitz",
  title =        "The Expression of Algorithms by Charts",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "517--525",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Constable:1972:SPL,
  author =       "Robert L. Constable and Allan B. Borodin",
  title =        "Subrecursive Programming Languages, {Part I}:
                 Efficiency and Program Structure",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "526--568",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 12:28:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ullman:1972:NEH,
  author =       "J. D. Ullman",
  title =        "A Note on the Efficiency of Hashing Functions",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "569--575",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:06:56 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Early work on the problem of finding optimal hash
                 functions for open addressing.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Borodin:1972:CCC,
  author =       "A. Borodin",
  title =        "Corrigendum: ``{Computational} Complexity and the
                 Existence of Complexity Gaps''",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "3",
  pages =        "576--576",
  month =        jul,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:26:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Borodin:1972:CCE}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Beck:1972:CAR,
  author =       "Robert E. Beck and Bernard Kolman",
  title =        "Computer Approaches to the Representation of {Lie}
                 Algebras",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "577--589",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper surveys the methods of computing the inner
                 multiplicities of an irreducible representation of a
                 complex simple Lie algebra. It provides a descriptive
                 background of Lie algebra representation theory to
                 enable the reader to follow the computations. FORTRAN
                 programs to evaluate inner multiplicities using the
                 Kostant and Racah formulas are described. their
                 features are compared and suggestions are made for
                 combining and extending existing programs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages --- Fortran;
                 mathematical techniques",
}

@Article{Fischer:1972:RTS,
  author =       "Patrick C. Fischer and Albert R. Meyer and Arnold L.
                 Rosenberg",
  title =        "Real-Time Simulation of Multihead Tape Units",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "590--607",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The main result of this paper is that, given a Turing
                 machine with several read-write heads per tape, one can
                 effectively construct an equivalent multitape Turing
                 machine with a single read-write head per tape, which
                 runs at precisely the same speed. This result implies
                 that serial storage may be used to handle files
                 requiring several points of immediate two-way
                 read-write access without interruptions for rewinds,
                 etc. it yields simplified proofs of several results in
                 the literature of computational complexity.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory; simulation",
}

@Article{Ibarra:1972:NCN,
  author =       "Oscar H. Ibarra",
  title =        "A Note Concerning Nondeterministic Tape Complexities",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "608--612",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A set of sufficient conditions on tape functions
                 $L_1(n)$ and $L_2(n)$ is presented that guarantees the
                 existence of a set accepted by an $L_1(n)$-tape bounded
                 nondeterministic Turing machine, but not accepted by
                 any $L_2(n)$-tape bounded nondeterministic Turing
                 machine.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Beatty:1972:AAC,
  author =       "James C. Beatty",
  title =        "An Axiomatic Approach to Code Optimization for
                 Expressions",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "613--640",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Beatty:1973:EAAa,Beatty:1973:EAAb}.",
  abstract =     "An axiomatic approach is proposed as a means of
                 specifying precisely what liberties are permitted in
                 evaluating expressions. Specific axiom systems are
                 introduced for arithmetic expressions, which permit
                 free grouping of terms within parentheses, in the
                 spirit of American National Standard Fortran. Using
                 these axiom systems, two algorithms are given for
                 finding optimal equivalent forms of an expression not
                 having multiple references to any variable. The first
                 algorithm is intended for highly parallel computers and
                 is a slight generalization of that of Baer and Bovet.
                 The concept of delay is introduced as a measure of the
                 serial dependency of a computation and the algorithm is
                 shown to minimize delay. This provides, as a special
                 case, a proof of the level minimality claimed by Baer
                 and Bovet. The second algorithm is shown to produce an
                 equivalent expression which can be evaluated with a
                 minimal number of instructions on a computer of the IBM
                 System\slash 360 type. It is an extension of a result
                 of Sethi and Ullman, which relates only to commutative
                 and associative operations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "codes, symbolic; computer operating systems ---
                 Program Compilers; computer programming languages ---
                 Fortran; computer systems, digital --- Parallel
                 Processing",
}

@Article{Frazer:1972:BOM,
  author =       "W. D. Frazer and B. T. Bennett",
  title =        "Bounds on Optimal Merge Performance, and a Strategy
                 for Optimality",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "641--648",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The length of a sorted sequence produced by the
                 internal sort phase of a large scale general purpose
                 sort routine is a random variable. In a random access
                 environment, any given set of such sequences can be
                 merged in an optimal way, and in practice this often
                 done. the expected work per item required by an optimal
                 merge depends upon the probability distribution for
                 sequence length, and it is this dependence which is
                 studied. Reasonable sharp upper and lower bounds are
                 derived. The distribution which is optimal in the sense
                 of minimizing the lower bound on any bounded interval
                 is determined, and it is shown that this is the
                 strongest result of its kind.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming; data storage, digital
                 --- Random Access",
}

@Article{Reingold:1972:OSS,
  author =       "Edward M. Reingold",
  title =        "On the Optimality of Some Set Algorithms",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "649--659",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper is concerned with establishing lower bounds
                 on the number of comparisons required to solve various
                 combinatorial problems; in particular, the problems of
                 testing set equality, computing the maximum of a set,
                 and computing the median of a set are discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Savage:1972:CWT,
  author =       "J. E. Savage",
  title =        "Computational Work and Time on Finite Machines",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "660--674",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Exchange inequalities are developed for random access,
                 tape, and drum machines to show that product
                 inequalities between storage and time, number of drum
                 tracks and time, number of bits in an address and time,
                 etc., must be satisfied to compute finite functions on
                 bounded machines.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory; data storage, digital --- Random
                 Access",
}

@Article{Gray:1972:CRP,
  author =       "James N. Gray and Michael A. Harrison",
  title =        "On the Covering and Reduction Problems for
                 Context-Free Grammars",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "675--698",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A formal definition of one grammar ``covering''
                 another grammar is presented. It is argued that this
                 definition has the property that $G$ prime covers $G$
                 when and only when the ability to parse $G$ double
                 prime suffices for parsing $G$. It is shown that every
                 grammar may be covered by a grammar in canonical two
                 form. Every $A$-free grammar is covered by an operator
                 normal form grammar while there exist grammars which
                 cannot be covered by any grammar in Greibach form. any
                 grammar may be covered by an invertible grammar. Each
                 $A$-free and chain reduced LR($k$) (bounded right
                 context) grammar is covered by a precedence detectable,
                 LR($k$) (bounded right context) reducible grammar.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory; context free grammars",
}

@Article{Chang:1972:GMT,
  author =       "Shi-Kuo Chang",
  title =        "The Generation of Minimal Trees with a {Steiner}
                 Topology",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "699--711",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An iterative method is described which generates a
                 minimal tree with a Steiner topology in at most $n-2$
                 steps, where $n$ is the number of fixed vertices. The
                 SI algorithm is formulated. When $n$ less than
                 equivalent to $4$, the SI algorithm converges to a
                 proper tree. Experimental studies indicate that this
                 algorithm generates trees close to optimal Steiner
                 minimal trees.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Srinivasan:1972:AAL,
  author =       "V. Srinivasan and G. L. Thompson",
  title =        "Accelerated Algorithms for Labeling and Relabeling of
                 Trees, with Applications to Distribution Problems",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "712--726",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/netflow.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Adjacent extreme point problems involving a tree basis
                 (e.g. the transportation problem) require the
                 determination of cycles which are created when edges
                 not belonging to the basis are added to the basis-tree.
                 This paper offers an improvement over the
                 predecessor-index method for finding such cycles and
                 involves the use of a distance function defined on the
                 nodes of the tree, in addition to the predecessor
                 labels. It is shown that the relabeling associated with
                 a basis change can be minimized by defining yet another
                 function called the successor function. The algorithms
                 for labeling and relabeling are then specialized for
                 the specific case of transportation problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques --- Graph Theory; mathematical
                 techniques --- Trees; operations research",
}

@Article{Harris:1972:NFQ,
  author =       "Carl M. Harris and Paul G. Marlin",
  title =        "A Note on Feedback Queues with Bulk Service",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "727--733",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1972.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This note provides some extensions of work by
                 Delbrouck, which dealt with a queuing model of a
                 feedback system with queue-dependent service times. The
                 emphasis of this present work is upon necessary and
                 sufficient conditions for ergodicity, the relationship
                 of the imbedded and general-time queuing processes, and
                 the relaxation of the extent of state dependence for
                 the service times.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "This note provides some extensions of recent work by
                 Delbrouck, which dealt with a queuing model of a
                 feedback system with queue-dependent service times. The
                 emphasis of this present work is upon necessary and
                 sufficient conditions for ergodicity, the relationship
                 of the imbedded and general-time queuing processes, and
                 the relaxation of the extent of state dependence for
                 the service times.",
  classification = "718; 723; 922",
  descriptors =  "Analysis; feedback queue; bulk service; ergodicity;
                 state dependent service; stochastic process;
                 probability",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; probability; telephone
                 exchanges",
}

@Article{Bayes:1972:MVS,
  author =       "A. J. Bayes",
  title =        "A Minimum Variance Sampling Technique for Simulation
                 Models",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "734--741",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1972.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A technique is presented to allow the sampling
                 frequency of the states of the simulation to be
                 independent of their natural frequency. By representing
                 a simulation model as a Markov chain, the theory is
                 applied to estimate some statistics of the simulation
                 model with minimum variance; for instance, the
                 frequency of overload of a teleprocessing computer
                 system. A numerical case is presented in which the
                 sampling effort is reduced by a factor of sixty
                 compared to a normal simulation run.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A sampling theory of Markov chains is developed which
                 allows some statistics of the Markov state frequencies
                 to be estimated with minimum variance for a given
                 sampling effort. A technique is presented to allow the
                 sampling frequency of the states of the simulation to
                 be independent of their natural frequency. By re-
                 presenting a simulation model as a Markov chain, the
                 theory is applied to estimate some statistics of the
                 simulation.",
  classification = "913; 922",
  descriptors =  "Simulation; simulation model; Markov chain; variance",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical models; probability --- Random Processes;
                 sampling; simulation",
}

@Article{Zeigler:1972:TFT,
  author =       "Bernard P. Zeigler",
  title =        "Towards a Formal Theory of Modeling and Simulation:
                 Structure Preserving Morphisms",
  journal =      j-J-ACM,
  volume =       "19",
  number =       "4",
  pages =        "742--764",
  month =        oct,
  year =         "1972",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 17 16:22:17 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A simulation consists of a triple of automata (system
                 to be simulated, model of this system, computer
                 realizing the model). In a valid simulation these
                 elements are connected by behavior and structure
                 preserving morphisms. Informational and complexity
                 considerations motivate the development of structure
                 preserving morphisms which can preserve not only
                 global, but also local dynamic structure. A formalism
                 for automaton structure assignment and the relevant
                 weak and strong structure preserving morphisms are
                 introduced. It is shown that these preservation notions
                 properly refine the usual automaton homomorphism
                 concepts. Sufficient conditions are given under which
                 preservation of the local state space structure (weak
                 morphism) also forces the preservation of component
                 interaction. The strong sense in which these conditions
                 are necessary is also demonstrated. This provides a
                 rationale for making valid inferences about the local
                 structure of a system when that of a behaviorally valid
                 model is known.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory; computational complexity;
                 mathematical models; simulation",
}

@Article{Nievergelt:1973:UBT,
  author =       "J. Nievergelt and C. K. Wong",
  title =        "Upper Bounds for the Total Path Length of Binary
                 Trees",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:07:15 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sloate:1973:SCM,
  author =       "Harry M. Sloate and Theodore A. Bickart",
  title =        "${A}$-Stable Composite Multistep Methods",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "7--26",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:07:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stone:1973:EPA,
  author =       "Harold S. Stone",
  title =        "An Efficient Parallel Algorithm for the Solution of a
                 Tridiagonal Linear System of Equations",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "27--38",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/ovr.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "linear system; nla; prll; tridiagonal matrix",
}

@Article{Burnett:1973:CPR,
  author =       "G. J. Burnett and E. G. {Coffman, Jr.}",
  title =        "A Combinatorial Problem Related to Interleaved Memory
                 Systems",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "39--45",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Liu:1973:SAM,
  author =       "C. L. Liu and James W. Layland",
  title =        "Scheduling Algorithms for Multiprogramming in a
                 Hard-Real-Time Environment",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "46--61",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:08:01 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/scheduling.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Griffith:1973:MMA,
  author =       "Arnold K. Griffith",
  title =        "Mathematical Models for Automatic Line Detection",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "62--80",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenfeld:1973:ACD,
  author =       "Azriel Rosenfeld",
  title =        "Arcs and Curves in Digital Pictures",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "81--87",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Richards:1973:EESa,
  author =       "Donald L. Richards",
  title =        "Efficient Exercising of Switching Elements in Nets of
                 Identical Gates",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "88--111",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 21:20:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{DiPaola:1973:SDP,
  author =       "Robert A. {Di Paola}",
  title =        "The Solvability of the Decision Problem for Classes of
                 Proper Formulas and Related Results",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "112--126",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dixon:1973:RTP,
  author =       "John K. Dixon",
  title =        "${Z}$-Resolution: {Theorem-Proving} with Compiled
                 Axioms",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "127--147",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 16:00:09 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/hybrid.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hwang:1973:CMA,
  author =       "F. K. Hwang and D. N. Deutsch",
  title =        "A Class of Merging Algorithms",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "148--159",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosen:1973:TMS,
  author =       "Barry K. Rosen",
  title =        "Tree-Manipulation Systems and {Church--Rosser}
                 Theorems",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "160--187",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Beatty:1973:EAAa,
  author =       "James C. Beatty",
  title =        "Errata: ``{An} Axiomatic Approach to Code Optimization
                 for Expressions''",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "1",
  pages =        "188--188",
  month =        jan,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 16:00:37 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Beatty:1972:AAC,Beatty:1973:EAAb}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Salkin:1973:SCA,
  author =       "Harvey M. Salkin and Ronald D. Koncal",
  title =        "Set Covering by an All Integer Algorithm:
                 Computational Experience",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "189--193",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:33:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Srinivasan:1973:BCA,
  author =       "V. Srinivasan and G. L. Thompson",
  title =        "Benefit-Cost Analysis of Coding Techniques for the
                 Primal Transportation Algorithm",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "194--213",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:13:09 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/netflow.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gray:1973:CPS,
  author =       "James N. Gray and Michael A. Harrison",
  title =        "Canonical Precedence Schemes",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "214--234",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lomet:1973:FTD,
  author =       "David Bruce Lomet",
  title =        "A Formalization of Transition Diagram Systems",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "235--257",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/da.3d-metaphors.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Formal, Sprachtheorie (Vorbehalt)",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Salton:1973:RSA,
  author =       "G. Salton",
  title =        "Recent Studies in Automatic Text Analysis and Document
                 Retrieval",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "258--278",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dalphin:1973:BLS,
  author =       "John F. Dalphin and Victor Lovass-Nagy",
  title =        "Best Least Squares Solutions to Finite Difference
                 Equations Using the Generalized Inverse and Tensor
                 Product Methods",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "279--289",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Friedli:1973:OCA,
  author =       "Armin Friedli",
  title =        "Optimal Covering Algorithms in Methods of Search for
                 Solving Polynomial Equations",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "290--300",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldstein:1973:MP,
  author =       "A. J. Goldstein and P. L. Richman",
  title =        "A Midpoint Phenomenon",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "301--304",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Morgenstern:1973:NLB,
  author =       "Jacques Morgenstern",
  title =        "Note on a Lower Bound of the Linear Complexity of the
                 Fast {Fourier} Transform",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "305--306",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arora:1973:OSL,
  author =       "S. R. Arora and A. Gallo",
  title =        "Optimization of Static Loading and Sizing of
                 Multilevel Memory Systems",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "307--319",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Os/storage.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Richards:1973:EESb,
  author =       "Donald L. Richards",
  title =        "Efficient Exercising of Switching Elements in
                 Combinational Nets",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "320--332",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 21:19:37 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pietrzykowski:1973:CMS,
  author =       "Tomasz Pietrzykowski",
  title =        "A Complete Mechanization of Second-Order Type Theory",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "2",
  pages =        "333--364",
  month =        apr,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Berztiss:1973:BPI,
  author =       "A. T. Berztiss",
  title =        "A Backtrack Procedure for Isomorphism of Directed
                 Graphs",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "365--377",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:13:41 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Green:1973:PEF,
  author =       "Christopher D. Green",
  title =        "A Path Entropy Function for Rooted Trees",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "378--384",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Johnson:1973:NDS,
  author =       "Donald B. Johnson",
  title =        "A Note on {Dijkstra}'s Shortest Path Algorithm",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "385--388",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Williams:1973:NYA,
  author =       "Thomas A. Williams and Gregory P. White",
  title =        "A Note on {Yen}'s Algorithm for Finding the Length of
                 All Shortest Paths in ${N}$-Node Nonnegative-Distance
                 Networks",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "389--390",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:14:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kaneko:1973:LRE,
  author =       "Toyohisa Kaneko and Bede Liu",
  title =        "On Local Roundoff Errors in Floating-Point
                 Arithmetic",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "391--398",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321765.321771",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "65G05",
  MRnumber =     "49 8318",
  bibdate =      "Tue Oct 09 10:18:49 2007",
  bibsource =    "ftp://garbo.uwasa.fi/pc/doc-soft/fpbibl18.zip;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A bound on the relative error in floating-point
                 addition using a single-precision accumulator with
                 guard digits is derived. It is shown that even with a
                 single guard digit, the accuracy can be almost as good
                 as that using a double-precision accumulator. A
                 statistical model for the roundoff error in
                 double-precision multiplication and addition is also
                 derived. The model is confirmed by experimental
                 measurements.",
  acknowledgement = ack-nhfb # " and " # ack-nj,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  reviewer =     "V. V. Ivanov",
}

@Article{Miller:1973:TAN,
  author =       "Webb Miller",
  title =        "Toward Abstract Numerical Analysis",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "399--408",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Watson:1973:AIB,
  author =       "G. A. Watson",
  title =        "An Algorithm for the Inversion of Block Matrices of
                 {Toeplitz} Form",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "409--415",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "block algorithm; block Toeplitz matrix; inverse
                 matrix; nla",
}

@Article{Adiri:1973:CQB,
  author =       "Igal Adiri",
  title =        "Cyclic Queues with Bulk Arrivals",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "416--428",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:54:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Grossman:1973:PRS,
  author =       "David D. Grossman and Harvey F. Silverman",
  title =        "Placement of Records on a Secondary Storage Device to
                 Minimize Access Time",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "429--438",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tourlakis:1973:SRC,
  author =       "G. Tourlakis and J. Mylopoulos",
  title =        "Some Results in Computational Topology",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "439--455",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/pre75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lewis:1973:GFS,
  author =       "T. G. Lewis and W. G. Payne",
  title =        "Generalized Feedback Shift Register Pseudorandom
                 Number Algorithm",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "456--468",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321765.321777",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 22 07:42:23 2011",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1973.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "See important errata, and algorithm and code
                 improvements, in \cite{Fushimi:1990:RNG}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Feedback configurations for SR's of length > 45",
  descriptors =  "Shift register sequences",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tootill:1973:ART,
  author =       "J. P. R. Tootill and W. D. Robinson and D. J. Eagle",
  title =        "An Asymptotically Random {Tausworthe} Sequence",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "469--481",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1973.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The theoretical limitations on the orders of
                 equidistribution attainable by Tausworthe sequences are
                 derived from first principles and are stated in the
                 form of a criterion to be achieved. A second criterion,
                 extending these limitations to multidimensional
                 uniformity, is also defined. A sequence possessing both
                 properties is said to be asymptotically random as no
                 other sequence of the same period could be more random
                 in these respects. \ldots{}",
  descriptors =  "Tausworthe generator; shift register sequences; rng;
                 test; runtime/storage efficiency; multidimensional
                 uniformity",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Worrell:1973:EOS,
  author =       "R. B. Worrell and B. L. Hulme",
  title =        "Efficient Ordering of Set Expressions for Symbolic
                 Expansion",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "482--488",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ashcroft:1973:DPM,
  author =       "Edward Ashcroft and Zohar Manna and Amir Pnueli",
  title =        "Decidable Properties of Monadic Functional Schemas",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "489--499",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:16:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ehrlich:1973:LAG,
  author =       "Gideon Ehrlich",
  title =        "Loopless Algorithms for Generating Permutations,
                 Combinations, and Other Combinatorial Configurations",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "500--513",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Keller:1973:PPSa,
  author =       "Robert M. Keller",
  title =        "Parallel Program Schemata and Maximal Parallelism {I}.
                 {Fundamental} Results",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "514--537",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Beatty:1973:EAAb,
  author =       "James C. Beatty",
  title =        "Errata: ``{An} Axiomatic Approach to Code Optimization
                 for Expressions''",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "538--538",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 16:00:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Beatty:1972:AAC,Beatty:1973:EAAa}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jenkins:1973:BMI,
  author =       "M. A. Jenkins",
  title =        "{Bernouilli}'s Method with Implicit Shifting",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "3",
  pages =        "539--544",
  month =        jul,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Krogh:1973:TSN,
  author =       "Fred T. Krogh",
  title =        "On Testing a Subroutine for the Numerical Integration
                 of Ordinary Differential Equations",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "4",
  pages =        "545--562",
  month =        oct,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{McClellan:1973:ESS,
  author =       "Michael T. McClellan",
  title =        "The Exact Solution of Systems of Linear Equations with
                 Polynomial Coefficients",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "4",
  pages =        "563--588",
  month =        oct,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Adiri:1973:MQ,
  author =       "I. Adiri and M. Hofri and M. Yadin",
  title =        "A Multiprogramming Queue",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "4",
  pages =        "589--603",
  month =        oct,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1973.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Description of a simple computer system (CPU, I/O
                 unit) which works in a multiprogramming manner under a
                 heavy load. The incoming queue is never empty and the
                 service times are exponentially distributed independent
                 random variables. Head of the line priority of programs
                 which are being processed over newcomers is considered.
                 The system is compared with two others: one working in
                 ``batch mode'' and another multiprogramming system.",
  descriptors =  "Queueing system; priority",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gotlieb:1973:PMH,
  author =       "C. C. Gotlieb and G. H. MacEwen",
  title =        "Performance of Movable-Head Disk Storage Devices",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "4",
  pages =        "604--623",
  month =        oct,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:27:18 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Gotlieb:1975:EPM}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yue:1973:OPR,
  author =       "P. C. Yue and C. K. Wong",
  title =        "On the Optimality of the Probability Ranking Scheme in
                 Storage Applications",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "4",
  pages =        "624--633",
  month =        oct,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hueckel:1973:LVO,
  author =       "Manfred H. Hueckel",
  title =        "A Local Visual Operator Which Recognizes Edges and
                 Lines",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "4",
  pages =        "634--647",
  month =        oct,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:21:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Hueckel:1974:ELV}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stillman:1973:CWS,
  author =       "Rona B. Stillman",
  title =        "The Concept of Weak Substitution in Theorem-Proving",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "4",
  pages =        "648--667",
  month =        oct,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bass:1973:OHN,
  author =       "Leonard Bass and Paul Young",
  title =        "Ordinal Hierarchies and Naming Complexity Classes",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "4",
  pages =        "668--686",
  month =        oct,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Daley:1973:EIC,
  author =       "Robert P. Daley",
  title =        "An Example of Information and Computation Resource
                 Trade-Off",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "4",
  pages =        "687--695",
  month =        oct,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 17:55:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Keller:1973:PPSb,
  author =       "Robert M. Keller",
  title =        "Parallel Program Schemata and Maximal Parallelism
                 {II}: {Construction} of Closures",
  journal =      j-J-ACM,
  volume =       "20",
  number =       "4",
  pages =        "696--710",
  month =        oct,
  year =         "1973",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:16:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Herr:1974:SMS,
  author =       "David G. Herr",
  title =        "On a Statistical Model of {Strand} and {Westwater} for
                 the Numerical Solution of a {Fredholm} Integral
                 Equation of the First Kind",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "1--5",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The purpose of this paper is to present a statistical
                 model useful in the numerical solution of a Fredholm
                 integral equation of the first kind and equivalent to
                 one proposed by O. N. Strand and E. R. Westwater. The
                 model presented here is familiar to statisticians from
                 the study of regression analysis. In fact, this
                 familiarity and the consequent rich store of results
                 available for the analysis of the general linear model
                 are the principal reasons for proposing that this model
                 is the appropriate way to view the problem posed by
                 Strand and Westwater.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Tsao:1974:SPE,
  author =       "Nai-Kuan Tsao",
  title =        "Some a Posteriori Error Bounds in Floating-Point
                 Computations",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "6--17",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Efficiently computable a posteriori error bounds are
                 attained by using a posteriori models for bounding
                 roundoff errors in the basic floating-point operations.
                 Forward error bounds are found for inner product and
                 polynomial evaluations. An analysis of the Crout
                 algorithm in solving systems of linear algebraic
                 equations leads to sharper backward a posteriori
                 bounds. The results in the analysis of the iterative
                 refinement give bounds useful in estimating the rate of
                 convergence. Some numerical experiments are included.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Cotten:1974:PTS,
  author =       "L. W. Cotten and A. M. Abd-Alla",
  title =        "Processing Times for Segmented Jobs with {I/O} Compute
                 Overlap",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "18--30",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Using a queueing model with tandem servers for the
                 performance analysis, two cases, single-segment overlap
                 and unlimited overlap, are considered. Segmental
                 compute and output (or input) service times are taken
                 to be exponentially distributed; however, the approach
                 is not limited to the exponential case if service is
                 independent. The ratio of mean output time to mean
                 computer time is varied to explore the full range
                 between compute-bound and output-bound extremes. Final
                 results are presented as relative gain over sequential
                 processing.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems",
}

@Article{Franaszek:1974:SDF,
  author =       "P. A. Franaszek and T. J. Wagner",
  title =        "Some Distribution-Free Aspects of Paging Algorithm
                 Performance",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "31--39",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/cache.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The topic of this paper is a probabilistic analysis of
                 demand paging algorithms for storage hierarchies. Two
                 aspects of algorithm performance are studied under the
                 assumption that the sequence of page requests is
                 statistically independent; the page fault probability
                 for a fixed memory size and the variation of
                 performance with memory. Performance bounds are
                 obtained which are independent of the page request
                 probabilities. It is shown that simple algorithms exist
                 which yield fault probabilities close to optimal with
                 only a modest increase in memory.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems",
}

@Article{Ingargiola:1974:FOD,
  author =       "Giorgio Ingargiola and James F. Korsh",
  title =        "Finding Optimal Demand Paging Algorithms",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "40--53",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this paper the authors introduce a formal
                 stochastic program model and cost criterion for a
                 replacement policy. This model serves to obviate the
                 need to know the sequence, or number, of actual page
                 references of a program, in order to determine an
                 optimal replacement policy. The existence of an optimal
                 policy and cost is proved under rather general
                 assumptions, and an algorithm is presented which
                 largely reduces the computational complexity involved
                 in finding optimal policies in the non-time-varying
                 case. Still, only moderate size programs may be
                 analyzed by this method, if the computations are to be
                 carried out in a reasonable amount of time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Mitra:1974:SAH,
  author =       "Debasis Mitra",
  title =        "Some Aspects of Hierarchical Memory Systems",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "54--65",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A class of demand paging algorithms for some two-level
                 memory hierarchies is analyzed. The typical memory
                 hierarchy is comprised of the core and a backing
                 device. A distance matrix characterizes the properties
                 of the latter device. The sequence of address
                 references directed to the hierarchy by the CPU and
                 channels is modeled as a Markov process. A compact
                 expression for the mean time required to satisfy the
                 page demands is derived and this expression provides
                 the basis for some optimization problems concerning
                 partitionings and rearrangements of pages in the
                 backing device. In connection with these problems, a
                 class of random processes is defined in terms of an
                 ordering property of a joint probability matrix which
                 is central to memory hierarchies. Three results are
                 given on the ordering property, its relation
                 specifically to partitionings inherent in hierarchies
                 and the problem of optimal rearrangements. Finally, for
                 such a class of ordered processes, certain results due
                 to the author are specialized to yield the solution to
                 the problem of optimal rearrangement of pages on an
                 assembly of magnetic bubble loops.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Sevcik:1974:SMT,
  author =       "Kenneth C. Sevcik",
  title =        "Scheduling for Minimum Total Loss Using Service Time
                 Distributions",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "66--75",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this paper the authors define a new scheduling rule
                 and prove that it minimizes expected total loss when
                 preemption is allowed and service time distributions
                 are known. It is shown that certain forms of service
                 time distributions cause the optimal rule to schedule
                 as such well-known rules as first-come first-served,
                 random, or multilevel feedback.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming",
}

@Article{Earnest:1974:STC,
  author =       "Christopher Earnest",
  title =        "Some Topics in Code Optimization",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "76--102",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper presents and explains a class of algorithms
                 for performing the code optimizations known as common
                 subexpression elimination and code motion. It attempts
                 to clarify the connection between the solution of the
                 equations and the program being optimized, and presents
                 a number of improvements and extensions to the basic
                 method.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Crane:1974:SSSa,
  author =       "Michael A. Crane and Donald L. Iglehart",
  title =        "Simulating Stable Stochastic Systems, {I}: {General}
                 Multiserver Queues",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "103--113",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1974.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A technique is introduced for analyzing simulations of
                 stochastic systems in the steady state. From the
                 viewpoint of classical statistics, questions of
                 simulation run duration and of starting and stopping
                 simulations are addressed. This is possible because of
                 the existence of a random grouping of observations
                 which produces independent identically distributed
                 blocks from the start of the simulation. The analysis
                 is presented in the context of the general multiserver
                 queue, with arbitrarily distributed interarrival and
                 service times. In this case, it is the busy period
                 structure of the system which produces the grouping
                 mentioned above. Numerical illustrations are given for
                 the M/M/1 queue. Statistical methods are employed so as
                 to obtain confidence intervals for a variety of
                 parameters of interest, such as the expected value of
                 the stationary customer waiting time, the expected
                 value of a function of the stationary waiting time, the
                 expected number of customers served and length of a
                 busy cycle, the tail of the stationary waiting time
                 distribution, and the standard deviation of the
                 stationary waiting time. Consideration is also given to
                 determining system sensitivity to errors and
                 uncertainty in the input parameters.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "731; 922",
  descriptors =  "Simulation; statistical technique",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "control systems; probability --- Queueing Theory",
}

@Article{Crane:1974:SSSb,
  author =       "Michael A. Crane and Donald L. Iglehart",
  title =        "Simulating Stable Stochastic Systems, {II}: {Markov}
                 Chains",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "114--123",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1974.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A technique for simulating GI/G/s queues is shown to
                 apply to simulations of discrete and continuous-time
                 Markov chains. It is possible to address questions of
                 simulation run duration and of starting and stopping
                 simulations because of the existence of a random
                 grouping of observations which produces independent
                 identically distributed blocks from the start of the
                 simulation. This grouping allows confidence intervals
                 to be obtained for a general function of the
                 steady-state distribution of the Markov chain. The
                 technique is illustrated with simulation of an (s, S)
                 inventory model in discrete time and the classical
                 repairman problem in continuous time. Consideration is
                 also given to determining system sensitivity to errors
                 and uncertainty in the input parameters.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "731; 922",
  descriptors =  "Simulation; statistical technique",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "control systems; probability --- Random Processes",
}

@Article{Fleisig:1974:IME,
  author =       "S. Fleisig and D. Loveland and A. K. {Smiley III} and
                 D. L. Yarmush",
  title =        "An Implementation of the Model Elimination Proof
                 Procedure",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "124--139",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/prolog.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The model elimination (ME) and resolution algorithms
                 for mechanical theorem-proving were implemented so as
                 to maximize shared features. The identical data
                 structures and large amount of common programming
                 permit meaningful comparisons when the two programs are
                 run on standard problems. ME does better on some
                 classes of problems, and resolution better on others.
                 The depth-first search strategy used in this ME
                 implementation affects the performance profoundly.
                 Other novel features in the implementation are new
                 control parameters to govern extensions, and modified
                 rules for generating and rejecting chains. The
                 resolution program incorporates unit preference and
                 set-of-support. An appendix reproduces the steps of a
                 machine-derived ME refutation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming; prolog",
}

@Article{Kohler:1974:CTC,
  author =       "Walter H. Kohler and Kenneth Steiglitz",
  title =        "Characterization and Theoretical Comparison of
                 Branch-and-Bound Algorithms for Permutation Problems",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "140--156",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Branch-and-bound implicit enumeration algorithms for
                 permutation problems (discrete optimization problems
                 where the set of feasible solutions is the permutation
                 group S//n) are characterized in terms of a sextuple
                 (B//p, S,E,D,L,U), where B//p is the branching rule for
                 permutation problems, $S$ is the next node selection
                 rule, $E$ is the set of node elimination rules, $D$ is
                 the node dominance function, $L$ is the node
                 lower-bound cost function, and U is an upper-bound
                 solution cost. A general algorithm based on this
                 characterization is presented and the dependence of the
                 computational requirements on the choice of algorithm
                 parameters S, E, D, L, and U is investigated
                 theoretically. The results verify some intuitive
                 notions but disprove others.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{Kritzinger:1974:TTC,
  author =       "P. S. Kritzinger and J. W. Graham",
  title =        "A Theorem in the Theory of Compromise Merge Methods",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "157--160",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $r$ be the total number of cycles required to
                 complete a compromise merge of a given number of
                 initial strings. Define row vectors $m_{r-j}$ and $d_j$
                 whose components represent the number and length
                 respectively of strings at the end of the $j$th cycle
                 of the merge. It is shown in this paper that there are
                 asymptotic approximations to these vectors, which
                 enables one to compute their respective components
                 directly. Consequently, the number of cycles $r$ can be
                 computed directly, as in the case of the balanced
                 merge.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming",
}

@Article{Shaw:1974:NME,
  author =       "Mary Shaw and J. F. Traub",
  title =        "On the Number of Multiplications for the Evaluation of
                 a Polynomial and Some of Its Derivatives",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "161--167",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321796.321810",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/elefunt.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A family of new algorithms is given for evaluating the
                 first $m$ derivatives of a polynomial. In particular,
                 it is shown that all derivatives may be evaluated in $
                 3 n - 2 $ multiplications. The best previous result
                 required $ (1/2) n (n + 1) $ multiplications. Some
                 optimality results are presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Wagner:1974:SSC,
  author =       "Robert A. Wagner and Michael J. Fischer",
  title =        "The String-to-String Correction Problem",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "1",
  pages =        "168--173",
  month =        jan,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The string-to-string correction problem is to
                 determine the distance between two strings as measured
                 by the minimum cost sequence of ``edit operations''
                 needed to change the one string into the other. The
                 edit operations investigated allow changing one symbol
                 of a string into another single symbol, deleting one
                 symbol from a string, or inserting a single symbol into
                 a string. An algorithm is presented which solves this
                 problem in the time proportional to the product of the
                 lengths of the two strings. Possible applications are
                 to the problems of automatic spelling correction and
                 determining the longest subsequence of characters
                 common to two strings.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  comment =      "A dynamic programming algorithm is presented to find
                 the minimum distance between two strings. A good
                 definition of distance is presented. The algorithm runs
                 in $\Theta(|m| \cdot |n|)$ time. A special case to find
                 the longest common subsequence is presented.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Michie:1974:SBD,
  author =       "D. Michie and E. E. Sibert",
  title =        "Some Binary Derivation Systems",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "175--190",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A family of search procedures controlled by evaluation
                 functions of a very general sort is considered, having
                 the form $f_{\Lambda (x, L_k)}$, where $L_k$ is that
                 portion of the graph generated thus far by the
                 procedure, and the node $x$ is a candidate for
                 incorporation into $L_k$. Completeness and minimality
                 results are obtained for a number of procedures in this
                 family, including methods analogous to those of Moore,
                 Dijkstra, and Pohl.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Overbeek:1974:NCA,
  author =       "Ross A. Overbeek",
  title =        "A New Class of Automated Theorem-Proving Algorithms",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "191--200",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A procedure is defined for deriving from any statement
                 $S$ an infinite sequence of statements $S_0$, $S_1$,
                 $S_2$, $S_3$, \ldots{} such that: (a) if there exists
                 an $i$ such that $S_i$ is unsatisfiable, then $S$ is
                 unsatisfiable; (b) if $S$ is unsatisfiable, then there
                 exists an $i$ such that $S_i$ is unsatisfiable; (c) for
                 all $i$ the Herbrand universe of $S_i$ is finite;
                 hence, for each $i$ the satisfiability of $S_i$ is
                 decidable. The new algorithms are then based on the
                 idea of generating successive $S_i$ in the sequence and
                 testing each $S_i$ for satisfiability. Each element in
                 the class of new algorithms is complete.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{Brent:1974:PEG,
  author =       "Richard P. Brent",
  title =        "The Parallel Evaluation of General Arithmetic
                 Expressions",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "201--206",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that arithmetic expressions with $n \geq
                 1$ variables and constants; operations of addition,
                 multiplication, and division; and any depth of
                 parenthesis nesting can be evaluated in time $4
                 \log_{2n} + 10^(n-1)/p$ using $p$ greater than
                 equivalent to $1$ processors which can independently
                 perform arithmetic operations in unit time. This bound
                 is within a constant factor of the best possible. A
                 sharper result is given for expressions without the
                 division operation, and the question of numerical
                 stability is discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Pager:1974:FRP,
  author =       "David Pager",
  title =        "Further Results on the Problem of Finding Minimal
                 Length Programs for Decision Tables",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "207--212",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this paper it is shown that whatever the length
                 function employed, the problem of finding the shortest
                 program for a decision table with two (or more) entries
                 is not recursively solvable (whereas for decision
                 tables with a single entry the problem is solvable for
                 some length functions and unsolvable for others).
                 Moreover, it is shown that there is a pair of finite
                 sets of programs and a single entry $E$ such that the
                 shortest program for the decision table formed by
                 adding a single additional entry to $E$ is in all cases
                 in one of the two sets, but it is undecidable in which.
                 Some consequences of these results are then presented,
                 such as showing that for a wide range of restrictions
                 the results remain true, even when the repertoire of
                 possible programs for a decision table is narrowed by
                 only considering programs which meet certain
                 restrictions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Gabrielian:1974:GS,
  author =       "Armen Gabrielian and Seymour Ginsburg",
  title =        "Grammar Schemata",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "213--226",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A solution is presented for the following problem:
                 Determine a procedure that produces, for each full trio
                 $L$ of context-free languages (more generally, each
                 trio of r.e.\ languages), a family of context-free
                 (phrase structure) grammars which (a) defines $L$, (b)
                 is simple enough for practical and theoretical
                 purposes, and (c) in most cases is a subfamily of a
                 well-known family of context-free (phrase structure)
                 grammars for $L$ if such a well-known family exists.
                 The key notion in the paper is that of a grammar
                 schema. With each grammar schema there is associated a
                 family of interpretations. In turn, each interpretation
                 of a grammar schema gives rise to a phrase structure
                 grammar. Given a full trio (trio) $L$ of context-free
                 (r.e.) languages, one constructs a grammar schema whose
                 interpretations ($\epsilon$-limited interpretations)
                 then give rise to the desired family of grammars for
                 $L$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Berman:1974:MLT,
  author =       "G. Berman and A. W. Colijn",
  title =        "A Modified List Technique Allowing Binary Search",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "227--232",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A modification of linked lists is presented which
                 permits searching almost as efficiently as a pure
                 binary search. The method depends on using consecutive
                 memory locations for consecutive list elements whenever
                 possible.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Binary searching of an index structure",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; data processing",
}

@Article{Chien:1974:DSM,
  author =       "R. T. Chien and E. A. Mark",
  title =        "A Document Storage Method Based on Polarized
                 Distance",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "233--245",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Some elementary mathematical properties of term
                 matching document retrieval systems are developed.
                 These properties are used as a basis for a new file
                 organization technique. Some of the advantages of this
                 new method are: (1) the key-to-address transformation
                 is easily determined; (2) the documentary is stored
                 only once in the file; (3) the file organization allows
                 the use of various matching functions and thresholds,
                 and (4) the dimensionality of the transform is easily
                 expanded to accommodate various sized data bases.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information retrieval systems",
}

@Article{Elias:1974:ESR,
  author =       "Peter Elias",
  title =        "Efficient Storage and Retrieval by Content and Address
                 of Static Files",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "246--260",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A set of static files or inventories is considered,
                 each consisting of the same number of entries, each
                 entry a binary word of the same fixed length selected
                 (with replacement) from the set of all binary sequences
                 of that length, and the entries in each file sorted
                 into lexical order. Several retrieval questions of
                 interest for each such file are considered. One is to
                 find the value of the jth entry, another to find the
                 number of entries of value less than $k$. When a binary
                 representation of such a file is stored in computer
                 memory and an algorithm or machine which knows only the
                 file parameters (i.e. number of entries, number of
                 possible values per entry) accesses some of the stored
                 bits to answer a retrieval question, the number of bits
                 stored and the number of bits accessed per retrieval
                 question are cost measures for the storage and
                 retrieval task which have been used by Minsky and
                 Papert. Bits stored depends on the representation
                 chosen: bits accessed also depends on the retrieval
                 question asked and on the algorithm used. Firm lower
                 bounds are given to minimax measures of bits stored and
                 bits accessed for each of four retrieval questions, and
                 construct representations and algorithms for a
                 bit-addressable machine which come within factors of
                 two or three of attaining all four bounds at once for
                 files of any size. All four factors approach one for
                 large enough files.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information retrieval systems",
}

@Article{Blevins:1974:CED,
  author =       "M. M. Blevins and G. W. Stewart",
  title =        "Calculating the Eigenvectors of Diagonally Dominant
                 Matrices",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "261--271",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm is proposed for calculating the
                 eigenvectors of a diagonally dominant matrix all of
                 whose elements are known to high relative accuracy.
                 Eigenvectors corresponding to pathologically close
                 eigenvalues are treated by computing the invariant
                 subspace that they span. If the off-diagonal elements
                 of the matrix are sufficiently small, the method is
                 superior to standard techniques, and indeed it may
                 produce a complete set of eigenvectors with an amount
                 of work proportional to the square of the order of the
                 matrix. An analysis is given of the effects of
                 perturbations in the matrix on the eigenvectors.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "diagonal dominance; eig; mathematical techniques;
                 nla",
}

@Article{Zohar:1974:STS,
  author =       "Shalhav Zohar",
  title =        "The Solution of a {Toeplitz} Set of Linear Equations",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "272--276",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The solution of a set of $m$ linear equations with a
                 non-Hermitian Toeplitz associated matrix is considered.
                 Presently available fast algorithms solve this set with
                 $4 m^2$ ``operations'' (an ``operation'' is defined
                 here as a set of one addition and one multiplication).
                 An improved algorithm requiring only $3 m^2$
                 ``operations'' is presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Horowitz:1974:CPA,
  author =       "Ellis Horowitz and Sartaj Sahni",
  title =        "Computing Partitions with Applications to the Knapsack
                 Problem",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "277--292",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Given $r$ numbers $s_1$, \ldots{}, $s_r$, algorithms
                 are investigated for finding all possible combinations
                 of these numbers which sum to $M$. This problem is a
                 particular instance of the $0$--$1$ unidimensional
                 knapsack problem. All of the usual algorithms for this
                 problem are investigated in terms of both asymptotic
                 computing times and storage requirements, as well as
                 average computing times. A technique is developed which
                 improves all of the dynamic programming methods by a
                 square root factor. Empirical studies indicate this new
                 algorithm to be generally superior to all previously
                 known algorithms. It is then shown how this improvement
                 can be incorporated into the more general $0$--$1$
                 knapsack problem obtaining a square root improvement in
                 the asymptotic behavior. A new branch and search
                 algorithm that is significantly faster than the
                 Greenberg and Hegerich algorithm is also presented. The
                 results of extensive empirical studies comparing these
                 knapsack algorithms are given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming, dynamic",
}

@Article{Gordon:1974:BBM,
  author =       "William J. Gordon and Richard F. Riesenfeld",
  title =        "{Bernstein-B\'ezier} Methods for the Computer-Aided
                 Design of Free Form Curves and Surfaces",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "293--310",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The present paper provides a development in which the
                 Bezier methods emerge as an application of the
                 Bernstein polynomial approximation operator to
                 vector-valued functions. In this context, higher order
                 methods of the Bezier type are studied which have the
                 practical advantage of providing the designer a greater
                 degree of flexibility in controlling the shape of the
                 curve, but which maintain the basic simplicity of the
                 original Bezier technique. In a later paper, the
                 extension of the Bezier technique to splines will be
                 examined.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Also Research Publication GMR-1176, General Motors
                 Research Laboratories, March 1972.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "approximation theory; computer graphics; curves and
                 surfaces; design and modeling; patch; splines",
}

@Article{Dunham:1974:ECA,
  author =       "Charles B. Dunham",
  title =        "Efficiency of {Chebyshev} Approximation on Finite
                 Subsets",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "311--313",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Chebyshev approximation on an interval and closed
                 subsets by a Haar subspace are considered. The
                 closeness of best approximations on subsets to the best
                 approximation on the interval is examined. It is shown
                 that under favorable conditions the difference is $0$
                 ((density of the subset)$^2$), making it unnecessary to
                 use very large finite subsets to get good
                 approximations on the interval.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Balkovich:1974:CPG,
  author =       "E. Balkovich and W. Chiu and L. Presser and R. Wood",
  title =        "Comments on a Paper by {Gaver}",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "314--315",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 19:06:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kobayashi:1974:ADAa,
  author =       "Hisashi Kobayashi",
  title =        "Application of the Diffusion Approximation to Queueing
                 Networks {I}: {Equilibrium} Queue Distributions",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "316--328",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1974.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The paper introduces a vector-valued normal process
                 and its diffusion equation in order to obtain an
                 approximate solution to the joint distribution of queue
                 lengths in a general network of queues. In this model,
                 queueing processes of various service stations which
                 interact with each other are approximated by a
                 vector-valued Wiener process with some appropriate
                 boundary conditions. Some numerical examples are
                 presented and compared with Monte Carlo simulation
                 results. A companion paper, Part II, discusses
                 transient solutions via the diffusion approximation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "922",
  descriptors =  "Queueing network; analysis",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Michel:1974:SFQ,
  author =       "J. A. Michel and E. G. {Coffman, Jr.}",
  title =        "Synthesis of a Feedback Queueing Discipline for
                 Computer Operation",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "329--339",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Considerable effort has been invested in devising and
                 analyzing sequencing rules for multiprogrammed or
                 time-shared systems. A much studied discipline of this
                 kind is the so-called system with feedback to lower
                 priority queues. This discipline contains many
                 parameters, in general, which must be fixed in order to
                 achieve the desired waiting-time performance of the
                 discipline. In this paper the problem of synthesizing a
                 system of the above type is solved, by setting
                 parameter values so that the prespecified waiting time
                 criteria are satisfied, assuming Poisson arrival and
                 general service time parameters are known.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computers --- Data Communication Systems;
                 probability",
}

@Article{Katz:1974:PDL,
  author =       "Steven Katz and Alan G. Konheim",
  title =        "Priority Disciplines in a Loop System",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "340--349",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A loop system with $N$ buffered terminals sharing a
                 common time-multiplexed channel is studied. The service
                 discipline is prescribed by a permutation pi equals
                 (pi(1), \ldots{}, pi(N)) which gives the relative
                 ranking of the terminals. Data from the ith terminal
                 may be buffered at an intermediate terminal --- its
                 transmission to the CPU interrupted --- if there is a
                 conflict with data from a terminal with higher ranking.
                 It is shown how such systems may be analyzed and how
                 the system performance, as measured by average response
                 time, may be improved by imposing a suitable priority
                 discipline.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computers --- Data Communication Systems;
                 probability",
}

@Article{Hueckel:1974:ELV,
  author =       "Manfred H. Hueckel",
  title =        "Erratum: ``{A} Local Visual Operator Which Recognizes
                 Edges and Lines''",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "2",
  pages =        "350--350",
  month =        apr,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:20:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Hueckel:1973:LVO}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Batni:1974:EAF,
  author =       "Ramachendra P. Batni and Jeffrey D. Russell and
                 Charles R. Kime",
  title =        "An Efficient Algorithm for Finding an Irredundant Set
                 Cover",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "351--355",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 17 16:22:29 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The set covering problem is considered and an
                 efficient procedure for finding an irredundant cover is
                 presented. For an $m \times n$ cover table, the
                 execution time of the procedure is, in the worst case,
                 proportional to $m n$. Methods are suggested for
                 obtaining alternate irredundant covers based on an
                 initially obtained irredundant cover. The basic
                 cost-independent algorithm is heuristically extended to
                 consider costs so that a reduced-cost irredundant cover
                 can be obtained. A summary of some computational
                 experience is presented, which indicates that the
                 procedure is fast and applicable to large problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{Haralick:1974:DRD,
  author =       "Robert M. Haralick",
  title =        "The {Diclique} Representation and Decomposition of
                 Binary Relations",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "356--366",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The binary relation is often a useful mathematical
                 structure for representing simple relationships whose
                 essence is a directed connection. To better aid in
                 interpreting or storing a binary relation the authors
                 suggest a diclique decomposition. An algorithm is
                 described for determining the dicliques of a binary
                 reaction; it is proved that the set of such dicliques
                 has a nice algebraic structure. The algebraic structure
                 is used to show how dicliques can be coalesced, the
                 relationship between cliques and dicliques is
                 discussed, and an algorithm for determining cliques
                 from dicliques is described.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Hecht:1974:CRF,
  author =       "M. S. Hecht and J. D. Ullman",
  title =        "Characterizations of Reducible Flow Graphs",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "367--375",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is established that if $G$ is a reducible flow
                 graph, then edge $(n, m)$ is backward (a back latch) if
                 and only if either $n$ equals $m$ or $m$ dominates $n$
                 in $G$. Thus, the backward edges of a reducible flow
                 graph are unique. Further characterizations of
                 reducibility are presented. In particular, the
                 following are equivalent: (a) $G = (N, E, n_o)$ is
                 reducible. (b) The ``dag'' of $G$ is unique. (A dag of
                 a flow graph $G$ is a maximal acyclic flow graph which
                 is a subgraph of $G$.) (c) $E$ can be partitioned into
                 two sets $E_1$ and $E_2$ such that $E_1$ forms a dag
                 $D$ of $G$ and each $(n, m)$ in $E_2$ has $n$ equals
                 $m$ dominates $n$ in $G$. (d) Same as (c), except each
                 $(n, m)$ in $E_2$ has $n$ equals $m$ or $m$ dominates
                 $n$ in $D$. (e) Same as (c), except $E_2$ is the back
                 edge set of a depth-first spanning tree of $G$. (f)
                 Every cycle of $G$ has a node which dominates the other
                 nodes of the cycle. Finally, it is shown that there is
                 a ``natural'' single-entry loop associated with each
                 backward edge of a reducible flow graph.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Palmer:1974:EBC,
  author =       "E. M. Palmer and M. A. Rahimi and R. W. Robinson",
  title =        "Efficiency of a Binary Comparison Storage Technique",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "376--384",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The efficiency of an information storage technique
                 based on binary comparisons is analyzed. Generating
                 functions are applied to finding the mean and variance
                 of the number of comparisons needed to retrieve one
                 item from a store of $n$ items. Surprisingly, the
                 variance approaches $7^{-2/3}=pi^2$ for large $n$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information retrieval systems",
}

@Article{Wang:1974:ACN,
  author =       "Chung C. Wang",
  title =        "An Algorithm for the Chromatic Number of a Graph",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "385--391",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "N. Christofides' algorithm for finding the chromatic
                 number of a graph is improved both in speed and memory
                 space by using a depth-first search rule to search for
                 a shortest path in a reduced subgraph tree.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "graph color; mathematical techniques",
}

@Article{Wong:1974:CPR,
  author =       "C. K. Wong and Don Coppersmith",
  title =        "A Combinatorial Problem Related to Multimodule Memory
                 Organizations",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "392--402",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Neural/neural.5.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper deals with a combinatorial minimization
                 problem arising from studies on multimodule memory
                 organizations. Instead of searching for an optimum
                 solution, a particular solution is proposed and it is
                 demonstrated that it is close to optimum. Lower bounds
                 for the objective functions are obtained and compared
                 with the corresponding values of the particular
                 solution. The maximum percentage deviation of this
                 solution from optimum is also established.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; mathematical techniques",
}

@Article{Chaitin:1974:ITL,
  author =       "Gregory J. Chaitin",
  title =        "Information-Theoretic Limitations of Formal Systems",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "403--424",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Math/hilbert10.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An attempt is made to apply information-theoretic
                 computational complexity to meta-mathematics. The paper
                 studies the number of bits of instructions that must be
                 given to a computer for it to perform finite and
                 infinite tasks, and also the time it takes the computer
                 to perform these tasks. This is applied to measuring
                 the difficulty of proving a given set of theorems, in
                 terms of the number of bits of axioms that are assumed,
                 and the size of the proofs needed to deduce the
                 theorems from the axioms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; mathematical programming",
}

@Article{Gill:1974:AEC,
  author =       "John Gill and Manuel Blum",
  title =        "On Almost Everywhere Complex Recursive Functions",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "425--435",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $h$ be a recursive function. A partial recursive
                 function $\psi$ is i.o. (infinitely often) $h$-complex
                 if every program for $\psi$ requires more than $h(x)$
                 steps to compute $\psi(x)$ for infinitely many input
                 $x$. A more stringent notion is that of $\psi$ being
                 a.e. (almost everywhere) $h$-complex: $\psi$ is a.e.
                 $h$-complex if every program for $\psi$ requires more
                 than $h(x)$ steps to compute $\psi(x)$ for all but
                 finitely many inputs $x$. The construction of almost
                 everywhere complex recursive functions appears much
                 more difficult than the construction of infinitely
                 often complex recursive functions. There have been
                 found no ``natural'' examples of recursive functions
                 requiring more than polynomial time for all but
                 finitely many inputs. It is shown that from a single
                 example of a moderately a.e. complex recursive
                 function, one can obtain a.e. very complex recursive
                 functions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{Schubert:1974:ILR,
  author =       "L. K. Schubert",
  title =        "Iterated Limiting Recursion and the Program
                 Minimization Problem",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "436--445",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The general problem of finding minimal programs
                 realizing given ``program descriptions'' is considered,
                 where program descriptions may be of finite length and
                 may specify arbitrary program properties. The problem
                 of finding minimal programs consistent with finite or
                 infinite input-output lists is a special case (for
                 infinite input-output lists, this is a variant of E. M.
                 Gold's function identification problem). Although most
                 program minimization problems are not recursively
                 solvable, they are found to be no more difficult than
                 the problem of deciding whether any given program
                 realizes any given description, or the problem of
                 enumerating programs in order of nondecreasing length
                 (whichever is harder). This result is formulated in
                 terms of $k$-limiting recursive predicates and
                 functionals, defined by repeated application of Gold's
                 limit operator. A simple consequence is that the
                 program minimization problem is limiting recursively
                 solvable for finite input-output lists and 2-limiting
                 recursively solvable for infinite input-output lists,
                 with weak assumptions about the measure of program
                 size.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{Hibbard:1974:CLG,
  author =       "Thomas N. Hibbard",
  title =        "Context-Limited Grammars",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "446--453",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A phrase structure grammar is called context-limited
                 if there exists a partial ordering on its alphabet such
                 that any letter on the left of any production is less
                 than some letter on the right of the same production.
                 It is proved that context-limited grammars are
                 equivalent to context-free grammars, the equivalence
                 including ambiguity. The notion of ambiguity in phrase
                 structure grammars is discussed, and a new formal model
                 for ambiguity, based on directed plane graphs was
                 labeled edges, is outlined and compared with other
                 models.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Richman:1974:CSI,
  author =       "Paul L. Richman",
  title =        "Computing a Subinterval of the Image",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "454--458",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of computing a desired function value to
                 within a prescribed tolerance can be formulated in the
                 following two distinct ways: Formulation I: Given $x$
                 and $\epsilon > 0$, compute $f(x)$ to within
                 $\epsilon$. Formulation II: Given only that $x$ is in a
                 closed interval $X$, compute a subinterval of the
                 image, $f(x)$ equals $\{ f(x):x \subset X\}$. The first
                 formulation is applicable when $x$ is known to
                 arbitrary accuracy. The second formulation is
                 applicable when $x$ is known only to a limited
                 accuracy, in which case the tolerance is prescribed
                 albeit indirectly by the interval $X$, and one must be
                 satisfied with all or part of the set $X$ of possible
                 function values. Elsewhere the author has presented an
                 efficient solution to Formulation I for any rational
                 $f$ and many nonrational $f$. B. A. Chartres has
                 presented an efficient solution to Formulation II for a
                 very restricted class of rational $f$ and for a few
                 nonrational $f$. In this paper a solution to
                 Formulation II for the arbitrary nonconstant rational
                 $f$ is presented. By bounding $df/dx$ away from zero
                 over some subset of $X$, it is shown how to reduce
                 Formulation II to Formulation I, yielding the solution
                 given here.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{Kobayashi:1974:ADAb,
  author =       "Hisashi Kobayashi",
  title =        "Application of the Diffusion Approximation to Queueing
                 Networks {II}: {Nonequilibrium} Distributions and
                 Applications to Computer Modeling",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "459--469",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1974.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Quite often explicit information about the behavior of
                 a queue over a fairly short period is wanted. This
                 requires solving the nonequilibrium solution of the
                 queue-length distribution, which is usually quite
                 difficult mathematically. The first half of Part II
                 shows how the diffusion process approximation can be
                 used to answer this question. A transient solution is
                 obtained for a cyclic queueing model using the
                 technique of eigenfunction expansion. The second half
                 of Part II applies the earlier results of Part I to
                 modeling and performance problems of a typical
                 multiprogrammed computer system. Such performance
                 measures as utilization, throughput, response time and
                 its distribution, etc., are discussed in some detail.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  descriptors =  "Queueing network; analysis",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; probability",
}

@Article{Konheim:1974:WLT,
  author =       "Alan G. Konheim and Bernd Meister",
  title =        "Waiting Lines and Times in a System with Polling",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "470--490",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1974.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A communication system consisting of a number of
                 buffered input terminals connected to a computer by a
                 single channel is analyzed. The terminals are polled in
                 sequence and the data is removed from the terminal's
                 buffer. When the buffer has been emptied, the channel,
                 for an interval of randomly determined length, is used
                 for system overhead and\slash or to transmit data to
                 the terminals. The system then continues with a poll of
                 the next terminal. The stationary distributions of the
                 length of the waiting line and the queueing delay are
                 calculated for the case of identically distributed
                 input processes.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A communication system consisting of a number of
                 buffers input terminals connected to a computer by a
                 single channel is analyzed. The terminals are polled in
                 sequence and the data is removed from the terminal's
                 buffer. When the buffer has been emptied, the channel,
                 for an interval of randomly determined length, is used
                 for system overhead and/or to transmit data to the
                 terminals. The system then continues with a poll of the
                 next terminal. \ldots{}",
  classification = "922",
  descriptors =  "Queueing system; overhead time; polling; multidrop",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Robson:1974:BSF,
  author =       "J. M. Robson",
  title =        "Bounds for Some Functions Concerning Dynamic Storage
                 Allocation",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "491--499",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The amount of store necessary to operate a dynamic
                 storage allocation system, subject to certain
                 constraints, with no risk of breakdown due to storage
                 fragmentation, is considered. Upper and lower bounds
                 are given for this amount of store, both of them
                 stronger than those established earlier. The lower
                 bound is the exact solution of a related problem
                 concerning allocation of blocks whose size is always a
                 power of 2.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems",
}

@Article{Bellmore:1974:TMP,
  author =       "Mandell Bellmore and Saman Hong",
  title =        "Transformation of Multisalesmen Problem to the
                 Standard Traveling Salesman Problem",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "500--504",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that the multisalesmen problem can be
                 solved by solving the standard traveling salesman
                 problem on an expanded graph. The expanded graph has $m
                 1$ more nodes than the original graph where $m$ is the
                 number of salesmen available at the base.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming; mathematical techniques",
}

@Article{Trotter:1974:ABV,
  author =       "L. E. {Trotter, Jr.} and C. M. Shetty",
  title =        "An Algorithm for the Bounded Variable Integer
                 Programming Problem",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "505--513",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm is proposed for the bounded variable pure
                 integer programming problem which treats general
                 integer variables directly in an implicit enumeration
                 procedure closely related to that advanced by E. Balas
                 and A. M. Geoffrion for binary programming problems.
                 Means of obtaining near optimum solutions through a
                 slight modification of the algorithm are discussed.
                 Techniques which use bounds on variables to improve
                 algorithmic efficiency are developed and examined
                 computationally. Further computational results indicate
                 that direct treatment of general integer variables is
                 significantly more effective than binary expansion.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "integer programming; mathematical programming",
}

@Article{Fenner:1974:SNB,
  author =       "T. I. Fenner and G. Loizou",
  title =        "Some New Bounds on the Condition Numbers of Optimally
                 Scaled Matrices",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "514--524",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "New lower bounds on the minimal condition numbers of a
                 matrix with respect to both one-sided and two-sided
                 scaling by diagonal matrices are obtained. These bounds
                 improve certain results obtained by F. L. Bauer.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "condition; la; mathematical techniques; scaling",
}

@Article{Anonymous:1974:CJA,
  author =       "Anonymous",
  title =        "Contributions to the {Journal of the Association of
                 Computing Machinery}",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "3",
  pages =        "525--526",
  month =        jul,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 08 22:02:36 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Pages unnumbered, but follow 524. Next issue starts
                 with 525.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harrison:1974:PDL,
  author =       "Michael A. Harrison and Ivan M. Havel",
  title =        "On the Parsing of Deterministic Languages",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "525--548",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 17 16:22:42 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A parsing method for strict deterministic grammars is
                 presented and a technique for using it to parse any
                 deterministic language is indicated. An important
                 characterization of the trees of strict deterministic
                 grammars is established. This is used to prove
                 iteration theorems for (strict) deterministic
                 languages, and hence proving that certain sets are not
                 in these families becomes comparatively
                 straightforward. It is shown that every strict
                 deterministic grammar is LR(0) and that any strict
                 deterministic grammar is equivalent to a bounded right
                 context (1,0) grammar. Thus rigorous proofs that the
                 families of deterministic, LR(k), and bounded right
                 context languages are coextensive are presented for the
                 first time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory; parsing",
}

@Article{Hopcroft:1974:EPT,
  author =       "John Hopcroft and Robert Tarjan",
  title =        "Efficient Planarity Testing",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "549--568",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See comments and errata in \cite{Deo:1976:NHT}.",
  abstract =     "This paper describes an efficient algorithm to
                 determine whether an arbitrary graph $G$ can be
                 embedded in the plane. The algorithm may be viewed as
                 an iterative version of a method originally proposed by
                 L. Auslander and S. V. Parter and correctly formulated
                 by A. J. Goldstein. The algorithm uses depth-first
                 search and has $O(V)$ time and space bounds, where $V$
                 is the number of vertices in $G$. An ALGOL
                 implementation of the algorithm successfully tested
                 graphs with as many as 900 vertices in less than 12
                 seconds.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; mathematical
                 techniques",
}

@Article{Lehot:1974:OAD,
  author =       "Philippe G. H. Lehot",
  title =        "An Optimal Algorithm to Detect a Line Graph and Output
                 Its Root Graph",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "569--575",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Given a graph $H$ with $E$ edges and $N$ nodes, a
                 graph $G$ is sought such that $H$ is the line graph of
                 $G$, if $G$ exists. The algorithm does this within the
                 order of $E$ steps, in fact in $E$ plus $O(N)$ steps.
                 This algorithm is optimal in its complexity.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; mathematical
                 techniques",
}

@Article{Rubin:1974:SPH,
  author =       "Frank Rubin",
  title =        "A Search Procedure for {Hamilton} Paths and Circuits",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "576--580",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A search procedure is given which will determine
                 whether Hamilton paths or circuits exist in a given
                 graph, and will find one or all of them. A combined
                 procedure is given for both directed and undirected
                 graphs. The search consists of creating partial paths
                 and making deductions which determine whether each
                 partial path is a section of any Hamilton path
                 whatever, and which direct the extension of the partial
                 paths.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; mathematical
                 techniques",
}

@Article{Plemmons:1974:LLS,
  author =       "Robert J. Plemmons",
  title =        "Linear Least Squares by Elimination and {MGS}",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "581--585",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm combining Gaussian elimination with the
                 modified Gram--Schmidt (MGS) procedure is given for
                 solving the linear least squares problem. The method is
                 based on the operational efficiency of Gaussian
                 elimination for LU decompositions and the numerical
                 stability of MGS for unitary decompositions and is
                 designed for slightly overdetermined linear systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Cited in {\AA ke Bj\"orck's} bibliography on least
                 squares, which is available by anonymous ftp from {\tt
                 math.liu.se} in {\tt pub/references}.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Gram--Schmidt algorithm; lsq; lud; mathematical
                 techniques; nla",
}

@Article{Wang:1974:UEZ,
  author =       "Paul S. Wang",
  title =        "The Undecidability of the Existence of Zeros of Real
                 Elementary Functions",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "586--589",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Math/hilbert10.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "From Richardson's undecidability results, it is shown
                 that the predicate ``there exists a real number such
                 that $G(r)$ equals 0'' is recursively undecidable for
                 $G(x)$ in a class of functions which involves
                 polynomials and the sine function. The deduction
                 follows that the convergence of a class of improper
                 integrals is recursively undecidable.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Henschen:1974:URH,
  author =       "L. Henschen and L. Wos",
  title =        "Unit Refutations and {Horn} Sets",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "590--605",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The key concepts for this automated theorem-proving
                 paper are those of Horn set and strictly-unit
                 refutation. A Horn set is a set of clauses such that
                 none of its members contains more than one positive
                 literal. A strictly-unit refutation is a proof by
                 contradiction in which no step is justified by applying
                 a rule of inference to a set of clauses all of which
                 contain more than one literal. Horn sets occur in many
                 fields of mathematics such as the theory of groups,
                 rings, Moufang loops, and Henkin models. The usual
                 translation into first-order predicate calculus of the
                 axioms of these and many other fields yields a set of
                 Horn clauses. The striking feature of the Horn property
                 for finite sets of clauses is that its presence or
                 absence can be determined by inspection. Thus, the
                 determination of the applicability of the theorems and
                 procedures of this paper is immediate.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Nevins:1974:HOL,
  author =       "Arthur J. Nevins",
  title =        "A Human Oriented Logic for Automatic Theorem-Proving",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "606--621",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A deductive system is described which combines aspects
                 of resolution (e.g. unification and the use of Skolem
                 functions) with that of natural deduction and whose
                 performance compares favorably with the best predicate
                 calculus theorem provers.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Slagle:1974:ATP,
  author =       "James R. Slagle",
  title =        "Automated Theorem-Proving for Theories with
                 Simplifiers, Commutativity, and Associativity",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "622--642",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "To prove really difficult theorems, resolution
                 principle programs need to make better inferences and
                 to make them faster. An approach is presented for
                 taking advantage of the structure of some special
                 theories. These are theories with simplifiers,
                 commutativity, and associativity, which are valuable
                 concepts to build in, since they so frequently occur in
                 important theories, for example, number theory (plus
                 and times) and set theory (union and intersection). The
                 object of the approach is to build in such concepts in
                 a (refutation) complete, valid, efficient (in time)
                 manner by means of a ``natural'' notation and\slash or
                 new inference rules. Some of the many simplifiers that
                 can be built in are axioms for (left and right)
                 identities, inverses, and multiplication by zero.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Kung:1974:OOO,
  author =       "H. T. Kung and J. F. Traub",
  title =        "Optimal Order of One-Point and Multipoint Iteration",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "643--651",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem is presented of calculating a simple zero
                 of a nonlinear function $f$ by iteration. There is
                 exhibited a family of iterations of order $2^{n - 1}$
                 which use $n$ evaluations of $f$ and no derivative
                 evaluations, as well as a second family of iterations
                 of order $2^{n - 1}$ based on $n - 1$ evaluations of
                 $f$ and one of $f'$. In particular, with four
                 evaluations an iteration of eighth order is
                 constructed. The best previous result for four
                 evaluations was fifth order. It is proved that the
                 optimal order of one general class of multipoint
                 iterations is $2^{n - 1}$ and that an upper bound on
                 the order of a multipoint iteration based on $n$
                 evaluations of $f$ (no derivatives) is $2^n$. It is
                 conjectured that a multipoint iteration without memory
                 based on $n$ evaluations has optimal order $2^{n -
                 1}$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Rosenberg:1974:ASE,
  author =       "Arnold L. Rosenberg",
  title =        "Allocating Storage for Extendible Arrays",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "652--670",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Rosenberg:1975:CAS}.",
  abstract =     "The problem of allocating storage for extendible
                 arrays is examined in the light of the author's earlier
                 work on data graphs and addressing schemes. A formal
                 analog of the assertion that simplicity of array
                 extension precludes simplicity of traversal (marching
                 along rows\slash columns) is proved. Two strategies for
                 constructing extendible realizations of arrays are
                 formulated, and certain inherent limitations of such
                 realizations are established.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; computer operating systems ---
                 Storage Allocation",
}

@Article{Sethi:1974:TCR,
  author =       "Ravi Sethi",
  title =        "Testing for the {Church--Rosser} Property",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "671--679",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Sethi:1975:ETC}.",
  abstract =     "The central notion in a replacement system is one of a
                 transformation on a set of objects. Starting with a
                 given object, in one ``move'' it is possible to reach
                 one of a set of objects. An object from which no move
                 is possible is called irreducible. A replacement system
                 is Church--Rosser if starting with any object a unique
                 irreducible object is reached. A generalization of the
                 above notion is a replacement system consisting of a
                 set of objects ($S$), a transformation, and an
                 equivalence relation on $S$. A replacement system is
                 Church--Rosser if starting with objects equivalent
                 under an equivalence relation on S, equivalent
                 irreducible objects are reached. Necessary and
                 sufficient conditions are determined that simplify the
                 task of testing if a replacement system is
                 Church--Rosser. Attention will be paid to showing that
                 a replacement system is Church--Rosser using
                 information about parts of the system.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Wojcik:1974:ASR,
  author =       "Anthony S. Wojcik and Gernot Metze",
  title =        "An Analysis of Some Relationships Between Post and
                 {Boolean} Algebras",
  journal =      j-J-ACM,
  volume =       "21",
  number =       "4",
  pages =        "680--696",
  month =        oct,
  year =         "1974",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The fundamentals of Post algebras are presented and
                 Post and Boolean functions are examined. A functional
                 representation is developed that facilitates the
                 comparison of Post and Boolean algebras. Based on this
                 representation, relationships between finite,
                 higher-order (that is, more than 2-valued) Boolean
                 algebras and functions in these algebras and finite,
                 higher-order Post algebras and their corresponding
                 functions are developed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Valiant:1975:RRP,
  author =       "Leslie G. Valiant",
  title =        "Regularity and Related Problems for Deterministic
                 Pushdown Automata",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "1--10",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that to decide whether the language
                 accepted by an arbitrary deterministic pushdown
                 automaton is LL(k), or whether it is accepted by some
                 one-counter or finite-turn pushdown machine, must be at
                 least as difficult as to decide whether it is regular.
                 The regularity problem itself is analyzed in detail,
                 and R. E. Stearns' decision procedure for this (see
                 Engineering Index 1968 p 184) is improved by one level
                 of exponentiation. Upper bounds, close to known lower
                 bounds, are obtained for the succinctness with which a
                 pushdown automaton, and various restrictions of it, can
                 express equivalent finite-state machines.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Hsu:1975:AFM,
  author =       "Harry T. Hsu",
  title =        "An Algorithm for Finding a Minimal Equivalent Graph of
                 a Digraph",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "11--16",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An efficient algorithm for finding a minimal
                 equivalent graph (MEG) is presented. First, all the
                 strongly connected (s.c.) components are found. Then
                 the set of vertices is reordered such that the set of
                 vertices in an s.c. component is ordered by consecutive
                 integers. The rows and columns of the adjacency matrix
                 are permuted accordingly. Then an MEG for each s.c.
                 component is found. Finally, the parallel and the
                 superfluous edges are removed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Yu:1975:FCT,
  author =       "Clement T. Yu",
  title =        "A Formal Construction of Term Classes",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "17--37",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The computational complexity of a formal process for
                 the construction of term classes is examined. While the
                 process is proved to be difficult computationally,
                 heuristic methods are applied. Experimental results are
                 obtained to illustrate the maximum possible improvement
                 in system performance of retrieval using the formal
                 construction over simple term retrieval.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information retrieval systems --- Evaluation;
                 information science",
}

@Article{Horowitz:1975:CED,
  author =       "E. Horowitz and S. Sahni",
  title =        "On Computing the Exact Determinant of Matrices with
                 Polynomial Entries",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "38--50",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of computing the determinant of a matrix
                 of polynomials is considered. Four algorithms are
                 compared: expansion by minors, Gaussian elimination
                 over the integers, a method based on evaluation and
                 interpolation, and a procedure which computes the
                 characteristic polynomial of the matrix. Each method is
                 analyzed with respect to its computing time and storage
                 requirements using several models for polynomial
                 growth. First, the asymptotic time and storage is
                 developed for each method within each model. In
                 addition to these asymptotic results, the analysis is
                 done exactly for certain especially small, yet
                 practical and important cases. Then the results of
                 empirical studies are given which support conclusions
                 about which of the methods will work best within an
                 actual computing environment.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; mathematical
                 techniques",
}

@Article{Micchelli:1975:HOS,
  author =       "C. A. Micchelli and W. L. Miranker",
  title =        "High Order Search Methods for Finding Roots",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "51--60",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A class of search algorithms for locating the root of
                 a function is devised and studied. Each member of the
                 class of algorithms is globally convergent as is the
                 classical method of binary search. However, the class
                 contains members of higher order of convergence as
                 well. These higher order methods require the existence
                 of bounds on derivatives of the function whose root is
                 sought, and they proceed by exploiting these bounds.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; mathematical
                 techniques; root finding",
}

@Article{Rice:1975:MAQ,
  author =       "John R. Rice",
  title =        "A Metalgorithm for Adaptive Quadrature",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "61--82",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The few adaptive quadrature algorithms that have
                 appeared are significantly superior to traditional
                 numerical integration algorithms. The concept of
                 metalgorithm is introduced to provide a framework for
                 the systematic study of the range of interesting
                 adaptive quadrature algorithms. A principal result is
                 that there are from 1 to 10 million potentially
                 interesting and distinct algorithms. This is followed
                 by a considerable development of metalgorithm analysis.
                 In particular, theorems about the convergence
                 properties of various classes of algorithms are
                 established which theoretically show the experimentally
                 observed superiority of these algorithms. The final
                 part of the paper introduces the concept of a
                 characteristic length and its role is illustrated in an
                 analysis of three concrete realizations of the
                 metalgorithm.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; mathematical
                 techniques; numerical integration",
}

@Article{Fuller:1975:ADS,
  author =       "Samuel H. Fuller and Forest Baskett",
  title =        "An Analysis of Drum Storage Units",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "83--105",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Also published in/as: Stanford, DSL, SEL TR.26,.",
  abstract =     "The modeling and analysis of drum-like storage units
                 are discussed. Two common forms of drum organizations
                 and two common scheduling disciplines are considered:
                 the file drum and the paging drum; first-in-first-out
                 (FIFO) scheduling and shortest latency-time-first
                 (SLTF) scheduling. The modeling of the I/O requests to
                 the drum is an important aspect of this analysis. An
                 exact analysis of all the models except the SLTF file
                 drum is presented; in this case the complexity of the
                 drum organization has forced the acceptance of an
                 approximate analysis. In order to examine the error
                 introduced into the analysis of the SLTF file drum by
                 the approximations presented, the results of the
                 analytic models are compared to a simulation model of
                 the SLTF file drum. Comparisons of the models indicate
                 that the scheduling discipline is more important to
                 performance than drum organization.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A complete review of drum performance and queuing.",
  classification = "722; 723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; computer systems
                 programming --- Input Output Programs; data storage
                 units; probability --- Queueing Theory",
}

@Article{Kohler:1975:EAG,
  author =       "Walter H. Kohler and Kenneth Steiglitz",
  title =        "Exact, Approximate, and Guaranteed Accuracy Algorithms
                 for the Flow-Shop Problem $n/2/{F}/{\overline F}$",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "106--114",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Improved exact and approximate algorithms for the
                 $n$-job two-machine mean finishing time flow-shop
                 problem, n/2/F/mean value of F, are presented. While
                 other researchers have used a variety of approximate
                 methods to generate suboptimal solutions and
                 branch-and-bound algorithms to generate exact solutions
                 to sequencing problems, this work demonstrates the
                 computational effectiveness of coupling the two methods
                 to generate solutions with a guaranteed accuracy. The
                 computational requirements of exact, approximate, and
                 guaranteed accuracy algorithms are compared
                 experimentally on a set of test problems ranging in
                 size from 10 to 50 jobs. The approach is readily
                 applicable to other sequencing problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912; 913",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; operations
                 research; production control",
}

@Article{Sahni:1975:AAK,
  author =       "Sartaj Sahni",
  title =        "Approximate Algorithms for the 0/1 Knapsack Problem",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "115--124",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A series of increasingly accurate algorithms to obtain
                 approximate solutions to the 0/1 one-dimensional
                 knapsack problem is presented. Each algorithm
                 guarantees a certain minimal closeness to the optimal
                 solution value. The approximate algorithms are of
                 polynomial time complexity and require only linear
                 storage. Computational experience with these algorithms
                 is also presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; knapsack
                 problem; mathematical programming; operations
                 research",
}

@Article{Wright:1975:CMP,
  author =       "J. W. Wright",
  title =        "The Change-Making Problem",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "125--128",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A cashier has a number of coins of different
                 denominations at his disposal and wishes to make a
                 selection, using the least number of coins, to meet a
                 given total. The solution given here employs dynamic
                 programming. Suggestions are made which reduce the
                 volume of computation required in handling the
                 recursive equations. The method can be applied to the
                 one-dimensional cargo-loading and stock-cutting
                 problem, and it can be extended to the two-dimensional
                 problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 913; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "knapsack problem; mathematical programming, dynamic;
                 operations research",
}

@Article{Boyer:1975:PTA,
  author =       "Robert S. Boyer and J. Strother Moore",
  title =        "Proving Theorems About {LISP} Functions",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "129--144",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/lisp.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Program verification is the idea that properties of
                 programs can be precisely stated and proved in the
                 mathematical sense. Some simple heuristics combining
                 evaluation and mathematical induction are described,
                 which have been implemented in a program that
                 automatically proves a wide variety of theorems about
                 recursive LISP functions. The method the program uses
                 to generate induction formulas is described at length.
                 The theorems proved by the program include that REVERSE
                 is its own inverse and that a particular SORT program
                 is correct. A list of theorems proved by the program is
                 given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory --- Theorem Proving; computer
                 programming languages; LISP",
}

@Article{Yelowitz:1975:DPC,
  author =       "Lawrence Yelowitz",
  title =        "Derivation of a Path-Connectivity Matrix for Tagged
                 Flowcharts",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "145--154",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A procedure is given to derive a Boolean matrix M
                 corresponding to a flowchart in which certain edges are
                 distinguished as ``tagged.'' For any pair of tagged
                 edges $i$ and $j$, $M(i, j) = 1$ if and only if there
                 is at least one flowchart path from $i$ to $j$ in which
                 all of the intermediate edges are untagged. Such a
                 flowchart path is known as a ``tagged path''.
                 Modifications to the procedure are then given that
                 answer the related questions of determining the exact
                 number of tagged paths as well as an explicit listing
                 of these paths between two given edges. A computer
                 representation is described which leads to efficient
                 implementation of the procedure.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages; mathematical
                 techniques --- Graph Theory",
}

@Article{Ladner:1975:SPT,
  author =       "Richard E. Ladner",
  title =        "On the Structure of Polynomial Time Reducibility",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "1",
  pages =        "155--171",
  month =        jan,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Two notions of polynomial time reducibility, denoted
                 by $\leq T^P$ and $\leq m_P$, were defined by S. A.
                 Cook and R. M. Karp, respectively. The abstract
                 properties of these two relations on the domain of
                 computable sets are investigated. Both relations prove
                 to be dense and to have minimal pairs. Further, there
                 is a strictly ascending sequence with a minimal pair of
                 upper bounds to the sequence. The author's method of
                 showing density yields and the result that if P does
                 not equal NP then there are members of NP--P that are
                 not polynomial complete.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Gotlieb:1975:EPM,
  author =       "C. C. Gotlieb and G. H. MacEwen",
  title =        "Errata: ``{Performance} of Movable-Head Disk Storage
                 Devices''",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "172--172",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat May 11 07:19:31 1996",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Gotlieb:1973:PMH}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lowrance:1975:ESS,
  author =       "Roy Lowrance and Robert A. Wagner",
  title =        "An Extension of the String-to-String Correction
                 Problem",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "177--183",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:27:10 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The string-to-string correction problem asks for a
                 sequence $S$ of ``edit operations'' of minimal cost
                 such that S(A) equals B, for given strings A and B. The
                 edit operations previously investigated allow changing
                 one symbol of a string into another single symbol,
                 deleting one symbol from a string, or inserting a
                 single symbol into a string. This paper extends the set
                 of allowable edit operations to include the operation
                 of interchanging the positions of two adjacent
                 characters. Under certain restrictions on
                 edit-operation costs, it is shown that the extended
                 problem can still be solved in time proportional to the
                 product of the lengths of the given strings.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  comment =      "``The string to string correction problem asks for a
                 sequence $S$ of `edit operations' of minimal cost such
                 that $S(A) = B$, for given strings $A$ and $B$. The
                 edit operations previously investigated allow changing
                 one symbol of a string into another single symbol,
                 deleting one symbol from a string, or inserting a
                 single symbol into a string. This paper extends the set
                 of allowable edit operations to include the operation
                 of interchanging the positions of two adjacent
                 characters. Under certain restrictions on
                 edit-operation costs, it is shown that the extended
                 problem can still be solved in time proportional to the
                 product of the lengths of the given strings.''",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; edit operations;
                 string-to-string correction",
}

@Article{Morgenstern:1975:LCC,
  author =       "Jacques Morgenstern",
  title =        "The Linear Complexity of Computation",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "184--194",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The notion of the linear algorithm to compute a family
                 F of linear forms in r variables over a field is
                 defined. Ways to save additions are investigated by
                 analyzing the combinatorial aspects of linear
                 dependences between subrows of a given matrix F.
                 Further, an additive degree of freedom is defined,
                 which turns out to be an exact measure of the
                 complexity of computation of F.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computational complexity; mathematical techniques",
}

@Article{Muller:1975:BCN,
  author =       "David E. Muller and Franco P. Preparata",
  title =        "Bounds to Complexities of Networks for Sorting and for
                 Switching",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "195--201",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321879.321882",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A network which sorts $n$ numbers, when used to sort
                 numbers of only two sizes, $0$ and $1$, can be regarded
                 as forming the $n$ frontal (unate) symmetric Boolean
                 functions of $n$ arguments. When sorting networks are
                 constructed from comparator modules they have been
                 widely conjectured to require: (1) delay time or number
                 of levels of order $(\log_2 n)^2$, (2) size or number
                 of elements of order $n(\log_2 n)^2$, and (3) formula
                 length or number of literals of order $(n^{\log_2
                 n})^2$. It is proved constructively in the paper that,
                 if one permits the use of negations in constructing the
                 corresponding Boolean functions, these three measures
                 of complexity can be reduced to the orders of $\log_2
                 n$, $n$, and $n^5$, respectively. The latter network,
                 however, is incapable of sorting numbers other than
                 $0$'s and $1$'s and may be thought of as merely
                 counting the number of inputs which are $1$. It is
                 shown, however, that one may incorporate this network
                 in a larger network which does sort and In time
                 proportional to only $\log_2 n$ This network is the
                 first known example of a nonadaptive network capable of
                 sorting in time less than $(\log_2 n)^2$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computational complexity; computer metatheory",
}

@Article{Perl:1975:EGO,
  author =       "Y. Perl and M. R. Garey and S. Even",
  title =        "Efficient Generation of Optimal Prefix Code:
                 Equiprobable Words Using Unequal Cost Letters",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "202--214",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm for constructing an optimal prefix code
                 of $n$ equiprobable words over r unequal cost coding
                 letters is given. The discussion is in terms of rooted
                 labeled trees. The algorithm consists of two parts. The
                 first one is an extension algorithm which constructs a
                 prefix code of $n$ words. This code is either optimal
                 or is a ``good'' approximation. The second part is a
                 mending algorithm which changes the code constructed by
                 the extension algorithm into an optimal code in case it
                 is not already optimal. The validity of the combined
                 algorithm is proved and its structure is analyzed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "codes, symbolic; mathematical techniques --- Trees",
}

@Article{Tarjan:1975:EGL,
  author =       "Robert Endre Tarjan",
  title =        "Efficiency of a Good But Not Linear Set Union
                 Algorithm",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "215--225",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Two types of instructions for manipulating a family of
                 disjoint sets which partition a universe of $n$
                 elements are considered FIND($x$) computes the name of
                 the (unique) set containing element $x$. UNION($A,B,C$)
                 combines sets $A$ and $B$ into a new set named $C$. A
                 known algorithm for implementing sequences of these
                 instructions is examined. It is shown that, if $(m, n)$
                 is the maximum time required by a sequence of $m \geq
                 n$ FINDs and $n - 1$ intermixed UNIONs, then $k_1 m
                 \alpha(m, n) \leq t(m, n) \leq k_2 m \alpha(m, n)$ for
                 some positive constants $k_1$ and $k_2$, where $\alpha
                 (m, n)$ is related to a functional inverse of
                 Ackermann's function and is very slow-growing.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Trees",
}

@Article{Knauer:1975:SPC,
  author =       "Bernd Knauer",
  title =        "A Simple Planarity Criterion",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "226--230",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm is presented which either directly
                 establishes the nonplanarity of a graph $G$ or
                 completes $G$ to a locally Hamiltonian graph in such a
                 way that the locally Hamiltonian graph is planar if and
                 only if $G$ is. The planarity of the locally
                 Hamiltonian graph may be verified readily by a theorem
                 of Skupien.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Hamiltonian graph; mathematical techniques; planarity
                 algorithms",
}

@Article{Babad:1975:GME,
  author =       "Jair M. Babad",
  title =        "A Generalized Multi-Entrance Time-Sharing Priority
                 Queue",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "231--247",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1975.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A generalized multientrance and multipriority $M/G/1$
                 time-sharing system is dealt with. The system maintains
                 many separate queues, each identified by two integers:
                 the priority level and the entry level. The arrival
                 process of users is a homogeneous Poisson process,
                 while service requirements are identically distributed
                 and have a finite second moment. Upon arrival a user
                 joins one of the levels, through the entry queue of
                 this level. In the $(n, k)$-th queue, where $n$ is the
                 priority level and $k$ is the entry level, a user is
                 eligible to a (finite or infinite) quantum of service.
                 If the service requirements of the user are satisfied
                 during the quantum, the user departs, and otherwise, is
                 transferred to the end of the $(n + 1, k)$-th queue for
                 additional service. When a quantum of service is
                 completed, the highest priority nonempty level is
                 chosen to be served next.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  descriptors =  "Queueing system; priority; analysis",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming; probability --- Queueing
                 Theory",
}

@Article{Baskett:1975:OCM,
  author =       "Forest Baskett and K. Mani Chandy and Richard R. Muntz
                 and Fernando G. Palacios",
  title =        "Open, Closed and Mixed Networks of Queues with
                 Different Classes of Customers",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "248--260",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 17 16:22:58 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Load.Balance.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The joint equilibrium distribution of queue sizes in a
                 network of queues containing $N$ service centers and
                 $R$ classes of customers is derived. The equilibrium
                 state probabilities have the general form $P(S)$ equals
                 $C_d(S)$ $f_1(x_1) f_2(x_2) \ldots{} f_N(x_N)$, where
                 $S$ is the state of the system, $x_i$ is the
                 configuration of customers at the ith service center,
                 $d(S)$ is a function of the state of the model, $f_i$
                 is a function that depends on the type of the $i$th
                 service center, and $C$ is a normalizing constant. It
                 is assumed that the equilibrium probabilities exist and
                 are unique. Four types of service centers to model
                 central processors, data channels, terminals, and
                 routing delays are considered.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The joint equilibrium distribution of queue sizes in a
                 network of queues containing $n$ service centers and
                 $r$ classes of customers is derived. The equilibrium
                 state probabilities have the general form $p(s)=cd(s)
                 f_1(x_1) f_2(x_2) \ldots f_n(x_n)$, where $s$ is the
                 state of the system, $x_i$ is the configuration of
                 customers at the $i$-th service center, $d(s)$ is a
                 function of the state of the model, $f_i$ is a function
                 that depends on the type of the $i$-th \ldots{}.",
  classification = "723; 922",
  descriptors =  "Exponential queueing network; imbedded Markov chain;
                 BCMP; processor sharing; stationary process; FIFO;
                 LIFO; number of elements in system; method",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming; Laplace transforms;
                 Markov processes; probability --- Queueing Theory",
}

@Article{Gelenbe:1975:ACS,
  author =       "Erol Gelenbe",
  title =        "On Approximate Computer System Models",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "261--269",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1975.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new treatment of the boundary conditions of
                 diffusion approximations for interconnected queueing
                 systems is presented. The results have applications to
                 the study of the performance of multiple-resource
                 computer systems. In this approximation method
                 additional equations to represent the behavior of the
                 queues when they are empty are introduced. This reduces
                 the dependence of the model on heavy traffic
                 assumptions and yields certain results which would be
                 expected from queueing or renewal theory. The accuracy
                 of the approach is evaluated by comparison with certain
                 known exact or numerical results.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  descriptors =  "Computer System; Modeling; Approximation",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming; probability --- Queueing
                 Theory",
}

@Article{Hofri:1975:PSD,
  author =       "Micha Hofri and Micha Yadin",
  title =        "A Processor in Series with Demand-Interrupting Devices
                 --- a Stochastic Model",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "270--290",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A demand-interrupting device is any attachment to a
                 computer which, when busy, blocks a processor that
                 requires further service from it. In this paper a
                 system is considered with a processor rendering two
                 types of service, so as to be able to take advantage of
                 enforced idle times, which is connected to one or two
                 demand-interrupting devices that feed back the programs
                 to the processor. The distribution of the holding time
                 in the processor and the utilization figures for all
                 the components are computed under several assumptions
                 on the distributions of the services performed by the
                 demand interrupting devices and the delay-type service
                 performed by the processor. The principal processor
                 service duration is assumed to be exponentially
                 distributed throughout the discussion.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming; demand interrupting;
                 processors",
}

@Article{Musser:1975:MPF,
  author =       "David R. Musser",
  title =        "Multivariate Polynomial Factorization",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "291--308",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper describes algorithms for factoring a
                 polynomial in one or more variables, with integer
                 coefficients, into factors which are irreducible over
                 the integers. These algorithms are based on the use of
                 factorizations over finite fields and ``Hensel's lemma
                 constructions.'' ``Abstract algorithm'' descriptions
                 are used in the presentation of the underlying
                 algebraic theory. Included is a new generalization of
                 Hensel's $p$-adic construction which leads to a
                 practical algorithm for factoring multivariate
                 polynomials.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; factorization; statistical
                 methods",
}

@Article{Rosenberg:1975:CAS,
  author =       "Arnold L. Rosenberg",
  title =        "Corrigendum: ``{Allocating} Storage for Extendible
                 Arrays''",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "2",
  pages =        "308--308",
  month =        apr,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:31:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Rosenberg:1974:ASE}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Schank:1975:IPC,
  author =       "Roger C. Schank and Neil M. Goldman and Charles J.
                 {Rieger III} and Christopher K. Riesbeck",
  title =        "Inference and Paraphrase by Computer",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "309--328",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The MARGIE system is a set of three programs that
                 attempt to understand natural language. They are based
                 on the Conceptual Dependency system for meaning
                 representation. The analysis program maps sentences
                 into conceptual structures. The memory program makes
                 inferences from input conceptual structures. The
                 generator codes conceptual structures back into natural
                 language. Together the programs function as a
                 paraphrase and inference system.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 731",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; paraphrase and inference system;
                 systems science and cybernetics",
}

@Article{Chaitin:1975:TPS,
  author =       "Gregory J. Chaitin",
  title =        "A Theory of Program Size Formally Identical to
                 Information Theory",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "329--340",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new definition of program-size complexity is made.
                 H(A,B/C,D) is defined to be the size in bits of the
                 shortest self-delimiting program for calculating
                 strings A and B if one is given a minimal-size
                 self-delimiting program for calculating strings C and
                 D. This differs from previous definitions: (1) programs
                 are required to be self-delimiting, i.e., no program is
                 a prefix of another, and (2) instead of being given C
                 and $D$ directly, one is given a program for
                 calculating them that is minimal in size. Unlike
                 previous definitions, this one has precisely the formal
                 properties of the entropy concept of information
                 theory.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 731",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "codes, symbolic; computer metatheory; information
                 theory",
}

@Article{Lynch:1975:RCS,
  author =       "Nancy Lynch",
  title =        "On Reducibility to Complex or Sparse Sets",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "341--345",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Sets which are efficiently reducible (in Karp's sense)
                 to arbitrarily complex sets are shown to be polynomial
                 computable. Analogously, sets efficiently reducible to
                 arbitrarily sparse sets are polynomial computable. A
                 key lemma for both proofs shows that any set which is
                 not polynomial computable has an infinite recursive
                 subset of its domain, on which every algorithm runs
                 slowly on almost all arguments.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "731",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "complex sets; reducibility; sparse sets; systems
                 science and cybernetics",
}

@Article{Manacher:1975:NLT,
  author =       "Glenn Manacher",
  title =        "A New Linear-Time ``On-Line'' Algorithm for Finding
                 the Smallest Initial Palindrome of a String",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "346--351",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Despite significant advances in linear-time scanning
                 algorithms, particularly those based wholly or in part
                 on either Cook's linear-time simulation of two-way
                 deterministic pushdown automata or Weiner's algorithm,
                 the problem of recognizing the initial leftmost nonvoid
                 palindrome of a string in time proportional to the
                 length $N$ of the palindrome, examining no symbols
                 other than those in the palindrome, has remained open.
                 The algorithm presented solves this problem, assuming
                 that addition of two integers less than or equal to $N$
                 may be performed in a single operation. Like the
                 Knuth-Morris-Pratt algorithm, it runs in time
                 independent of the size of the input alphabet. The
                 algorithm as presented finds only even palindromes.
                 However, an extension allows one to recognize the
                 initial odd or even palindrome of length 2 or
                 greater.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; computer systems, digital --- On
                 Line Operation; linear-time algorithm; palindromes",
}

@Article{Goodman:1975:AHC,
  author =       "S. E. Goodman and S. T. Hedetniemi and P. J. Slater",
  title =        "Advances on the {Hamiltonian} Completion Problem",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "352--360",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The Hamiltonian completion problem for an arbitrary
                 graph $G$ consists of determining the minimum number of
                 new lines which can be added to $G$ in order to produce
                 a Hamiltonian cycle in $G$. A solution to this problem
                 would be useful in situations where it is necessary to
                 traverse periodically a network or data structure in
                 such a way as to visit all nodes and minimize the
                 length of the traversal. Linear algorithms are
                 presented for solving the Hamiltonian completion
                 problem for several classes of graphs, in particular
                 for trees and unicyclic graphs. Several more general
                 results are also given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Hamiltonian cycle; linear algorithms; mathematical
                 techniques",
}

@Article{Pfaltz:1975:RGK,
  author =       "John L. Pfaltz",
  title =        "Representing Graphs by {Knuth} Trees",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "361--366",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "By means of the Knuth transform, arbitrary rooted
                 trees may be represented compactly as binary trees. In
                 this paper it is shown that the domain of this
                 transform may be extended to a much wider class of
                 graphs, while still maintaining its fundamental
                 properties. Graphs, G, belonging to this extended
                 domain are characterized first in terms of properties
                 of an induced graph, G*, and then in terms of local
                 properties of $G$ itself. A classic kind of
                 ``forbidden'' subgraph theorem characterizes
                 nonrepresentable graphs. Finally, it is shown that any
                 directed graph can be modified to make it representable
                 under the transform.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Knuth transform; Knuth trees; mathematical techniques;
                 mathematical transformations",
}

@Article{Elias:1975:CSS,
  author =       "Peter Elias and Richard A. Flower",
  title =        "The Complexity of Some Simple Retrieval Problems",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "367--379",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Four costs of a retrieval algorithm are the number of
                 bits needed to store a representation of a data base,
                 the number of those bits which must be accessed to
                 answer a retrieval question, the number of bits of
                 state information required, and the logic complexity of
                 the algorithm. Firm lower bounds are given to measures
                 of the first three costs for simple binary retrieval
                 problems. Systems are constructed which attain each
                 bound separately. A system which finds the value of the
                 $k$th bit in an $N$-bit string attains all bounds
                 simultaneously. For two other more complex retrieval
                 problems there are trading curves between storage and
                 worst-case access, and between storage and average
                 access. Lower and upper bounds to the trading curves
                 are found.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information retrieval systems",
}

@Article{Dressler:1975:PPS,
  author =       "Robert E. Dressler and S. Thomas Parker",
  title =        "Primes with a Prime Subscript",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "380--381",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 17 16:23:20 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $p_i$ be the $i$th prime and let $\{q_i\}$ be the
                 very thin subsequence of the primes defined by $q_i =
                 p_{p_i}$. It is shown, with the aid of a computer, that
                 every integer greater than $96$ is representable as a
                 sum of distinct members of the sequence $\{q_i\}$.
                 Furthermore, the lower bound is the best possible.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques; primes",
}

@Article{Bruno:1975:GOC,
  author =       "J. L. Bruno and T. Lassagne",
  title =        "The Generation of Optimal Code for Stack Machines",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "382--396",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of generating ``optimal'' programs for the
                 evaluation of arithmetic expressions on a machine with
                 a finite depth stack is studied. Efficient algorithms
                 are given for constructing optimal programs in the case
                 where the expressions are trees, there are no data
                 dependencies, and the operators have limited algebraic
                 properties.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 731; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "codes, symbolic; mathematical techniques --- Trees",
}

@Article{Oney:1975:QAS,
  author =       "Walter C. Oney",
  title =        "Queueing Analysis of the Scan Policy for Moving-Head
                 Disks",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "397--412",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A brief survey of queueing-theory analyses of disk
                 service policies is given. The SCAN policy for
                 moving-head devices is examined in detail using three
                 models. An idealized model in which the head always
                 covers the entire disk is exactly analyzed to determine
                 the spatial bias in queueing time. A realistic model is
                 used to obtain an exact numeric solution as well as an
                 asymptotic formula valid in saturation. Finally, the
                 time required to clear a clump of demands for both the
                 FIFO and SCAN strategies is computed. Simulations and
                 theoretic calculations are reported for two different
                 disk units.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 722; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data storage, magnetic --- Disk; probability",
}

@Article{Ross:1975:CSE,
  author =       "G. Terry Ross and D. Klingman and A. Napier",
  title =        "A Computational Study of the Effects of Problem
                 Dimensions on Solution Times for Transportation
                 Problems",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "413--424",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 17 16:23:34 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An in-depth study of the influence of problem
                 structure on the computational efficiency of the primal
                 simplex transportation algorithm is presented. The
                 input of the study included over 1000 randomly
                 generated problems with 185 different combinations of
                 the number of sources, the number of destinations, and
                 the number of variables. Objective function
                 coefficients were generated using three different
                 probability distributions to study the effects of
                 variance and skewness in these parameters.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "430; 723; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming, linear; mathematical
                 statistics --- Random Number Generation;
                 transportation",
}

@Article{Sethi:1975:ETC,
  author =       "Ravi Sethi",
  title =        "Errata: ``{Testing} for the {Church--Rosser}
                 Property''",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "424--424",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 16:01:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Sethi:1974:TCR}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Svoboda:1975:CTE,
  author =       "Antonin Svoboda",
  title =        "The Concept of Term Exclusiveness and Its Effect on
                 the Theory of {Boolean} Functions",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "3",
  pages =        "425--440",
  month =        jul,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 19:53:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Easton:1975:ECC,
  author =       "M. C. Easton and C. K. Wong",
  title =        "The Effect of a Capacity Constraint on the Minimal
                 Cost of a Partition",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "441--449",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of finding a partition of nonnegative
                 numbers into $m$ groups to minimize a certain cost, the
                 sum of the squares of the group sums, is applicable to
                 the allocation of data records to disks so as to
                 minimize arm contention, under certain assumptions
                 about record accessing behavior. Previous treatment has
                 assumed that the disk capacities were so large that
                 capacity constraints could be ignored. Consideration of
                 the effect of such constraints, assuming equal-sized
                 data records and equal-sized disks, leads to the
                 problem of partitioning numbers (which represent access
                 probabilities) into $m$ groups of at most $k$ numbers
                 each. A practical method for partitioning is shown to
                 yield a cost no more than $4/3$ of the minimal cost
                 without the constraint on group size. Therefore,
                 increasing the disk capacity and arbitrarily changing
                 the partition cannot reduce the arm contention cost
                 below 75 percent of that achieved on the existing
                 system with the suggested partition. The result also
                 shows that the proposed partition has a cost for the
                 constrained problem at most $4/3$ of the minimal cost
                 for the constrained problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data storage, magnetic",
}

%% Page 470 is notice page
@Article{Horowitz:1975:SAP,
  author =       "Ellis Horowitz",
  title =        "A Sorting Algorithm for Polynomial Multiplication",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "450--462",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Given two polynomials with $n$ nonzero terms and $t$
                 terms in the product, $2n - 1 \leq t \leq n^2$, it is
                 shown that the conventional polynomial multiplication
                 algorithm can take as many as $O(n^3)$ operations. An
                 alternate algorithm which does a binary merge-sort is
                 given which has a worst-case bound of $O(n^2 \log_2 n)$
                 exponent comparisons but may require $O(n^2)$ storage.
                 A new algorithm, based upon a sorting strategy for the
                 exponents, is given which behaves as $O(n^2 \log_2 n)$
                 and requires only $O(t)$ storage. Moreover, the
                 algorithm works in linear time for several important
                 special cases, namely for completely dense and
                 completely sparse polynomials.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; computer systems programming ---
                 Sorting",
}

@Article{Ibarra:1975:FAA,
  author =       "Oscar H. Ibarra and Chul E. Kim",
  title =        "Fast Approximation Algorithms for the Knapsack and Sum
                 of Subset Problems",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "463--468",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 17 16:23:45 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm is presented which finds for any 0 less
                 than epsilon less than 1 an approximate solution P
                 prime satisfying (P* minus P prime)/P* less than
                 equivalent to epsilon, where P* is the desired optimal
                 sum. Moreover, for any fixed epsilon, the algorithm has
                 time complexity $O(n \log n)$ and space complexity
                 $O(n)$. Modification of the algorithm for the unbounded
                 knapsack problem results in a $O(n)$ computing time. A
                 linear-time algorithm is also obtained for a special
                 class of 0/1 knapsack problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming; mathematical techniques ---
                 Combinatorial Mathematics",
}

@Article{Kung:1975:FMS,
  author =       "H. T. Kung and F. Luccio and F. P. Preparata",
  title =        "On Finding the Maxima of a Set of Vectors",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "469--476",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/75.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $U_1$, $U_2$, \ldots{}, $U_d$ be totally ordered
                 sets and let $V$ be a set of $n$ $d$-dimensional
                 vectors in $U_1 \times U_2 \cdots{} \times U_d$. A
                 partial ordering is defined on $V$ in a natural way.
                 The problem of finding all maximal elements of $V$ with
                 respect to the partial ordering is considered.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{Winograd:1975:PEC,
  author =       "S. Winograd",
  title =        "On the Parallel Evaluation of Certain Arithmetic
                 Expressions",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "477--492",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321906.321911",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The time required to evaluate arithmetic expressions
                 using parallel processing is investigated. It is shown
                 that for the evaluation of an arithmetic expression of
                 $n$ variables without division, in which every variable
                 appears only once, at most $ 3 n / 2p + o(n)$ time
                 units are required if $p$ processors are used. In case
                 the expression includes the division operation, the
                 bound is raised to $5 n / 2 p + o(n)$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computational complexity; computer arithmetic;
                 mathematical programming; parallel processing",
}

@Article{Bertsch:1975:ORP,
  author =       "Eberhard Bertsch",
  title =        "An Observation on Relative Parsing Time",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "493--498",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 19:53:11 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sudborough:1975:NTB,
  author =       "I. H. Sudborough",
  title =        "A Note on Tape-Bounded Complexity Classes and Linear
                 Context-Free Languages",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "499--500",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 19:53:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dass:1975:SBC,
  author =       "Bal Kishan Dass",
  title =        "A Sufficient Bound for Codes Correcting Bursts with
                 Weight Constraint",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "501--503",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An upper bound on the sufficient number of
                 parity-check positions of a linear code capable of
                 correcting bursts of a given length or less having a
                 weight constraint over them is presented. An example of
                 a code which corrects all bursts of length 3 or less
                 that have weight 2 or less is given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "burst error correcting codes; codes, symbolic",
}

@Article{Cash:1975:CIR,
  author =       "J. R. Cash",
  title =        "A Class of Implicit {Runge--Kutta} Methods for the
                 Numerical Integration of Stiff Ordinary Differential
                 Equations",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "504--511",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "One-step methods similar in design to the well-known
                 class of Runge--Kutta methods are developed for the
                 efficient numerical integration of both stiff and
                 nonstiff systems of first-order ordinary differential
                 equations. The algorithms developed combine accuracy in
                 the limit $h$ approaches 0 with a large region of
                 absolute stability and are demonstrated by direct
                 application to certain particular examples.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Miller:1975:CSN,
  author =       "Webb Miller",
  title =        "Computer Search for Numerical Instability",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "512--521",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/auto.diff.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is often possible to define a measure, $\omega(d)
                 \geq 0$, of the effect of rounding error upon a fixed
                 numerical algorithm given data $d$. One reasonable
                 choice is for $\omega$ to measure how much the exact
                 computational problem must be perturbed to compensate
                 for rounding error. Such ``Wilkinson numbers''
                 $\omega(d)$ are investigated, with particular attention
                 given to their numerical evaluation. Also, an automatic
                 roundoff analysis is described, which shows that the
                 usual algorithm for inverting triangular matrices does
                 not enjoy a certain very stringent stability
                 property.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming; mathematical techniques",
}

@Article{Krause:1975:AST,
  author =       "K. L. Krause and V. Y. Shen and H. D. Schwetman",
  title =        "Analysis of Several Task-Scheduling Algorithms for a
                 Model of Multiprogramming Computer Systems",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "522--550",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Krause:1977:EAS}.",
  abstract =     "An abstract system model is presented which consists
                 of several identical and independent task processors
                 and a memory of arbitrary size. Tasks are represented
                 by processing-time and memory requirements which must
                 be met by the model. Worst-case performance bounds are
                 derived for several simple scheduling algorithms. A new
                 heuristic algorithm, which uses a look-ahead strategy,
                 is introduced. This algorithm is shown to be better in
                 many cases than the simpler algorithms when the
                 worst-case performance bounds are compared.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming",
}

@Article{Hayes:1975:FSS,
  author =       "John P. Hayes",
  title =        "The Fanout Structure of Switching Functions",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "551--571",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of determining the amount of fanout
                 required to realize a switching function is
                 investigated. The significance of fanout in switching
                 networks is discussed. Fanout-free functions are
                 introduced and their properties examined. Two
                 relations, adjacency and masking, are defined on the
                 variables $X$ of a function $f(X)$, and these relations
                 are used to characterize fanout-free functions. A
                 quantity $\tau(f)$ called the input fanout index of $f$
                 is defined for arbitrary switching functions; $\tau(f)$
                 represents the minimum number of input variables that
                 require fanout in any realization of $f$. It is shown
                 that $\tau(f)$ can be determined from the prime
                 implicants and prime implicates of $f$ using two
                 additional relations on $X$, the conjugate property and
                 compatibility. An algorithm is presented for finding a
                 realization of $f$ in which only $\tau(f)$ variables
                 fan out. Some other measures of fanout are briefly
                 considered.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "switching theory",
}

@Article{Kowalski:1975:PPU,
  author =       "Robert Kowalski",
  title =        "A Proof Procedure Using Connection Graphs",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "572--595",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/formal.hardware.verification.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Various deficiencies of resolution systems are
                 investigated and a new theorem-proving system designed
                 to remedy those deficiencies is presented. The system
                 is notable for eliminating redundancies present in
                 SL-resolution, for incorporating preprocessing
                 procedures, for liberalizing the order in which
                 subgoals can be activated, for incorporating
                 multidirectional searches, and for giving immediate
                 access to pairs of clauses which resolve. Examples of
                 how the new system copes with the deficiencies of other
                 theorem-proving systems are chosen from the areas of
                 predicate logic programming and language parsing. The
                 opportunities for using look-ahead to guide the search
                 for proofs are discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Logic; mathematical programming; mathematical
                 techniques --- Graph Theory",
}

@Article{Jump:1975:IAC,
  author =       "J. Robert Jump and P. S. Thiagarajan",
  title =        "On the Interconnection of Asynchronous Control
                 Structures",
  journal =      j-J-ACM,
  volume =       "22",
  number =       "4",
  pages =        "596--612",
  month =        oct,
  year =         "1975",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The closure properties of a class of control systems
                 which can be represented by a graphical model called an
                 MG-control system (MGCS) are studied. Necessary and
                 sufficient conditions are presented for the composite
                 system, obtained by interconnecting two of these
                 systems, to be represented as an MGCS. These results
                 are then extended to networks composed of several
                 interconnected control systems. In solving this
                 problem, it is shown that whenever the interconnection
                 of two or more systems results in a system that is not
                 representable as an MGCS, it is due to the presence of
                 ``deadlock'' in the composite system. Hence, these
                 results provide a means of detecting deadlock in a
                 network of control systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "731",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "asynchronous control systems; control systems",
}

@Article{Aho:1976:BCL,
  author =       "A. V. Aho and D. S. Hirschberg and J. D. Ullman",
  title =        "Bounds on the Complexity of the Longest Common
                 Subsequence Problem",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "1--12",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:27:14 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of finding a longest common subsequence of
                 two strings is discussed. This problem arises in data
                 processing applications such as comparing two files and
                 in genetic applications such as studying molecular
                 evolution. The difficulty of computing a longest common
                 subsequence of two strings is examined using the
                 decision tree model of computation, in which vertices
                 represent ``equal --- unequal'' comparisons. It is
                 shown that unless a bound on the total number of
                 distinct symbols is assumed, every solution to the
                 problem can consume an amount of time that is
                 proportional to the product of the lengths of the two
                 strings. A general lower bound as a function of the
                 ratio of alphabet size to string length is derived. The
                 case where comparisons between symbols of the same
                 string are forbidden is also considered and it is shown
                 that this problem is of linear complexity for a
                 two-symbol alphabet and quadratic for an alphabet of
                 three or more symbols.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  comment =      "``The problem of finding a longest common subsequence
                 of two strings is discussed. This problem arises in
                 data processing applications such as comparing two
                 files and in genetic applications such as studying
                 molecular evolution. The difficulty of computing a
                 longest common subsequence of two strings is examined
                 using the decision tree model of computation, in which
                 vertices represent `equal -- unequal' comparisons. It
                 is shown that unless a bound on the total number of
                 distinct symbols is assumed, every solution to the
                 problem can consume an amount of time that is
                 proportional to the product of the length of the two
                 strings. A general lower bound as a function of the
                 ratio of alphabet size to string length is derived. The
                 case where comparisons between symbols of the same
                 string are forbidden is also considered and it is shown
                 that this problem is of linear complexity for a
                 two-symbol alphabet and quadratic for an alphabet of
                 three or more''",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; computer programming ---
                 Subroutines",
}

@Article{Wong:1976:BSE,
  author =       "C. K. Wong and Ashok K. Chandra",
  title =        "Bounds for the String Editing Problem",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "13--16",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The string editing problem is to determine the
                 distance between two strings as measured by the minimal
                 cost sequence of deletions, insertions, and changes of
                 symbols needed to transform one string into the other.
                 The longest common subsequence problem can be viewed as
                 a special case. R. A. Wagner and M. J. Fischer proposed
                 an algorithm that runs in time $0(n m)$, where $n$, $m$
                 are the lengths of the two strings. In the present
                 paper, it is shown that if the operations on symbols of
                 the strings are restricted to tests of equality, then
                 $O(n m)$, operations are necessary (and sufficient) to
                 compute the distance.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  comment =      "``The string editing problem is to determine the
                 distance between two strings as measured by the minimal
                 cost sequence of deletions, insertions, and changes of
                 symbols needed to transform one string into the other.
                 The longest common subsequence problem can be viewed as
                 a special case. Wagner and Fischer proposed an
                 algorithm that runs in time $O(nm)$, where $n,\; m$ are
                 the lengths of the two strings. In the present paper,
                 it is shown that if the operations on symbols of the
                 strings are restricted to tests of equality, then
                 $O(nm)$ operations are necessary (and sufficient) to
                 compute the distance.''",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Mickunas:1976:CCP,
  author =       "M. Dennis Mickunas",
  title =        "On the Complete Covering Problem for {LR}(k)
                 Grammars",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "17--30",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A direct, one-step transformation is presented for
                 transforming an arbitrary LR(k) context-free grammar,
                 $G$, to an LR(1) grammar, $G$ prime, which completely
                 covers $G$. Under additional hypotheses, $G$ prime may
                 be made LR(0).",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Ullmann:1976:ASI,
  author =       "J. R. Ullmann",
  title =        "An Algorithm for Subgraph Isomorphism",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "31--42",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Subgraph isomorphism can be determined by means of a
                 brute-force tree-search enumeration procedure. A new
                 algorithm is introduced that attains efficiency by
                 inferentially eliminating successor nodes in the tree
                 search. To assess the time actually taken by the new
                 algorithm, subgraph isomorphism, clique detection,
                 graph isomorphism, and directed graph isomorphism
                 experiments have been carried out with random and with
                 various nonrandom graphs. A parallel asynchronous
                 logic-in-memory implementation of a vital part of the
                 algorithm is also described, although this hardware has
                 not actually been built. The hardware implementation
                 would allow very rapid determination of isomorphism.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Graph Theory",
}

@Article{Garey:1976:CNO,
  author =       "M. R. Garey and D. S. Johnson",
  title =        "The Complexity of Near-Optimal Graph Coloring",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "43--49",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Graph coloring problems, in which one would like to
                 color the vertices of a given graph with a small number
                 of colors so that no two adjacent vertices receive the
                 same color, arise in many applications, including
                 various scheduling and partitioning problems. The
                 complexity and performance of algorithms which
                 construct such colorings are investigated. It is proved
                 that even coming close to the minimum number of
                 necessary colors with a fast algorithm is hard.
                 Instead, an analogous fast ``approximation algorithm''
                 is devised.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Show that there exists no algorithm that colors a
                 graph using within two times the optimal number of
                 colors unless P=NP.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; graph color; mathematical
                 techniques --- Graph Theory",
}

@Article{Wagner:1976:SPA,
  author =       "Robert A. Wagner",
  title =        "A Shortest Path Algorithm for Edge-Sparse Graphs",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "50--57",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm (FLOW) for finding the shortest distance
                 from a given node $S$ to each node $X$ of a directed
                 graph with nonnegative integer are lengths less than or
                 equal to WM is presented. FLOW is compared with its
                 best-known competitor, that of E. W. Dijkstra and J. Y.
                 Yen (DFLO). The new algorithm is shown to execute in
                 time of order $\max(V, E, D)$, where $D$ is the maximum
                 distance computed in a graph with $E$ edges and $V$
                 nodes. By counting the number of operands fetched
                 during execution of FLOW and DFLO, an estimate of the
                 running time of each is obtained. FLOW also will solve
                 the all-pairs shortest distance problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Graph Theory",
}

@Article{Martelli:1976:GEA,
  author =       "Alberto Martelli",
  title =        "A {Gaussian} Elimination Algorithm for the Enumeration
                 of Cut Sets in a Graph",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "58--73",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "By defining a suitable algebra for cut sets, it is
                 possible to reduce the problem of enumerating the cut
                 sets between all pairs of modes in a graph to the
                 problem of solving a system of linear equations. An
                 algorithm for solving this system using Gaussian
                 elimination is presented. The efficiency of the
                 algorithm depends on the implementation of sum and
                 multiplication. Therefore, some properties of cut sets
                 are investigated, which greatly simplify the
                 implementation of these operations for the case of
                 undirected graphs. The time required by the algorithm
                 is shown to be linear with the number of cut sets for
                 complete graphs. Some experimental results are given,
                 proving that the efficiency of the algorithm increases
                 by increasing the number of pairs of nodes for which
                 the cut sets are computed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Graph Theory",
}

@Article{Deo:1976:NHT,
  author =       "Narsingh Deo",
  title =        "Note on {Hopcroft} and {Tarjan}'s Planarity
                 Algorithm",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "74--75",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:39:39 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/76.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Hopcroft:1974:EPT}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yu:1976:PWE,
  author =       "C. T. Yu and G. Salton",
  title =        "Precision Weighting --- An Effective Automatic
                 Indexing Method",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "76--88",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:27:19 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The precision weighting procedure described in the
                 present study uses relevance criteria to weight the
                 terms occurring in user queries as a function of the
                 balance between relevant and nonrelevant documents in
                 which these terms occur; this approximates a semantic
                 know-how of term importance. Formal mathematical proofs
                 are given under well-defined conditions of the
                 effectiveness of the method.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information science",
}

@Article{Crump:1976:NIL,
  author =       "Kenny S. Crump",
  title =        "Numerical Inversion of {Laplace} Transforms Using a
                 {Fourier} Series Approximation",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "89--96",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1976.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A method is presented for numerically inverting a
                 Laplace transform that requires, in addition to the
                 transform function itself, only sine, cosine, and
                 exponential functions. In test problems using the
                 method it has routinely been possible to evaluate
                 inverse transforms with considerable accuracy over a
                 wide range of value of the independent variable using a
                 relatively few determinations of the Laplace transform
                 itself.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A method is presented for numerical inverting a
                 Laplace transform that requires, only sine, cosine and
                 exponential functions. The method is conceptually like
                 the method of Dubner and Abate (Dubner, H.; Abate, J.),
                 but differs from theirs in two aspects. In this method
                 the error of the approximation is less and a
                 transformation is incorporated which transforms the
                 approximation series into one that converges rapidly.",
  classification = "921",
  descriptors =  "Laplace transform; approximation; numerical method",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Laplace transforms; mathematical techniques",
}

@Article{Potier:1976:AAC,
  author =       "D. Potier and E. Gelenbe and J. Lenfant",
  title =        "Adaptive Allocation of Central Processing Unit
                 Quanta",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "97--102",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The allocation of the central processing unit (CPU) of
                 a computer system in quanta of fixed length in
                 round-robin fashion favors jobs with shorter total CPU
                 processing time by reducing the time they spend waiting
                 in queue below what it would be if all the jobs were
                 served in first-come-first-served order. This effect
                 can be accentuated by the use of short quanta. The main
                 disadvantage of this allocation policy is the resulting
                 time the CPU spends in overhead activities when
                 switching from one task to the other. An adoptive CPU
                 allocation policy is considered which reduces the
                 overhead during high traffic conditions when saturation
                 of this resource is more likely while keeping a small
                 quantum during periods of low arrival traffic. It is
                 assumed that each time at least r (a threshold)
                 arrivals occur during a quantum, the job currently
                 using the CPU is allocated an additional quantum (if it
                 is needed). This policy, which can be easily
                 implemented in hardware, is analyzed using a
                 mathematical model yielding the average response time
                 for jobs as a function of mean total CPU time, the
                 quantum size, $r$, and a fixed overhead for switching
                 tasks, with a Poisson arrival process. Numerical
                 results to illustrate the effect of this policy are
                 presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer systems
                 programming --- Time Sharing Programs",
}

@Article{Cody:1976:RAM,
  author =       "R. A. Cody and E. G. {Coffman, Jr.}",
  title =        "Record Allocation for Minimizing Expected Retrieval
                 Costs on Drum-Like Storage Devices",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "103--115",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/bin-packing.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Cody:1976:ERA}.",
  abstract =     "The problem is examined of distributing a set of
                 equal-size records among the sectors of a drum-like
                 storage device in order to exploit known access
                 frequencies and reduce the average access time. A
                 simple catenated search model is defined for which the
                 problem is shown to be NP-complete. Heuristics are then
                 defined and analyzed in terms of worst-case bounds. It
                 is shown that easily implemented
                 highest-access-frequency-first assignment rules provide
                 an average access time very close to optimal.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems",
}

@Article{Sahni:1976:ASI,
  author =       "Sartaj K. Sahni",
  title =        "Algorithms for Scheduling Independent Tasks",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "116--127",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The following job sequencing problems are studied:
                 single processor job sequencing with deadlines; job
                 sequencing on $m$-identical processors to minimize
                 finish time and related problems; job sequencing on
                 2-identical processors to minimize weighted mean flow
                 time. Dynamic programming type algorithms are presented
                 to obtain optimal solutions to these problems, and
                 three general techniques are presented to obtain
                 approximate solutions for optimization problems
                 solvable in this way. The techniques are applied to the
                 problems above to obtain polynomial time algorithms
                 that generate ``good'' approximate solutions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming; mathematical
                 programming, dynamic",
}

@Article{Fagin:1976:IMR,
  author =       "Ronald Fagin and Malcolm C. Easton",
  title =        "The Independence of Miss Ratio on Page Size",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "128--146",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Os/storage.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A theoretical justification is given to the empirical
                 observation that in some computing systems with a
                 paged, 2-level storage hierarchy, long-term miss ratio
                 is roughly independent of page size. This result is
                 used to argue the approximate independence of miss
                 ratio on page size in more realistic models of page
                 references.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; memory hierarchy",
}

@Article{Hirschberg:1976:PTA,
  author =       "D. S. Hirschberg and C. K. Wong",
  title =        "A Polynomial-Time Algorithm for the Knapsack Problem
                 with Two Variables",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "147--154",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The general knapsack problem is known to be
                 NP-complete. In this paper a very special knapsack
                 problem is studied, namely, one with only two
                 variables. A polynomial-time algorithm is presented and
                 analyzed. However, it remains an open problem that for
                 any fixed $n > 2$, the knapsack problems with $n$
                 variables can be solved in polynomial time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{Harris:1976:CTP,
  author =       "Britton Harris",
  title =        "A Code for the Transportation Problem of Linear
                 Programming",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "155--157",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Methods are described and results presented for
                 greatly reducing the computation time for long narrow
                 problems of the transportation problem of linear
                 programming. The code builds on known methods with two
                 principal innovations: a substantial reduction in the
                 size of the tree representation of shipments, and a set
                 of methods for calculating improved starting
                 solutions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "codes, symbolic; mathematical programming, linear",
}

@Article{Kam:1976:GDF,
  author =       "John B. Kam and Jeffrey D. Ullman",
  title =        "Global Data Flow Analysis and Iterative Algorithms",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "158--171",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Graham:1976:FUL,
  author =       "Susan L. Graham and Mark Wegman",
  title =        "A Fast and Usually Linear Algorithm for Global Flow
                 Analysis",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "172--202",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new algorithm for global flow analysis on reducible
                 graphs is presented. The algorithm is shown to treat a
                 very general class of function spaces. For a graph of
                 $e$ edges, the algorithm has a worst-case time bound of
                 $O(e \log e)$ function operations. It is also shown
                 that in programming terms, the number of operations is
                 proportional to e plus the number of exits from program
                 loops. Consequently a restriction to one-entry one-exit
                 control structures guarantees linearity. The algorithm
                 can be extended to yet larger classes of function
                 spaces and graphs by relaxing the time bound. Examples
                 are given of code improvement problems which can be
                 solved using the algorithm.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical programming",
}

@Article{Hoffmann:1976:CTS,
  author =       "Christoph M. Hoffmann and Lawrence H. Landweber",
  title =        "A Completeness Theorem for Straight-Line Programs with
                 Structured Variables",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "1",
  pages =        "203--220",
  month =        jan,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A program scheme which models straight-line code
                 admitting structured variables such as arrays, lists,
                 and queues is considered. A set of expressions is
                 associated with a program reflecting the input-output
                 transformations. A basic set of axioms is given and
                 program equivalence is defined in terms of expression
                 equivalence. Program transformations are then defined
                 such that two programs are equivalent if and only if
                 one program can be transformed to the other via the
                 transformations. An application of these results to
                 code optimization is then discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Gabow:1976:EIE,
  author =       "Harold N. Gabow",
  title =        "An Efficient Implementation of {Edmonds}' Algorithm
                 for Maximum Matching in Graphs",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "221--234",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A matching on a graph is a set of edges, no two of
                 which share a vertex. A maximum matching contains the
                 greatest number of edges possible. This paper presents
                 an efficient implementation of Edmonds' algorithm for
                 finding a maximum matching. The computation time is
                 proportional to $V^3$, where $V$ is the number of
                 vertices; previous implementations of Edmonds'
                 algorithm have computation time proportional to $V^4$.
                 The implementation is based on a system of labels that
                 encodes the structure of alternating paths.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Larson:1976:ECC,
  author =       "Richard G. Larson",
  title =        "Efficiency of Computation of {Cayley} Tables of
                 $2$-Groups",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "235--241",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 01 16:57:55 2002",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Two algorithms for computing the multiplication table
                 of a 2-group are described and discussed. One of the
                 algorithms works in an element-by-element fashion; the
                 other works in terms of subgroups generated by initial
                 subsequences of the given sequence of generators.
                 Estimates of computation times are given which show
                 that the second algorithm is much more efficient than
                 the first. It is also shown how the second algorithm
                 can be modified to make it more useful, without using
                 significantly more time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Brent:1976:FMP,
  author =       "Richard P. Brent",
  title =        "Fast Multiple-Precision Evaluation of Elementary
                 Functions",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "242--251",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321941.321944",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68A20 (68A10)",
  MRnumber =     "52 \#16111",
  MRreviewer =   "Amnon Barak",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 garbo.uwasa.fi:/pc/doc-soft/fpbiblio.txt;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $f(x)$ be one of the usual elementary functions
                 ($\exp$, $\log$, $\arctan$, $\sin$, $\cosh$, etc.), and
                 let $M(n)$ be the number of single-precision operations
                 required to multiply $n$-bit integers. It is shown that
                 $f(x)$ can be evaluated, with relative error $O(2-n)$,
                 in $O(M(n)log (n))$ operations as $n \rightarrow
                 \infty$, for any floating-point number $x$ (with an
                 $n$-bit fraction) in a suitable finite interval. From
                 the Sch{\"o}nhage--Strassen bound on $M(n)$, it follows
                 that an $n$-bit approximation to $f(x)$ may be
                 evaluated in $O(n \log_(n) \log \log(n))$ operations.
                 Special cases include the evaluation of constants such
                 as $\pi^e$, and $e^\pi$. The algorithms depend on the
                 theory of elliptic integrals, using the
                 arithmetic-geometric mean iteration and ascending
                 Landen transformations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computational complexity; computer arithmetic;
                 computer programming",
}

@Article{Kung:1976:NAL,
  author =       "H. T. Kung",
  title =        "New Algorithms and Lower Bounds for the Parallel
                 Evaluation of Certain Rational Expressions and
                 Recurrences",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "252--261",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The parallel evaluation of rational expressions is
                 considered. New algorithms which minimize the number of
                 multiplication or division steps are given. They are
                 faster than the usual algorithms when multiplication or
                 division takes more time than addition or subtraction.
                 It is shown, for example, that $x^n$ can be evaluated
                 in two steps of parallel division and $[\log_2 n]$
                 steps of parallel addition, while the usual algorithm
                 takes $[\log_2 n]$ steps of parallel multiplication.
                 Lower bounds on the time required are obtained in terms
                 of the degree of expressions to be evaluated. From
                 these bounds, the algorithms presented in the paper are
                 shown to be asymptotically optimal.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{McCreight:1976:SES,
  author =       "Edward M. McCreight",
  title =        "A Space-Economical Suffix Tree Construction
                 Algorithm",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "262--272",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new algorithm is presented for constructing
                 auxiliary digital search trees to aid in exact-match
                 substring searching. This algorithm has the same
                 asymptotic running time bound as previously published
                 algorithms, but is more economical in space. Some
                 implementation considerations are discussed, and new
                 work on the modification of these search trees in
                 response to incremental changes in the strings they
                 index (the update problem) is presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  comment =      "Algorithms to build, use, and modify suffix tree are
                 presented. The advantage of this algorithm over other
                 linear time algorithms to perform similar tasks is that
                 this algorithm uses less space. This seems to the
                 primary reference for suffix trees.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; information science ---
                 Information Retrieval",
}

@Article{Yu:1976:SMR,
  author =       "C. T. Yu and W. S. Luk and T. Y. Cheung",
  title =        "A Statistical Model for Relevance Feedback in
                 Information Retrieval",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "273--286",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A statistical model is presented for the investigation
                 of a practical method used in relevance feedback. A
                 necessary and sufficient condition for the two
                 parameters used in this method to define a better query
                 than the original query is given. A region in the plane
                 of the parameters is shown to satisfy the sufficient
                 condition. While the points for producing optimal
                 queries are not exactly located, they are shown to be
                 lying on a finite portion of a hyperbola. Experimental
                 results support some of the theoretical findings.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information science",
}

@Article{Feldstein:1976:CED,
  author =       "Alan Feldstein and Richard Goodman",
  title =        "Convergence Estimates for the Distribution of Trailing
                 Digits",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "287--297",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321941.321948",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An analysis is made of the distribution of trailing
                 digits (tail end digits) of positive real
                 floating-point numbers represented in arbitrary base
                 $\beta$ and randomly chosen from a logarithmic
                 distribution. The analysis shows that the $n$th digit
                 for $n \geq 2$ is actually approximately uniformly
                 distributed. The approximation depends upon both $n$
                 and the base beta. It becomes better as $n$ increases,
                 and it is exact in the limit as $n \rightarrow \infty$.
                 A table of this distribution is presented for various
                 $\beta$ and $n$, along with a table of the maximum
                 digit by digit deviation $\Delta$ of the logarithmic
                 distribution from the uniform distribution. Various
                 asymptotic results for $\Delta$ are included.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Benford's Law; computer arithmetic; computer
                 programming; Law of Anomalous Numbers; Zipf's Law",
}

@Article{Fraser:1976:API,
  author =       "Donald Fraser",
  title =        "Array Permutation by Index-Digit Permutation",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "298--309",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An array may be reordered according to a common
                 permutation of the digits of each of its element
                 indices. The digit-reversed reordering which results
                 from common fast Fourier transform (FFT) algorithms is
                 an example. By examination of this class of permutation
                 in detail, very efficient algorithms for transforming
                 very long arrays are developed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Pagano:1976:LCC,
  author =       "Marcello Pagano",
  title =        "On the Linear Convergence of a Covariance
                 Factorization Algorithm",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "310--316",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 17 16:23:55 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm for factoring a covariance function into
                 its Hurwitz factors, which is based on the Cholesky
                 factors of a certain matrix, was proposed by F. L.
                 Bauer and others. This algorithm bears a close
                 connection to the theory of orthogonal polynomials, and
                 a closer one to the theory of prediction of stationary
                 time series. In this paper these relations are pointed
                 out and then used to advantage to prove the linear
                 convergence of this algorithm.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Horowitz:1976:EAA,
  author =       "Ellis Horowitz and Sartaj Sahni",
  title =        "Exact and Approximate Algorithms for Scheduling
                 Nonidentical Processors",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "317--327",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Exact and approximate algorithms are presented for
                 scheduling independent tasks in a multiprocessor
                 environment in which the processors have different
                 speeds. Dynamic programming type algorithms are
                 presented which minimize finish time and weighted mean
                 flow time on two processors. The generalization to $m$
                 processors is direct. These algorithms have a
                 worst-case complexity which is exponential in the
                 number of tasks. Therefore approximation algorithms of
                 low polynomial complexity are also obtained for the
                 above problems. These algorithms are guaranteed to
                 obtain solutions that are close to the optimal. For the
                 case of minimizing mean flow time on $m$-processors an
                 algorithm is given whose complexity is $O(n \log
                 mn)$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems --- Program Processors;
                 computer programming --- Subroutines; computer systems
                 programming",
}

@Article{Konheim:1976:QMF,
  author =       "Alan G. Konheim and Martin Reiser",
  title =        "A Queueing Model with Finite Waiting Room and
                 Blocking",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "328--341",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1976.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A two-stage queueing network with feedback and a
                 finite intermediate waiting room is studied. The
                 first-stage server is blocked whenever M requests are
                 enqueued in the second stage. The analysis of this
                 system under exponential assumptions is carried out. An
                 algorithm to calculate the stationary state
                 probabilites is given and some special cases are
                 considered.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A two-stage queueing network with feedback and a
                 finite intermediate waiting room is studied. The
                 first-stage server is blocked whenever $m$ requests are
                 enqueued in the second stage. The analysis of this
                 system under exponential assumptions is carried out. An
                 algorithm to calculate the stationary state
                 probabilities is given and some special cases are
                 considered.",
  classification = "723; 922",
  descriptors =  "Queueing system; tandem queue; Analytical model;
                 M/M/1; M/M/1/S; FIFO; round robin; blocking",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; probability --- Queueing
                 Theory",
}

@Article{Price:1976:NEC,
  author =       "Thomas G. Price",
  title =        "A Note on the Effect of the Central Processor Service
                 Time Distribution on Processor Utilization in
                 Multiprogrammed Computer Systems",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "342--346",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1976.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Upper and lower bounds on processor utilization for
                 the queueing model M/G/1/N are derived. The upper bound
                 is equal to the utilization for constant service times
                 and the lower bound is approached when the average
                 number of operations per busy period approaches one.
                 These bounds show that the form of the processing time
                 distribution can have a substantial effect on processor
                 utilization. It is shown that the utilization will be
                 near the lower bound if there are a large number of
                 short processing times. The variance does not always
                 give an accurate indication of the effect of the
                 distribution on utilization.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "(VBI-000855)",
  classification = "723",
  descriptors =  "Multiprogramming",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer systems
                 programming --- Multiprogramming",
}

@Article{Iglehart:1976:SSS,
  author =       "Donald L. Iglehart",
  title =        "Simulating Stable Stochastic Systems, {VI}: {Quantile}
                 Estimation",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "347--360",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this paper the author continues his study of the
                 regenerative method for analyzing simulations of stable
                 stochastic systems. The principal concern is to
                 estimate the quantiles of the stationary distribution
                 of a regenerative process. Markov chains in discrete or
                 continuous time and multiple server queues in light
                 traffic provide concrete examples of regenerative
                 processes to which this technique applies. Approximate
                 confidence intervals for these quantiles are derived
                 from appropriate central limit theorems. The method has
                 been applied to three stochastic simulations, and the
                 numerical results are presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  descriptors =  "Simulation; statistical technique",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer simulation; computer systems, digital",
}

@Article{Rider:1976:SAA,
  author =       "Kenneth Lloyd Rider",
  title =        "A Simple Approximation to the Average Queue Size in
                 the Time-Dependent {M/M/1} Queue",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "361--367",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The time-dependent equations for the M/M/1 queue can
                 be reduced to a single equation for the expected queue
                 size, but the equation is dependent on $P_0(t)$, the
                 probability of no jobs in the system. An exact equation
                 for the behavior of $P_0(t)$ under special conditions
                 is derived and an approximation relating $P_0(t)$ to
                 $Q(t)$, the expected queue size at time $t$, is derived
                 for the case when the change in queue size is slow
                 compared to the service rate. It is found that the
                 approximation affords a significant improvement over
                 the use of a steady state approximation to the
                 time-dependent queue and is simpler to use than the
                 exact equations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Horowitz:1976:PST,
  author =       "Steven L. Horowitz and Theodosios Pavlidis",
  title =        "Picture Segmentation by a Tree Traversal Algorithm",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "368--388",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In the past, picture segmentation has been performed
                 by merging small primitive regions or by recursively
                 splitting the whole picture. This paper combines the
                 two approaches with significant increase in processing
                 speed while maintaining small memory requirements. The
                 data structure is described in detail and examples of
                 implementations are given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "image processing",
}

@Article{Wegbreit:1976:PPC,
  author =       "Ben Wegbreit and Jay M. Spitzen",
  title =        "Proving Properties of Complex Data Structures",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "2",
  pages =        "389--396",
  month =        apr,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper is concerned with proving properties of
                 programs which use data structures. The goal is to be
                 able to prove that all instances of a class (e.g. as
                 defined in Simula) satisfy some property. A method of
                 proof which achieves this goal, generator induction, is
                 studied and compared to other proof rules and methods;
                 inductive assertions, recursion induction, computation
                 induction, and, in some detail, structural induction.
                 The paper concludes by using generator induction to
                 prove a characteristic property of an implementation of
                 hashtables.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Joyner:1976:RSD,
  author =       "William H. {Joyner, Jr.}",
  title =        "Resolution Strategies as Decision Procedures",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "398--417",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The resolution principle, an automatic inference
                 technique, is studied as a possible decision procedure
                 for certain classes of first-order formulas. It is
                 shown that most previous resolution strategies do not
                 decide satisfiability even for ``simple'' solvable
                 classes. Two new resolution procedures are described
                 and are shown to be complete (i.e. semidecision
                 procedures) in the general case and, in addition, to be
                 decision procedures for successively wider classes of
                 first-order formulas. These include many previously
                 studied solvable classes. The proofs that a complete
                 resolution procedure will always halt (without
                 producing the empty clause) when applied to satisfiable
                 formulas in certain classes provide demonstrations of
                 the solvability of these classes. A technique for
                 constructing a model for a formula shown satisfiable in
                 this way is also described.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory --- Programming Theory; systems
                 science and cybernetics",
}

@Article{Chang:1976:CCC,
  author =       "Lena Chang and James F. Korsh",
  title =        "Canonical Coin Changing and Greedy Solutions",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "418--422",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A natural, and readily computable, first guess at a
                 solution to the coin changing problem is the canonical
                 solution. This solution is a special case of the greedy
                 solution which is a reasonable heuristic guess for the
                 knapsack problem. Efficient tests are given here to
                 determine whether all greedy solutions are optimal with
                 respect to a given set of knapsack objects or coin
                 types. These results improve or extend previous tests
                 given in the literature. Both the incomplete and
                 complete cases are considered.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Pippenger:1976:SGT,
  author =       "Nicholas Pippenger and Leslie G. Valiant",
  title =        "Shifting Graphs and Their Applications",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "423--432",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Graphs that in a certain precise sense are rich in
                 sets of vertex-disjoint paths are studied. Bounds are
                 obtained on the minimum number of edges in such graphs,
                 and these are used to deduce nonlinear lower bounds on
                 the computational complexity of shifting, merging, and
                 matching problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming; mathematical
                 techniques",
}

@Article{Schmidt:1976:FBA,
  author =       "Douglas C. Schmidt and Larry E. Druffel",
  title =        "A Fast Backtracking Algorithm to Test Directed Graphs
                 for Isomorphism Using Distance Matrices",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "433--445",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A backtracking algorithm for testing a pair of
                 digraphs for isomorphism is presented. The information
                 contained in the distance matrix representation of a
                 graph is used to establish an initial partition of the
                 graph's vertices. This distance matrix information is
                 then applied in a backtracking procedure to reduce the
                 search tree of possible mappings. While the algorithm
                 is not guaranteed to run in polynomial time, it
                 performs efficiently for a large class of graphs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Graph Theory",
}

@Article{Slater:1976:DG,
  author =       "Peter J. Slater",
  title =        "${R}$-Domination in Graphs",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "446--450",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of finding a minimum $k$-basis of graph
                 $G$ is that of selecting as small a set B of vertices
                 as possible such that every vertex of $G$ is at
                 distance $k$ or less from some vertex in B. A linear
                 algorithm was previously developed to find a minimum
                 1-basis (a minimum dominating set) when $G$ is a tree.
                 In this paper the $k$-basis problem is placed in a more
                 general setting, and a linear algorithm is presented
                 that solves the problem for any forest.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Graph Theory",
}

@Article{Burge:1976:ABS,
  author =       "William H. Burge",
  title =        "An Analysis of Binary Search Trees Formed from
                 Sequences of Nondistinct Keys",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "451--454",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The expected depth of each key in the set of binary
                 search trees formed from all sequences composed from a
                 multiset is obtained, and hence the expected weight of
                 such trees. The expected number of left-to-right local
                 minima and the expected number of cycles in sequences
                 composed from a multiset are then deduced from these
                 results.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; information science;
                 mathematical techniques --- Trees",
}

@Article{Cash:1976:SIR,
  author =       "J. R. Cash",
  title =        "Semi-Implicit {Runge--Kutta} Procedures with Error
                 Estimates for the Numerical Integration of Stiff
                 Systems of Ordinary Differential Equations",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "455--460",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See comments and errata in \cite{Bui:1977:ECP}.",
  abstract =     "A-stable, semi-implicit Runge--Kutta procedures
                 requiring at most one Jacobian evaluation per time step
                 are developed for the approximate numerical integration
                 of stiff systems of ordinary differential equations. A
                 simple procedure for estimating the local truncation
                 error is described and, with the help of this estimate,
                 efficient integration procedures are derived. The
                 algorithms are illustrated by direct application to a
                 particular example.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Garey:1976:STN,
  author =       "M. R. Garey and D. S. Johnson",
  title =        "Scheduling Tasks with Nonuniform Deadlines on Two
                 Processors",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "461--467",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/Discrete.event.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Given a set of tasks, with each task having execution
                 time 1 and a deadline greater than 0, and a set of
                 precedence constraints which restrict allowable
                 schedules, the problem of determining whether there
                 exists a schedule using two processors in which each
                 task is completed before its deadline is examined. An
                 efficient algorithm for finding such a schedule,
                 whenever one exists, is given. The algorithm may also
                 be used to find the shortest such schedule. In addition
                 it is shown that the problem of finding a one-processor
                 schedule which minimizes the number of tasks failing to
                 meet their deadlines is NP-complete and, hence, is
                 likely to be computationally intractable.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming",
}

@Article{Phuong:1976:SIP,
  author =       "Ta Huu Phuong",
  title =        "Solution of Integer Programs with a Quadratic
                 Objective Function",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "468--474",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A branch and bound method is presented for solving
                 problems in which the objective function is quadratic,
                 the constraints are linear, and some or all variables
                 are required to be integer. The algorithm is obtained
                 by grafting an inverse-basis version of Beale's method
                 onto the Land-Doig procedure. The code has been tested
                 on a computer, and computational results with various
                 strategies of branching are reported.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{Srinivasan:1976:LPC,
  author =       "V. Srinivasan",
  title =        "Linear Programming Computational Procedures for
                 Ordinal Regression",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "475--487",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The ordinal regression problem is an extension to the
                 standard multiple regression problem in terms of
                 assuming only ordinal properties for the dependent
                 variable while retaining the interval scale assumption
                 for independent (or predictor) variables. The linear
                 programming formulation for obtaining the regression
                 weights for ordinal regression is outlined and
                 computational improvements and alternatives which
                 utilize the special structure of this linear program
                 are developed and compared for their computational
                 efficiency and storage requirements. A procedure which
                 solves the dual of the original linear programming
                 formulation by the dual simplex method with upper
                 bounded variables, in addition to utilizing the special
                 structure of the constraint matrix from the point of
                 view of storage and computation, performs the best in
                 terms of both computational efficiency and storage
                 requirements. Using this special procedure, problems
                 with 100 observations and 4 independent variables take
                 less than one-half minute, on an average, on the IBM
                 360\slash 67. Results also show that the linear
                 programming solution procedure for ordinal regression
                 is valid.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming, linear",
}

@Article{Aho:1976:OCG,
  author =       "A. V. Aho and S. C. Johnson",
  title =        "Optimal Code Generation for Expression Trees",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "488--501",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 17 16:24:01 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Also in {\em Proc. ACM Symp. on Theory of Computing},
                 pp. 207--217, 1975.",
  abstract =     "Algorithms are discussed which transform expression
                 trees into code for register machines. A necessary and
                 sufficient condition for optimality of such an
                 algorithm is derived, which applies to a broad class of
                 machines. A dynamic programming algorithm is then
                 presented which produces optimal code for any machine
                 in this class; this algorithm runs in time linearly
                 proportional to the size of the input.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "code generation; codes, symbolic; computer
                 programming",
}

@Article{Bruno:1976:CGO,
  author =       "John Bruno and Ravi Sethi",
  title =        "Code Generation for a One-Register Machine",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "502--510",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The majority of computers that have been built have
                 performed all computations in devices called
                 accumulators, or registers. It is shown that the
                 problem of generating minimal-length code for such
                 machines is hard in a precise sense; specifically it is
                 shown that the problem is NP-complete. The result is
                 true even when the programs being translated are
                 arithmetic expressions. Admittedly, the expressions in
                 question can become complicated.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "code generation; codes, symbolic; computer
                 programming",
}

@Article{Mickunas:1976:TLG,
  author =       "M. D. Mickunas and R. L. Lancaster and V. B.
                 Schneider",
  title =        "Transforming {LR($k$)} Grammars To {LR(1)}, {SLR(1)},
                 and (1,1) bounded right-context grammars",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "511--533",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A method is presented for directly transforming an
                 arbitrary LR(k) grammar to an equivalent LR(1) grammar.
                 It is further shown that the method transforms an
                 arbitrary prefix-free LR(k) grammar to an equivalent
                 LR(0) grammar. It is argued that the method is
                 efficient and offers some advantages over traditional
                 ``look-ahead'' parsing methods. Finally, it is
                 demonstrated that the method can be used to transform
                 an LR(1) grammar to an equivalent SLR(1) grammar, which
                 in turn can be easily transformed to an equivalent
                 (1,1) bounded right-context grammar.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Muller:1976:RAE,
  author =       "David E. Muller and Franco P. Preparata",
  title =        "Restructuring of Arithmetic Expressions For Parallel
                 Evaluation",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "534--543",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $E$ be an arithmetic expression involving $n$
                 variables, each of which appears just once, and the
                 possible operations of addition, multiplication, and
                 division. Although other cases are considered, when
                 these three operations take unit time the restructuring
                 algorithms presented in this paper yield evaluation
                 times no greater than $2.88 \log_2 (n + 1)$ and $2.08
                 \log_2 n$ for general expressions and division-free
                 expressions, respectively. The authors conjecture that
                 the present coefficients are the best possible, since
                 they have exhibited expressions which seem to require
                 these times within an additive constant. Upper bounds
                 are also given to the restructuring time of a given
                 expression $E$ and to the number of processors required
                 for its parallel evaluation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Papadimitriou:1976:CET,
  author =       "Christos H. Papadimitriou",
  title =        "On the Complexity of Edge Traversing",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "544--554",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that the Chinese Postman Problem, although
                 tractable in the totally directed and the totally
                 undirected cases, is NP-complete in the mixed case. A
                 simpler version of the same problem is shown
                 algorithmically equivalent to the max-flow problem with
                 unit edge capacities.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory --- Programming Theory; computer
                 programming; mathematical techniques --- Graph Theory",
}

@Article{Sahni:1976:CAP,
  author =       "Sartaj Sahni and Teofilo Gonzalez",
  title =        "${P}$-Complete Approximation Problems",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "555--565",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "For P-complete problems such as traveling salesperson,
                 cycle covers, $0$--$1$ integer programming,
                 multicommodity network flows, quadratic assignment,
                 etc., it is shown that the approximation problem is
                 also P-complete. In contrast with these results, a
                 linear time approximation algorithm for the clustering
                 problem is presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory --- Programming Theory; computer
                 programming; mathematical programming",
}

@Article{Yao:1976:LBM,
  author =       "Andrew Chi-Chih Yao and Foong Frances Yao",
  title =        "Lower Bounds on Merging Networks",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "3",
  pages =        "566--571",
  month =        jul,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let M$(m, n)$ be the minimum number or comparators
                 needed in an $(m, n)$-merging network. It is shown that
                 M$(m, n)$ greater than equivalent to $n(\lg(m + 1))/2$,
                 which implies that Batcher's merging networks are
                 optimal up to a factor of 2 plus epsilon for almost all
                 values of $m$ and $n$. The limit of M$(m, n)$/n as $n$
                 approaches infinity is determined to within 1.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Cody:1976:ERA,
  author =       "R. A. Cody and E. G. {Coffman, Jr.}",
  title =        "Errata: ``{Record} Allocation for Minimizing Expected
                 Retrieval Costs on Drum-Like Storage Devices''",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "572--572",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:26:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Cody:1976:RAM}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Peterson:1976:TPL,
  author =       "G. E. Peterson",
  title =        "Theorem Proving with Lemmas",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "573--581",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 3 00:45:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ginsburg:1976:SCC,
  author =       "Seymour Ginsburg and Nancy Lynch",
  title =        "Size Complexity in Context-Free Grammar Forms",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "582--598",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Grammar forms are compared for their efficiency in
                 representing languages, as measured by the sizes of
                 interpretation grammars. For every regular set,
                 right-and left-linear forms are essentially equal in
                 efficiency. Any form for the regular sets provides, at
                 most, polynomial improvement over right-linear form.
                 Moreover, any polynomial improvement is attained by
                 some such form, at least on certain languages. Greater
                 improvement for some languages is possible using forms
                 expressing larger classes of languages than the regular
                 sets. However, there are some languages for which no
                 improvement over right-linear form is possible. While a
                 similar set of results holds for forms expressing
                 exactly the linear languages, only linear improvement
                 can occur for forms expressing all the context-free
                 languages.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Yakimovsky:1976:BOD,
  author =       "Yoram Yakimovsky",
  title =        "Boundary and Object Detection in Real World Images",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "599--618",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A computer solution to the problem of automatic
                 location of objects in digital pictures is presented. A
                 self-scaling local edge detector that can be applied in
                 parallel on a picture is described. Clustering
                 algorithms and sequential boundary following algorithms
                 process the edge data to local images of objects and
                 generate a data structure that represents the imaged
                 objects.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "image processing",
}

@Article{Eisner:1976:MTE,
  author =       "Mark J. Eisner and Dennis G. Severance",
  title =        "Mathematical Techniques for Efficient Record
                 Segmentation in Large Shared Databases",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "619--635",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is possible to significantly reduce the average
                 cost of information from a large shared database by
                 partitioning data items stored within each record into
                 a primary and a secondary record segment. An analytic
                 model, based upon knowledge of data item lengths,
                 transportation costs, and retrieval patterns, is
                 developed to assist an analyst with this assignment
                 problem. The model is generally applicable to
                 environments in which a database resides in secondary
                 storage, and is useful for both uniprogramming and
                 multiprogramming systems. A computationally tractable
                 record design algorithm has been implemented as a
                 Fortran program and applied to numerous problems.
                 Realistic examples are presented which demonstrate a
                 potential for reducing total system cost by more than
                 65 percent.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "vertical fragmentation",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems",
}

@Article{Heller:1976:AIM,
  author =       "D. E. Heller and D. K. Stevenson and J. F. Traub",
  title =        "Accelerated Iterative Methods for the Solution of
                 Tridiagonal Systems on Parallel Computers",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "636--654",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/ovr.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Iterative methods for the solution of tridiagonal
                 systems are considered, and a new iteration is
                 presented, whose rate of convergence is comparable to
                 that of the optimal two-cyclic Chebyshev iteration but
                 which does not require the calculation of optimal
                 parameters. The convergence rate depends only on the
                 magnitude of the elements of the tridiagonal matrix and
                 not on its dimension or spectrum. The theory also has a
                 natural extension to block tridiagonal systems.
                 Numerical experiments suggest that on a parallel
                 computer this new algorithm is the best of the
                 iterative algorithms considered.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; mathematical
                 techniques",
}

@Article{Bruno:1976:SJS,
  author =       "John L. Bruno",
  title =        "Sequencing Jobs with Stochastic Task Structures on a
                 Single Machine",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "655--664",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321978.321984",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A sequencing problem wherein there is a single
                 processor and a finite number of jobs needing service
                 is considered. Each job consists of a sequence of tasks
                 generated probabilistically by a finite state Markov
                 chain. Each state in the Markov chain is identified
                 with a task and has a service-time requirement and a
                 deferral cost, both of which are random variables. The
                 goal is to minimize the expected value of the sum of
                 the weighted finishing times of all the tasks. The
                 sequencing discipline is nonpreemptive. It is shown
                 that there exists an optimal priority sequencing rule
                 based on a rank defined for each task; an efficient
                 algorithm for calculating the rank is given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; operations research",
}

@Article{Gonzalez:1976:OSS,
  author =       "Teofilo Gonzalez and Sartaj Sahni",
  title =        "Open Shop Scheduling to Minimize Finish Time",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "665--679",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A linear time algorithm to obtain a minimum finish
                 time schedule for the two-processor open shop together
                 with a polynomial time algorithm to obtain a minimum
                 finish time preemptive schedule for open shops with
                 more than two processors are obtained. It is also shown
                 that the problem of obtaining minimum finish time
                 nonpreemptive schedules when the open shop has more
                 than two processors is NP-complete.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; operations research",
}

@Article{Rosberg:1976:MQE,
  author =       "Z. Rosberg and I. Adiri",
  title =        "Multilevel Queues with External Priorities",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "680--690",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321978.321986",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1976.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A single server serving $N$ priority classes (N being
                 finite or infinite) and working under an FB$_\infty$
                 regime is considered, namely, one in which the waiting
                 line consists of infinitely many separate queues
                 obeying the FIFO rule. Each priority class is assigned
                 to one of the queues. A customer from the $k$th
                 priority class (``k-customer'') in the $n$th queue is
                 eligible for $\Theta_n^k$ time units of service, at the
                 end of which he either departs, because his requirement
                 is satisfied, or joins the tail of the $(n + 1)$-th
                 queue. When a quantum of service is completed, the
                 server turns to the first customer in the lowest index
                 (highest priority) nonempty queue. The arrival process
                 of $k$-customers is assumed to be homogeneous Poisson,
                 and their service requirements are independent,
                 generally distributed, random variable. A set of
                 recursive linear equations is derived for the expected
                 flow time of a $k$-customer whose service requirement
                 is known, and some examples are discussed and presented
                 graphically.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "922",
  descriptors =  "Queueing system; priority; analysis",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Wegbreit:1976:VPP,
  author =       "Ben Wegbreit",
  title =        "Verifying Program Performance",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "691--699",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that specifications of program performance
                 can be formally verified. Formal verification
                 techniques, in particular, the method of inductive
                 assertions, can be adapted to show that a program's
                 maximum or mean execution time is correctly described
                 by specifications supplied with the program. To
                 formally establish the mean execution time, branching
                 probabilities are expressed using inductive assertions
                 which involve probability distributions. Verification
                 conditions are formed and proved which establish that
                 if the input distribution is correctly described by the
                 input specifications, then the inductive assertions
                 correctly describe the probability distributions of the
                 data during execution. Once the inductive assertions
                 are shown to be correct, branching probabilities are
                 obtained and mean computation time is computed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Hayes:1976:EFF,
  author =       "John P. Hayes",
  title =        "Enumeration of Fanout-Free {Boolean} Functions",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "700--709",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A solution to the problem of counting the number of
                 fanout-free Boolean functions of $n$ variables is
                 presented. The relevant properties of fanout-free
                 functions and circuits are summarized. The AND and OR
                 ranks of a fanout-free function is defined. Recursive
                 formulas for determining the number of distinct
                 functions of specified rank are derived. Based on
                 these, expressions are obtained for $\phi_D(n)$,
                 $phi_{N_D(n)}$, and $\phi(n)$, which denote the number
                 of degenerate, nondegenerate, and all $n$-variables
                 fanout-free functions, respectively. Simple
                 nonrecursive bounds on the various $\phi$ functions are
                 also computed and are used to determine some asymptotic
                 properties of the $\phi$ functions. It is shown that
                 for large $n$ almost all fanout-free functions are
                 nondegenerate, and that almost all unate functions are
                 not fanout-free. The relationship between the
                 fanout-free function enumeration problem and other
                 function enumeration problems in switching theory is
                 discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Even:1976:CPW,
  author =       "S. Even and R. E. Tarjan",
  title =        "A Combinatorial Problem Which Is Complete in
                 Polynomial Space",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "710--719",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A generalization, called the Shannon switching game on
                 vertices, of a familiar board game called Hex is
                 considered. It is shown that determining who wins such
                 a game if each player plays perfectly is very hard; in
                 fact, if this game problem is solvable in polynomial
                 time, then any problem solvable in polynomial space is
                 solvable in polynomial time. This result suggests that
                 the theory of combinatorial games is difficult.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques; probability --- Game Theory",
}

@Article{Lipton:1976:STH,
  author =       "R. J. Lipton and S. C. Eisenstat and R. A. DeMillo",
  title =        "Space and Time Hierarchies for Classes of Control
                 Structures and Data Structures",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "720--732",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Control structures and data structures are modeled by
                 directed graphs. In the control case nodes represent
                 executable statements and arcs represent possible flow
                 of control; in the data case nodes represent memory
                 locations and arcs represent logical adjacencies in the
                 data structure. Classes of graphs are compared by a
                 relation $\leq_{S,T}$ where $G \leq_{S,T} H$ if $G$ can
                 be embedded in $H$ with at most a $T$-fold increase in
                 distance between embedded nodes by making at most $S$
                 ``copies'' of any node in $G$. For both control
                 structures and data structures, $S$ and $T$ are
                 interpreted as space and time constants, respectively.
                 Results are presented that establish hierarchies with
                 respect to $\leq_{S,T}$ for data structures, sequential
                 program schemata normal forms, and sequential control
                 structures.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 731; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "control systems --- Theory; data processing --- Data
                 Structures; mathematical techniques",
}

@Article{VanEmden:1976:SPL,
  author =       "M. H. {Van Emden} and R. A. Kowalski",
  title =        "The Semantics of Predicate Logic as a Programming
                 Language",
  journal =      j-J-ACM,
  volume =       "23",
  number =       "4",
  pages =        "733--742",
  month =        oct,
  year =         "1976",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Sentences in first-order predicate logic can be
                 usefully interpreted as programs. In this paper the
                 operational and fixpoint semantics of predicate logic
                 programs are defined, and the connections with the
                 proof theory and model theory of logic are
                 investigated. It is concluded that operational
                 semantics is a part of proof theory and that fixpoint
                 semantics is a special case of model-theoretic
                 semantics.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; foundations; logical semantics;
                 prolog",
}

@Article{Johnson:1977:EAS,
  author =       "Donald B. Johnson",
  title =        "Efficient Algorithms for Shortest Paths in Sparse
                 Networks",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "1",
  pages =        "1--13",
  month =        jan,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "(VBI-001010)",
  descriptors =  "Routing; shortest path",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wilhelm:1977:GMP,
  author =       "Neil C. Wilhelm",
  title =        "A General Model for the Performance of Disk Systems",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "1",
  pages =        "14--31",
  month =        jan,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/simulan.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A general queueing model for disk systems, which
                 incorporates the characteristics common to most disk
                 systems is introduced and used in the approximate
                 analyses of models of the IBM 2314 and 3330 disk
                 systems. Comparisons with simulation statistics show
                 that the approximations made are very good over a wide
                 range of arrival rates and system parameters. The
                 analytic results are also used to investigate
                 performance differences between devices.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data storage, magnetic; probability --- Queueing
                 Theory; queueing",
}

@Article{Horvath:1977:LAP,
  author =       "Edward C. Horvath and Shui Lam and Ravi Sethi",
  title =        "A Level Algorithm for Preemptive Scheduling",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "1",
  pages =        "32--43",
  month =        jan,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A level algorithm that constructs optimal preemptive
                 schedules on identical processors when the task system
                 is a tree or when there are only two processors
                 available is adapted to handle processors of different
                 speeds. The new algorithm is optimal for independent
                 tasks on any number of processors and for arbitrary
                 task systems on two processors, but not on three or
                 more processors, even for trees. By taking the
                 algorithm as a heuristic on m processors and using the
                 ratio of the lengths of the constructed and optimal
                 schedules as a measure, an upper bound on its
                 performance is derived in terms of the speeds of the
                 processors.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Burstall:1977:TSD,
  author =       "R. M. Burstall and John Darlington",
  title =        "A Transformation System for Developing Recursive
                 Programs",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "1",
  pages =        "44--67",
  month =        jan,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A system of rules for transforming programs is
                 described, with the programs in the form of recursion
                 equations. An initially very simple, lucid, and
                 hopefully correct program is transformed into a more
                 efficient one by altering the recursion structure.
                 Illustrative examples of program transformations are
                 given, and a tentative implementation is described.
                 Alternative structures for programs are shown, and a
                 possible initial phase for an automatic or
                 semiautomatic program manipulation system is
                 indicated.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; functional; recursive programs",
}

@Article{Goguen:1977:IAS,
  author =       "J. A. Goguen and J. W. Thatcher and E. G. Wagner and
                 J. B. Wright",
  title =        "Initial Algebra Semantics and Continuous Algebras",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "1",
  pages =        "68--95",
  month =        jan,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:48:31 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/algebraic.spec.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "An early version is ``Initial Algebra Semantics'',
                 with James Thatcher, IBM T. J. Watson Research Center,
                 Report RC 4865, May 1974",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  checked =      "January 1988",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Graham:1977:PTA,
  author =       "Susan L. Graham",
  title =        "Papers from {Third ACM Symposium on Principles of
                 Programming Languages}",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "1",
  pages =        "96--97",
  month =        jan,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:47:58 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Baker:1977:ASF,
  author =       "Brenda S. Baker",
  title =        "An Algorithm for Structuring Flowgraphs",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "1",
  pages =        "98--120",
  month =        jan,
  year =         "1977",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/321992.321999",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/fortran1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm is described which transforms a flowgraph
                 into a program containing control constructs such as if
                 then else statements, repeat (do forever) statements,
                 multilevel break statements (causing jumps out of
                 enclosing repeats), and multilevel next statements
                 (causing jumps to iterations of enclosing repeats). The
                 algorithm can be extended to create other types of
                 control constructs, such as while or until. The program
                 appears natural because the constructs are used
                 according to common programming practices. The
                 algorithm does not copy code, create subroutines, or
                 add new variables. Instead, goto statements are
                 generated when no other available control construct
                 describes the flow of control. The algorithm has been
                 implemented in a program called STRUCT which rewrites
                 Fortran programs using constructs such as while,
                 repeat, and if then else statements. The resulting
                 programs are substantially more readable than their
                 Fortran counterparts.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Loveman:1977:PIS,
  author =       "David B. Loveman",
  title =        "Program Improvement by Source-to-Source
                 Transformation",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "1",
  pages =        "121--145",
  month =        jan,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/opt.compiler.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The use of source-to-source program transformations
                 has proved valuable in improving program performance.
                 The concept of program manipulation is elucidated by
                 describing its role in both conventional optimization
                 and high level modification of conditional, looping,
                 and procedure structures. An example program fragment
                 written in an Algol-like language is greatly improved
                 by transformations enabled by a user-provided assertion
                 about a data array. A compilation model based on the
                 use of source-to-source program transformations is used
                 to provide a framework for discussing issues of code
                 generation, compilation of high level languages such as
                 APL, and eliminating overhead commonly associated with
                 modular structured programming. Application of the
                 compilation model to several different languages is
                 discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; optimization compilation",
}

@Article{Aho:1977:CGE,
  author =       "A. V. Aho and S. C. Johnson and J. D. Ullman",
  title =        "Code Generation for Expressions with Common
                 Subexpressions",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "1",
  pages =        "146--160",
  month =        jan,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "functional",
}

@Article{Summers:1977:MLP,
  author =       "Phillip D. Summers",
  title =        "A Methodology for {LISP} Program Construction from
                 Examples",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "1",
  pages =        "161--175",
  month =        jan,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/colt.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An automatic programming system, THESYS, for
                 constructing recursive LISP programs for examples of
                 what they do is described. The construction methodology
                 is illustrated as a series of transformations from the
                 set of examples to a program satisfying the examples.
                 The transformations consist of (1) deriving the
                 specific computation associated with specific example,
                 (2) deriving control flow predicates, and (3) deriving
                 an equivalent program specification in the form of
                 recurrence relations. Equivalence between certain
                 recurrence relations and various program schemata is
                 proved. A detailed description of the construction of
                 four programs is presented to illustrate the
                 application of the methodology.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{deChampeaux:1977:IBH,
  author =       "Dennis de Champeaux and Lenie Sint",
  title =        "An Improved Bidirectional Heuristic Search Algorithm",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "177--191",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:54:02 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Boesch:1977:CPD,
  author =       "F. T. Boesch and J. F. Gimpel",
  title =        "Covering the Points of a Digraph with Point-Disjoint
                 Paths and Its Application to Code Optimization",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "192--198",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 22:18:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenberg:1977:HSE,
  author =       "Arnold L. Rosenberg and Larry J. Stockmeyer",
  title =        "Hashing Schemes for Extendible Arrays",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "199--221",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 01 22:49:27 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brandwajn:1977:QMM,
  author =       "Alexandre Brandwajn",
  title =        "A Queueing Model of Multiprogrammed Computer Systems
                 Under Full Load Conditions",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "222--240",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A queueing model of a multiprogrammed computer system
                 with virtual memory is presented. Two system
                 organizations are considered: (i) all the processes
                 present in the system share primary storage; (ii)
                 processes which have generated a file request (slow
                 I/O) lose their memory space until the I/O is
                 completed. The model assumes balanced memory allocation
                 among processes, and accounts for the memory sharing
                 effect through the use of lifetime functions. The model
                 explicitly takes into account the fact that, if a
                 written-onto page is to be replaced at the moment of a
                 page fault, it first has to be saved in the secondary
                 memory. An approximate closed form solution is obtained
                 by using an equivalence and decomposition approach. A
                 procedure for evaluating the accuracy of the
                 approximation is presented. The numerical examples
                 illustrate the influence of the system and program
                 behavior parameters taken into account.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  descriptors =  "Queueing system; decomposition",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer systems
                 programming --- Multiprogramming",
}

@Article{Hofri:1977:COB,
  author =       "Micha Hofri",
  title =        "On Certain Output-Buffer Management Techniques --- a
                 Stochastic Model",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "241--249",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A queueing-type model is used to analyze the storage
                 requirements of a component of a real-time data entry
                 system. The objectives and criteria of the buffer
                 management procedure are identified and related to the
                 variables of the model. Both infinite and finite
                 buffers are considered. The analysis is done
                 symbolically in part and numerically in part to
                 accommodate input processes that are peculiar to the
                 system. Techniques to obtain overflow probabilities are
                 described in detail. It is shown that creating a pool
                 of storage blocks for all the terminals is a better
                 policy than maintaining a separate buffer for each
                 station. The savings brought about by this policy are
                 remarkably insensitive to the characteristics of the
                 input process.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A queueing-type model is used to analyze the storage
                 requirements of a component of a real-time data entry
                 system. The objectives and criteria of the buffer
                 management procedure are identified and related to the
                 variables of the model. Both infinite and finite
                 buffers are considered. The analysis is done
                 symbolically in part and numerically in part to
                 accommodate input processes that are peculiar to the
                 system. Techniques to obtain overflow \ldots{}.",
  classification = "723",
  descriptors =  "Buffer length; overflow; method; real time; steady
                 state probability; memory management; bulk arrival",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems",
}

@Article{Chandy:1977:PFL,
  author =       "K. Mani Chandy and John H. Howard and Donald F.
                 Towsley",
  title =        "Product Form and Local Balance in Queueing Networks",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "250--263",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 16:01:30 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A new property of queueing discipline, station
                 balance, seems to explain why some disciplines yield
                 product form solutions for queues and networks using
                 nonexponential service disciplines and other
                 disciplines do not. A queueing discipline satisfies
                 station balance if rates at which customers receive
                 service at each position of the queue are proportional
                 to the probability that a customer arrives at that
                 position. Station and local balance in \ldots{}.",
  descriptors =  "Exponential queueing network",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ibaraki:1977:PDR,
  author =       "Toshihide Ibaraki",
  title =        "The Power of Dominance Relations in Branch-and-Bound
                 Algorithms",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "264--279",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:37:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ibarra:1977:HAS,
  author =       "Oscar H. Ibarra and Chul E. Kim",
  title =        "Heuristic Algorithms for Scheduling Independent Tasks
                 on Nonidentical Processors",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "280--289",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:38:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hehner:1977:ICP,
  author =       "Eric C. R. Hehner",
  title =        "Information Content of Programs and Operation
                 Encoding",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "290--297",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:39:11 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Davis:1977:PCT,
  author =       "Philip J. Davis",
  title =        "Proof, Completeness, Transcendentals, and Sampling",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "298--310",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:40:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fiduccia:1977:AHL,
  author =       "C. M. Fiduccia and Y. Zalcstein",
  title =        "Algebras Having Linear Multiplicative Complexities",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "311--331",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:50:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hopcroft:1977:TVS,
  author =       "John Hopcroft and Wolfgang Paul and Leslie Valiant",
  title =        "On Time Versus Space",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "332--337",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:51:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jones:1977:ESP,
  author =       "N. D. Jones and S. S. Muchnick",
  title =        "Even Simple Programs Are Hard to Analyze",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "2",
  pages =        "338--350",
  month =        apr,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:49:37 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/absint.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ballantyne:1977:APT,
  author =       "A. Michael Ballantyne and W. W. Bledsoe",
  title =        "Automatic Proofs of Theorems in Analysis Using
                 Nonstandard Techniques",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "353--374",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 22:18:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fayolle:1977:SOC,
  author =       "Guy Fayolle and Erol Gelenbe and Jacques Labetoulle",
  title =        "Stability and Optimal Control of the Packet Switching
                 Broadcast Channel",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "375--386",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The behavior of the broadcast channel for a packet
                 transmission operating in the slotted mode is analyzed
                 and optimized. Mathematical methods of Markov chain
                 theory are used to prove the inherent instability of
                 the system. If no control is applied, the effective
                 throughput of the system will tend to zero if the
                 population of user terminals is sufficiently large. Two
                 classes of control policies are examined; the first
                 acts on admissions to the channel from active
                 terminals, and the second modifies the retransmission
                 rate of packets. In each case sufficient conditions for
                 channel stability are given. Simulations illustrating
                 channel instability and the effect of the optimal
                 control are provided.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks; packet switching; switching
                 systems",
}

@Article{Hunt:1977:ECP,
  author =       "Harry B. {Hunt III} and Daniel J. Rosenkrantz",
  title =        "On Equivalence and Containment Problems for Formal
                 Languages",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "387--396",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 22:18:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Attar:1977:LFF,
  author =       "R. Attar and A. S. Fraenkel",
  title =        "Local Feedback in Full-Text Retrieval Systems",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "397--417",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In a full-text natural-language retrieval system,
                 local feedback is the process of formulating a new
                 improved search based on clustering terms from the
                 documents returned in a previous search of any given
                 query. Experiments were run on a database of US
                 patents. It is concluded that in contrast to global
                 clustering, where the size of matrices limits
                 applications to small databases and improvements are
                 doubtful, local clustering is practical also for large
                 databases and appears to improve overall performance,
                 especially if metrical constraints and weighting by
                 proximity are embedded in the local feedback. The local
                 methods adapt themselves to each individual search and
                 produce useful searchonyms --- terms which are
                 ``synonymous'' in the context of one query. Searchonyms
                 lead to new improved search formulations both via
                 manual and via automated feedback.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information retrieval systems; information science ---
                 Information Retrieval",
}

@Article{Bookstein:1977:ORA,
  author =       "Abraham Bookstein and Don Kraft",
  title =        "Operations Research Applied to Document Indexing and
                 Retrieval Decisions",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "418--427",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Earlier work is reviewed in which a model of word
                 occurrence formed the basis of a decision-making
                 procedure for indexing or, more generally, retrieving
                 documents in response to a request. In the earlier
                 work, words were considered individually. The earlier
                 model is extended to include interactions among terms.
                 The elaborated model allows one to decide whether to
                 retrieve a document by taking into consideration
                 occurrences of all the words in the text. Retrieval in
                 response to Boolean expressions is also considered, as
                 are procedures for ranking documents in accordance with
                 their assessed relevance to a request. The discussion
                 is within the framework of Bayesian decision theory.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901; 912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "bibliographic information retrieval; information
                 science; operations research --- Applications",
}

@Article{Comer:1977:CTI,
  author =       "Douglas Comer and Ravi Sethi",
  title =        "The Complexity of Trie Index Construction",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "428--440",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Trie structures are a convenient way of indexing files
                 in which a key consists of a number of attributes.
                 Records correspond to leaves in the trie. Retrieval
                 proceeds by following a path from the root to a leaf,
                 the choice of edges being determined by attribute
                 values. The size of a trie for a file depends on the
                 order in which attributes are tested. It is shown that
                 determining minimal size tries is an NP-complete
                 problem for several variants of tries and that, for
                 tries in which leaf chains are deleted, determining the
                 trie for which average access time is minimal is also
                 an NP-complete problem. These results hold even for
                 files in which attribute values are chosen from a
                 binary or ternary alphabet.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information science",
}

@Article{Hwang:1977:OBS,
  author =       "K. Hwang and S. B. Yao",
  title =        "Optimal Batched Searching of Tree Structured Files in
                 Multiprocessor Computer Systems",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "441--454",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 17 16:24:11 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Parallel processing and batching techniques are used
                 to improve the response time of search algorithms for
                 high speed information processing in a multiprocessor
                 computer system (MPS) containing multiple processors
                 and multiple memory modules, all of which are under the
                 control of an integral operating system. It is
                 demonstrated that with proper processor assignment and
                 memory allocation the high order search trees are a
                 better access structure for either fixed or distributed
                 batch searching of a large number of records as an
                 online process in an overlapped fashion. It is shown
                 that the optimal tree order is sensitive to the file
                 size, to the batch size or batch distribution, and to
                 the processor\slash memory number in an MPS. Contrary
                 to previous results, binary search trees are shown to
                 be not necessarily optimal for use in many
                 multiprocessing applications. Two simple optimization
                 algorithms are developed to determine the optimal tree
                 order for either fixed size batch or distributed
                 batched searching processes based on a small set of
                 system parameters. Necessary and sufficient conditions
                 are also found for which batched binary searching is
                 still optimal as an asymptotic sense.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming",
}

@Article{Lipton:1977:LTA,
  author =       "R. J. Lipton and L. Snyder",
  title =        "A Linear Time Algorithm for Deciding Subject
                 Security",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "455--464",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A particular protection mechanism from the protection
                 literature --- the take and grant system --- is
                 presented. For this particular mechanism, it is shown
                 that the safety problem can be solved in linear time.
                 Moreover, the security policies that this mechanism can
                 enforce, are characterized.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing",
}

@Article{Lin:1977:DPG,
  author =       "Benjamin W. Y. Lin and Ronald L. Rardin",
  title =        "Development of a Parametric Generating Procedure for
                 Integer Programming Test Problems",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "465--472",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:39:30 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kou:1977:LDA,
  author =       "Lawrence T. Kou",
  title =        "On Live-Dead Analysis for Global Data Flow Problems",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "473--483",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:42:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Reynolds:1977:SDF,
  author =       "John C. Reynolds",
  title =        "Semantics of the Domain of Flow Diagrams",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "484--503",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  checked =      "18 June 1990",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wegbreit:1977:CSI,
  author =       "Ben Wegbreit",
  title =        "Complexity of Synthesizing Inductive Assertions",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "504--512",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:43:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hyafil:1977:CPE,
  author =       "L. Hyafil and H. T. Kung",
  title =        "The Complexity of Parallel Evaluation of Linear
                 Recurrences",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "513--521",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:54:59 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/conc.scientific.computing.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lipton:1977:WPS,
  author =       "Richard J. Lipton and Yechezkel Zalcstein",
  title =        "Word Problems Solvable in Logspace",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "522--526",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:53:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Krause:1977:EAS,
  author =       "K. L. Krause and V. Y. Shen and H. D. Schwetman",
  title =        "Errata: ``{Analysis} of Several Task-Scheduling
                 Algorithms for a Model of Multiprogramming Computer
                 Systems''",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "3",
  pages =        "527--527",
  month =        jul,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:50:12 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Krause:1975:AST}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shostak:1977:SIM,
  author =       "Robert E. Shostak",
  title =        "On the {SUP-INF} Method for Proving {Presburger}
                 Formulas",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "529--543",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:50:23 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/constr.logic.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{DeMillo:1977:SSM,
  author =       "R. A. DeMillo and K. Vairavan and E. Sycara-Cyranski",
  title =        "A Study of Schedules as Models of Synchronous Parallel
                 Computation",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "544--565",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 22:18:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Maekawa:1977:QMC,
  author =       "Mamoru Maekawa",
  title =        "Queueing Models for Computer Systems Connected by a
                 Communication Line",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "566--582",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A system consisting of two identical computer systems
                 connected by a communication line is analyzed by using
                 queueing theory to obtain the turnaround time
                 distribution, the traffic intensity between the two
                 computer systems, and the intertransfer time
                 distribution. The analysis is carried out under the
                 assumptions of Poisson arrivals and exponential service
                 times. The queue discipline analyzed is
                 first-come-first-served with queue adjustments on both
                 job arrivals and completions. The results indicate that
                 the turnaround times are more dispersed in networks
                 than in centralized systems. Another queue discipline,
                 still first-come-first-served but with queue
                 adjustments only on job completions, is analyzed for
                 the traffic intensity between the computer systems. The
                 result shows that the queue discipline with queue
                 adjustments only on job completions produces much less
                 traffic for a high input traffic rate than the one with
                 queue adjustments on both job arrivals and completions.
                 Simulation results suggest that the above observation
                 holds independent of the form of interarrival and
                 service time distributions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks; probability --- Queueing Theory",
}

@Article{Lynch:1977:LSR,
  author =       "Nancy Lynch",
  title =        "Log Space Recognition and Translation of Parenthesis
                 Languages",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "583--590",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 06 22:18:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blake:1977:BBB,
  author =       "Ian F. Blake and Alan G. Konheim",
  title =        "Big Buckets Are (Are Not) Better!",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "591--606",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/bin-packing.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yu:1977:AER,
  author =       "C. T. Yu and W. S. Luk",
  title =        "Analysis of Effectiveness of Retrieval in Clustered
                 Files",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "607--622",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of multiple key retrieval using clustered
                 search is considered. a probabilistic model which
                 allows the estimation of the ratio of the number of
                 desired records in one cluster to that of another is
                 presented. An analysis of the ratio is made under
                 variations of different parameters of the model. The
                 results provide guidelines for the rejection of a
                 cluster under appropriate situations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information science",
}

@Article{Bui:1977:ECP,
  author =       "T. D. Bui",
  title =        "Errata and Comments on a Paper by {J. R. Cash}",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "623--623",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:52:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Cash:1976:SIR}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sahasrabudhe:1977:SFI,
  author =       "S. E. Sahasrabudhe and A. D. Kulkarni",
  title =        "On Solving {Fredholm} Integral Equations of the First
                 Kind",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "624--629",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 22:52:16 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kinariwala:1977:FSA,
  author =       "Bharat Kinariwala and A. G. Rao",
  title =        "Flow Switching Approach to the Maximum Flow Problem:
                 {I}",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "630--645",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:56:49 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/netflow.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Omahen:1977:CBM,
  author =       "Kenneth J. Omahen",
  title =        "Capacity Bounds for Multiresource Queues",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "646--663",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:40:11 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hirschberg:1977:ALC,
  author =       "Daniel S. Hirschberg",
  title =        "Algorithms for the Longest Common Subsequence
                 Problem",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "664--675",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:57:11 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Das:1977:MRF,
  author =       "Shawpawn Kumar Das",
  title =        "A Machine Representation of Finite ${T}_0$
                 Topologies",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "676--692",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 2 23:53:47 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Young:1977:OAP,
  author =       "Paul Young",
  title =        "Optimization Among Provably Equivalent Programs",
  journal =      j-J-ACM,
  volume =       "24",
  number =       "4",
  pages =        "693--700",
  month =        oct,
  year =         "1977",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 03 22:29:17 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Perl:1978:FTD,
  author =       "Y. Perl and Y. Shiloach",
  title =        "Finding Two Disjoint Paths Between Two Pairs of
                 Vertices in a Graph",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "1--9",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 23:57:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Logrippo:1978:REM,
  author =       "Luigi Logrippo",
  title =        "Renamings and Economy of Memory in Program Schemata",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "10--22",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 23:58:12 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Book:1978:SRC,
  author =       "Ronald V. Book",
  title =        "Simple Representations of Certain Classes of
                 Languages",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "23--31",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 23:58:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hunt:1978:LBR,
  author =       "Harry B. {Hunt, III} and Thomas G. Szymanski",
  title =        "Lower Bounds and Reductions Between Grammar Problems",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "32--51",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 23:59:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Hunt:1978:CLB}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Attar:1978:KLT,
  author =       "R. Attar and Y. Choueka and N. Dershowitz and A. S.
                 Fraenkel",
  title =        "Kedma --- Linguistic Tools for Retrieval Systems",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "52--66",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In a full-text natural-language retrieval system,
                 frequent need for automatic linguistic analysis arises,
                 e.g. for keyword expansion in a search process, content
                 analysis, or automatic construction of concordances.
                 The availability of sophisticated linguistic tools,
                 which is highly desirable for languages such as
                 English, is quite imperative for, say, Semitic
                 languages, whose complex morphological structure
                 renders simple-minded and approximate solutions such as
                 suffix stripping totally useless. Sophisticated tools
                 were designed and constructed via the fusion of
                 grammatical analysis and grammatical synthesis,
                 resulting in a set of global files which provide in
                 some sense a complete grammatical and lexical
                 description of the language. These files induce a set
                 of local files which adapt to the database at hand and
                 permit flexible on-line morphological analysis.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information retrieval systems",
}

@Article{Cooper:1978:FPU,
  author =       "W. S. Cooper and M. E. Maron",
  title =        "Foundations of Probabilistic and Utility-Theoretic
                 Indexing",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "67--80",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "One of the most perplexing problems of information
                 retrieval has been the establishment of rational
                 criteria for deciding what index terms or descriptors
                 to assign to a unit of stored information for purposes
                 of later retrieval. Both probabilistic and
                 utility-theoretic criteria have in the past been
                 proposed for this purpose. The present paper derives
                 explicit decision rules of both kinds from a common
                 conceptual and mathematical foundation. The result is a
                 unified theory of indexing.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information science",
}

@Article{Sameh:1978:SPL,
  author =       "A. H. Sameh and D. J. Kuck",
  title =        "On Stable Parallel Linear System Solvers",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "81--91",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:01:00 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "linear system; nla; prll",
}

@Article{Gonzalez:1978:PSU,
  author =       "Teofilo Gonzalez and Sartaj Sahni",
  title =        "Preemptive Scheduling of Uniform Processor Systems",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "92--101",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An $O(n)$ time algorithm is presented to obtain an
                 optimal finish time preemptive schedule for $n$
                 independent tasks on $m$ uniform processors. This
                 algorithm assumes that the tasks are initially ordered
                 by task length and that the uniform processors are
                 ordered by processor speed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; computer systems
                 programming",
}

@Article{Galil:1978:LTL,
  author =       "Zvi Galil and Joel Seiferas",
  title =        "A Linear-Time On-Line Recognition Algorithm for
                 ``Palstar''",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "102--111",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:02:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gentleman:1978:SCR,
  author =       "W. Morven Gentleman",
  title =        "Some Complexity Results for Matrix Computations on
                 Parallel Processors",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "112--115",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:02:36 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/conc.scientific.computing.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ibarra:1978:RBM,
  author =       "O. H. Ibarra",
  title =        "Reversal-Bounded Multicounter Machines and Their
                 Decision Problems",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "116--133",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:02:57 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/traces.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "For some variants of two-way multicounter machines the
                 paper investigates the decidability of the emptiness,
                 infiniteness, disjointness, containment, universe, and
                 equivalence problems. In particular, it shows
                 decidability of these problems for deterministic
                 two-way multicounter machines whose input and counters
                 are reversal-bounded.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lewis:1978:RSC,
  author =       "Harry R. Lewis",
  title =        "Renaming a Set of Clauses as a {Horn} Set",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "134--135",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:03:45 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Schnorr:1978:SQC,
  author =       "C. P. Schnorr",
  title =        "Satisfiability is Quasilinear Complete in {NQL}",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "136--145",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:04:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Seiferas:1978:SNT,
  author =       "Joel I. Seiferas and Michael J. Fischer and Albert R.
                 Meyer",
  title =        "Separating Nondeterministic Time Complexity Classes",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "146--167",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:04:55 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wand:1978:NIR,
  author =       "Mitchell Wand",
  title =        "A new Incompleteness Result for {Hoare}'s System",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "1",
  pages =        "168--175",
  month =        jan,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/prog.lang.theory.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Horvath:1978:SSA,
  author =       "Edward C. Horvath",
  title =        "Stable Sorting in Asymptotically Optimal Time and
                 Extra Space",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "177--199",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that a stable sorting algorithm may be
                 derived directly from a stable merging algorithm. A
                 definition is presented of the concept of a contiguent,
                 and shows that a contiguent-forming algorithm may be
                 used as the basis for a stable merging algorithm. A
                 class of contiguent-forming algorithms which exhibit a
                 space\slash time tradeoff is presented. In the
                 extremes, one algorithm in the class gives rise to a
                 stable merge requiring $O(N)$ time and $O(N \log N)$
                 bits of extra space; another algorithm requires $O(N
                 \log N)$ time and $O(\log N)$ bits of extra space to
                 merge. A description is given of the Stable Kronrod
                 Merge, which requires $O(N)$ time and $O(\log N)$ bits
                 of extra space, but is not applicable to all cases. How
                 the Stable Kronrod Merge may be combined with
                 contiguent-forming algorithms to yield a generally
                 applicable class of stable merging algorithms is
                 outlined.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming",
}

@Article{Rivest:1978:OAK,
  author =       "Ronald L. Rivest",
  title =        "Optimal Arrangement of Keys in a Hash Table",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "200--209",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "when open addressing is used to resolve collisions in
                 a hash table, a given set of keys may be arranged in
                 many ways; typically this depends on the order in which
                 the keys are inserted. It is shown that arrangements
                 minimizing either the average or worst-cast number of
                 probes required to retrieve any key in the table can be
                 found using an algorithm for the assignment problem.
                 The worst-case retrieval time can be reduced to
                 $O(\log_2(M))$ with probability $1 - \epsilon(M)$ when
                 storing $M$ keys in a table of size M, where
                 $\epsilon(M)$ goes to $0$ as $M$ goes to infinity. Also
                 examined are insertion algorithms to see how to apply
                 these ideas for a dynamically changing set of keys.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Yu:1978:EAI,
  author =       "C. T. Yu and G. Salton and M. K. Siu",
  title =        "Effective Automatic Indexing Using Term Addition and
                 Deletion",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "210--225",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In information retrieval indexing is the task
                 consisting of the assignment to stored records and
                 incoming information requests of content identifiers
                 capable of representing record or query content. If the
                 indexing is performed automatically and the records are
                 written documents, an initial set of index terms might
                 be chosen by taking words extracted from document
                 titles or abstracts; this initial term assignment might
                 then be improved by adding related terms chosen from a
                 thesaurus, by deleting extraneous or marginal terms,
                 and by replacing single terms by term combinations and
                 phrases. Formal proofs are given of the retrieval
                 effectiveness under well-defined conditions of indexing
                 policies based on the use of single terms, term
                 additions and deletions, and term combinations or
                 phrases.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information science",
}

@Article{Baudet:1978:AIM,
  author =       "G\'erard M. Baudet",
  title =        "Asynchronous Iterative Methods for Multiprocessors",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "226--244",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/dai.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A class of asynchronous iterative methods is presented
                 for solving a system of equations. Existing iterative
                 methods are identified in terms of asynchronous
                 iterations, and new schemes are introduced
                 corresponding to a parallel implementation on a
                 multiprocessor system with no synchronization between
                 cooperating processes. A sufficient condition is given
                 to guarantee the convergence of any asynchronous
                 iterations, and results are extended to include
                 iterative methods with memory. Asynchronous iterative
                 methods are then evaluated from a computational point
                 of view, and bounds are derived for the efficiency. The
                 bounds are compared with actual measurements obtained
                 by running various asynchronous iterations on a
                 multiprocessor, and the experimental results show
                 clearly the advantage of purely asynchronous iterative
                 methods.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; computer systems
                 programming",
}

@Article{Kung:1978:AAF,
  author =       "H. T. Kung and J. F. Traub",
  title =        "All Algebraic Functions Can Be Computed Fast",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "245--260",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 08 17:07:02 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The expansions of algebraic functions can be computed
                 ``fast'' using the Newton Polygon Process and any
                 ``normal'' iteration. Let $M(j)$ be the number of
                 operations sufficient to multiply two $j$th-degree
                 polynomials. It is shown that the first $N$ terms of an
                 expansion of any algebraic function defined by an
                 $n$th-degree polynomial can be computed in $O(nM(N))$
                 operations, while the classical method needs $O(N^n)$
                 operations. Among the numerous applications of
                 algebraic functions are symbolic mathematics and
                 combinatorial analysis. Reversion, reciprocation, and
                 $n$th root of a polynomial are all special cases of
                 algebraic functions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{McKie:1978:ESF,
  author =       "William McKie",
  title =        "An Example of a Skewing Function",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "261--265",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In the interactive computer-aided design of shapes, it
                 is often advantageous to distort a well-known function
                 so that it more closely represents the desired shape.
                 The shape is then compactly describable by the original
                 function and some parameter associated with the amount
                 of distortion. General characteristics of a function
                 which will skew a two-dimensional function are
                 described. A specific example of one of these skewing
                 functions is then presented and discussed. It is
                 compared to skewing functions of more limited scope,
                 and the results of distortion using the proposed
                 skewing function are presented in several plots.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer aided design; computer graphics",
}

@Article{Mulvey:1978:PSP,
  author =       "John M. Mulvey",
  title =        "Pivot Strategies for Primal-Simplex Network Codes",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "266--270",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/netflow.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Techniques are presented for improving the efficiency
                 of primal-simplex network codes. An adaptive candidate
                 list, enumerating the pivot variables, is provided.
                 Proper use of this list greatly reduces computation
                 time (especially in large-scale network problems) and
                 experimental data is included. It is again shown that
                 the number of iterations, i.e. pivots, is a poor
                 surrogate for measuring the performance of
                 primal-simplex network algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming, linear",
}

@Article{Musser:1978:EPI,
  author =       "David R. Musser",
  title =        "On the Efficiency of a Polynomial Irreducibility
                 Test",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "271--282",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:09:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Omahen:1978:AAD,
  author =       "K. Omahen and V. Marathe",
  title =        "Analysis and Applications of the Delay Cycle for the
                 {M/M/C} Queueing System",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "283--303",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The method of analysis employing decomposition of busy
                 periods has, in various forms, been applied to the
                 M/G/1 queueing system under a variety of scheduling
                 rules. This work extends the technique of decomposition
                 of busy periods in order to deal with the M/M/c
                 queueing system. Particular attention is given to a
                 special busy period referred to as a ``delay cycle''.
                 The delay cycle commences with a delay period (of
                 general distribution) in which jobs arrive but are not
                 serviced; at the conclusion of the delay period,
                 processing begins and continues until the system is
                 empty. Closed form solutions are obtained for various
                 entities such as distribution of busy period length and
                 expected waiting time conditioned on the type of busy
                 period in progress at the time of job arrival. These
                 results are applied and extended to the analysis of six
                 examples of multiprocessor systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital --- Multiprocessing;
                 probability",
}

@Article{Zoltners:1978:DDB,
  author =       "Andris A. Zoltners",
  title =        "A Direct Descent Binary Knapsack Algorithm",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "304--311",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A direct descent algorithm for the binary knapsack
                 problem is presented. The problem variables are entered
                 into a list according to decreasing (increasing)
                 contribution\slash resource ratios. The variables are
                 examined in descending order until one of several
                 fathoming conditions establishes that further descent
                 is not necessary. A backtrack up the list ensues,
                 followed by a subsequent descent. This pattern
                 continues until the optimum is located. This strategy
                 has two advantages: (1) A linear programming bound is
                 available at each point, and (2) the search is easily
                 managed; in fact, the current position in the search is
                 completely characterized by the set of variables fixed
                 at 1 and the index of the variable being examined.
                 Since the binary knapsack usually has many incumbents,
                 a reduction is incorporated into the search. Results
                 are examined.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "integer programming; mathematical programming",
}

@Article{Jones:1978:CFM,
  author =       "Neil D. Jones and Steven S. Muchnick",
  title =        "The Complexity of Finite Memory Programs with
                 Recursion",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "312--321",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In order to study the effects of recursion on the
                 complexity of program analysis, a finite memory machine
                 with recursive calls is defined, as well as two
                 parameter passing mechanisms which extend the power of
                 the language. Close upper and lower bounds on the
                 complexity of determining whether a program accepts the
                 empty language are given for each of the three program
                 models. It is shown that such questions as acceptance
                 of the empty set, equivalence, and so on are
                 intractable even for these relatively simple
                 programs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Maier:1978:CSP,
  author =       "David Maier",
  title =        "The Complexity of Some Problems on Subsequences and
                 Supersequences",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "322--336",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:28:59 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  comment =      "A subsequence of $S = s_1 s_2 \ldots s_n$ is any
                 sequence $S$ with some number of the $n$ elements
                 deleted. It is shown that a yes/no version of the
                 longest common subsequence problem is NP-complete for
                 sequences over an alphabet of size two. It is also
                 shown that a yes/no version of the shortest common
                 superstring problem is NP-complete for sequences over
                 an alphabet of size five.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yao:1978:HBT,
  author =       "Andrew C. Yao and Ronald L. Rivest",
  title =        "$k + 1$ Heads Are Better than $k$",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "337--340",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:12:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harrison:1978:AGR,
  author =       "Harrison and Rubin",
  title =        "Another Generalization of Resolution",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "341--351",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:13:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Landweber:1978:PCF,
  author =       "L. H. Landweber and E. L. Robertson",
  title =        "Properties of Conflict-Free and Persistent {Petri}
                 Nets",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "2",
  pages =        "352--364",
  month =        apr,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:13:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kafura:1978:ADM,
  author =       "D. G. Kafura and V. Y. Shen",
  title =        "An Algorithm to Design the Memory Configuration of a
                 Computer Network",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "365--377",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A model of a minicomputer network which consists of an
                 arbitrary number of identical processors is considered.
                 Each processor in the network has a fixed, though
                 possibly different sized, private memory. The network
                 processes a set of tasks with known execution times and
                 memory requirements. One of the problems a designer of
                 such a network must solve is to determine the memory
                 sizes for such a system. Algorithms to determine the
                 memory configuration are presented and analyzed using
                 worst-case bounds and computer simulation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks; computers, miniature",
}

@Article{Rao:1978:PAC,
  author =       "Gururaj S. Rao",
  title =        "Performance Analysis of Cache Memories",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "378--395",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/distmem.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Using the Independent Reference assumption to model
                 program behavior, the performance of different buffer
                 organizations (Fully Associative, Direct Mapping, Set
                 Associative, and Sector) are analyzed: (1) The
                 expressions for their fault rate are derived. To show
                 more explicitly the dependence of the fault rate on the
                 factors that affect it, distribution-free upper bounds
                 on fault rates are computed for the Direct Mapping, Set
                 Associative, and Sector buffers. The use of such bounds
                 is illustrated in the case of the Direct Mapping
                 buffer. (2) The performance of the buffers for FIFO and
                 Random Replacement are shown to be identical. (3) It is
                 possible to restructure programs to take advantage of
                 the basic organization of the buffers. The effect of
                 such restructuring is quantified for the Direct Mapping
                 buffer. It is shown that the performance of the Direct
                 Mapping buffer under near-optimal restructuring is
                 comparable to the performance of the Fully Associative
                 buffer. Further, the effect of this restructuring is
                 shown to be potentially stronger than that of buffer
                 replacement algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; memory hierarchy;
                 Performance Evaluation: Analytic",
}

@Article{Rotem:1978:GBT,
  author =       "Doron Rotem and Y. L. Varol",
  title =        "Generation of Binary Trees from Ballot Sequences",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "396--404",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:15:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sudborough:1978:TCD,
  author =       "I. H. Sudborough",
  title =        "On the Tape Complexity of Deterministic Context-Free
                 Languages",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "405--414",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 18:37:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wilf:1978:GBA,
  author =       "Herbert S. Wilf",
  title =        "A Global Bisection Algorithm for Computing the Zeros
                 of Polynomials in the Complex Plane",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "415--420",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:16:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{McKellar:1978:DPR,
  author =       "A. C. McKellar and C. K. Wong",
  title =        "Dynamic Placement of Records in Linear Storage",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "421--434",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/bin-packing.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Allocation of space in a linear storage medium is
                 considered when space must be allocated dynamically as
                 customers arrive. A heuristic is proposed for this
                 problem and for a simple model of the resulting
                 reference sequence, we show that the average distance
                 between consecutive references is asymptotically
                 7n\slash 30, where $n$ is the size of the storage. For
                 optimal static placement where one waits for all
                 arrivals before any space allocation, the average
                 distance is shown to be asymptotically 7n\slash 30. For
                 random placement, the average distance is
                 asymptotically n/3. Thus, the heuristic is
                 asymptotically optimal in a strong sense. For
                 reasonable values of $n$, it is shown that the
                 heuristic is nearly as good as optimal static placement
                 and much better than random placement.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems",
}

@Article{Garfinkel:1978:BTS,
  author =       "R. S. Garfinkel and K. C. Gilbert",
  title =        "The Bottleneck Traveling Salesman Problem:
                 {Algorithms} and Probabilistic Analysis",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "435--448",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:17:50 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Iglehart:1978:RSR,
  author =       "Donald L. Iglehart and Gerald S. Shedler",
  title =        "Regenerative Simulation of Response Times in Networks
                 of Queues",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "449--460",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 18:43:00 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Although much progress has been made in obtaining
                 solutions for queueing network models of computer
                 systems, relatively little has been made in determining
                 the response time distributions in such models.
                 \ldots{} The authors extend the regenerative method to
                 response time processes by marking a job and using an
                 expanded state space to assure that one can obtain
                 regeneration points for the marked job's response time
                 process.",
  descriptors =  "Simulation; response time; distribution; queueing
                 network; independent cycles; model",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hoare:1978:SPP,
  author =       "C. A. R. Hoare",
  title =        "Some Properties of Predicate Transformers",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "461--480",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:18:37 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Butler:1978:ADF,
  author =       "Jon T. Butler",
  title =        "Analysis and Design of Fanout-Free Networks of
                 Positive Symmetric Gates",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "481--498",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm is presented for assigning functions to
                 gates in a fanout-free network so that a given function
                 is realized. Since the method is tabular, it is easily
                 programmed. As long as the gates used are symmetric and
                 positive the synthesis technique can be tailored to the
                 particular set of gates available, for example, AND,
                 OR, and majority gates. It is shown that the functions
                 realized by such networks are a proper subset of the
                 set of unate functions but not of threshold functions.
                 Also, it is shown that the fanout-free functions that
                 are threshold realizable are exactly those realized by
                 the cascade, a special case of the fanout-free
                 network.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "logic circuits; logic devices --- Gates",
}

@Article{Garey:1978:SNC,
  author =       "M. R. Garey and D. S. Johnson",
  title =        "``Strong'' {NP}-Completeness Results: {Motivation},
                 Examples, and Implications",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "499--508",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:20:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pippenger:1978:TST,
  author =       "Nicholas Pippenger",
  title =        "A Time-Space Trade-Off",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "3",
  pages =        "509--515",
  month =        jul,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:20:49 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Itai:1978:SMP,
  author =       "Alon Itai and Michael Rodeh and Steven L. Tanimoto",
  title =        "Some Matching Problems for Bipartite Graphs",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "517--525",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:53:25 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Certain applications require finding a perfect
                 matching in a bipartite graph that satisfies some
                 additional properties. For one such type of restriction
                 the problem is proven to be NP-complete. If for a
                 single subset of edges no more than r edges may be
                 included in the matching then an $O(n e)$ algorithm is
                 given. An efficient algorithm for finding all perfect
                 matchings is presented. It requires $O(e)$ time per
                 matching and a total of $O(e)$ space. This algorithm
                 may be used to calculate the permanent of a matrix.
                 Finally, the algorithm is generalized to find all
                 maximum matchings. These results are applicable to
                 marching problems that arise in several areas of
                 automatic data processing.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing; mathematical techniques",
}

@Article{Allen:1978:SOB,
  author =       "Brian Allen and Ian Munro",
  title =        "Self-Organizing Binary Search Trees",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "526--535",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:53:22 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Heuristics are considered which attempt to maintain a
                 binary search tree in a near optimal form, assuming
                 that elements are requested with fixed, but unknown,
                 independent probabilities. A ``move to root'' heuristic
                 is shown to yield an expected search time within a
                 constant factor of that of an optimal static binary
                 search tree. On the other hand, a closely related
                 ``simple exchange'' technique is shown not to have this
                 property. The rate of convergence of the move to root
                 heuristic is discussed. Also considered is the more
                 general case in which elements not in the tree may have
                 nonzero probability of being requested.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing; mathematical techniques --- Trees",
}

@Article{Bentley:1978:ANM,
  author =       "J. L. Bentley and H. T. Kung and M. Schkolnick and C.
                 D. Thompson",
  title =        "On the Average Number of Maxima in a Set of Vectors
                 and Applications",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "536--543",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:58:45 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/78.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A maximal vector of a set is one which is not less
                 than any other vector in all components. A recurrence
                 relation is derived for computing the average number of
                 maximal vectors in a set of $n$ vectors in $d$-space
                 under the assumption that all $(n!)^d$ relative
                 orderings are equally probable. Solving the recurrence
                 shows that the average number of maxima is $O((\ln
                 n)^{d 1})$ for fixed $d$. This result is used to
                 construct an algorithm for finding all the maxima that
                 have expected running time linear in $n$ (for sets of
                 vectors drawn under these assumptions). The result is
                 then used to find an upper bound on the expected number
                 of convex hull points in a random point set.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming, dynamic",
}

@Article{Guibas:1978:AHT,
  author =       "Leo J. Guibas",
  title =        "The Analysis of Hashing Techniques that Exhibit
                 $k$-ary Clustering",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "544--555",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The performance of hashing algorithms is related to
                 the notion of clustering, that is, the pile-up
                 phenomenon that occurs because many keys may probe the
                 table locations in the same sequence. A hashing
                 technique is said to exhibit $k$-ary clustering if the
                 search for a key begins with $k$ independent random
                 probes and the subsequent sequence of probes is
                 completely determined by the location of the $k$
                 initial probes. Such techniques may be very bad; for
                 instance, the average number of probes necessary for
                 insertion may grow linearly with the table size.
                 However, on the average (that is if the permutations
                 describing the method are randomly chosen), $k$-ary
                 clustering techniques for $k$ greater than 1 are very
                 good. In fact the average performance is asymptotically
                 equivalent to the performance of uniform probing, a
                 method that exhibits no clustering and is known to be
                 optimal in a certain sense.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; hashing
                 algorithms; information science",
}

@Article{Johnson:1978:LBS,
  author =       "Donald B. Johnson and Samuel D. Kashdan",
  title =        "Lower Bounds for Selection in ${X} + {Y}$ and Other
                 Multisets",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "556--570",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:24:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Crespi-Reghizzi:1978:NCF,
  author =       "S. Crespi-Reghizzi and G. Guida and D. Mandrioli",
  title =        "Noncounting Context-Free Languages",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "571--580",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The class of noncounting (aperiodic) context-free
                 parenthesis languages is introduced here and is found
                 to extend the classical theory of noncounting regular
                 languages. It is proved that it is possible to decide
                 whether or not a context-free parenthesis grammar is
                 noncounting. The class of $k$-distinct-homogeneous
                 grammars (previously introduced in connection with
                 studies on grammatical inference or language
                 acquisition) is rigorously defined and proved to be
                 noncounting. It is argued that the noncounting model
                 fits the syntactic aspects of natural or artificial
                 languages more closely than the context-free model.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Brent:1978:FAM,
  author =       "R. P. Brent and H. T. Kung",
  title =        "Fast Algorithms for Manipulating Formal Power Series",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "581--595",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/322092.322099",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/auto.diff.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The classical algorithms require order $n^3$
                 operations to compute the first $n$ terms in the
                 reversion of a power series or the composition of two
                 series, and order $n^2 \log n$ operations if the fast
                 Fourier transform is used for power series
                 multiplication. It is shown that the composition and
                 reversion problems are equivalent (up to constant
                 factors), and we give algorithms which require only
                 order $(n \log n)^{3/2}$ operations. In many cases of
                 practical importance only order $n \log n$ operations
                 are required; these include certain special functions
                 of power series and power series solution of certain
                 differential equations. Applications to root-finding
                 methods which use inverse interpolation and to queueing
                 theory are described, some results on multivariate
                 power series are stated, and several open questions are
                 mentioned.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Itai:1978:TCF,
  author =       "Alon Itai",
  title =        "Two-Commodity Flow",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "596--611",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:25:25 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/netflow.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lawler:1978:PSU,
  author =       "E. L. Lawler and J. Labetoulle",
  title =        "On Preemptive Scheduling of Unrelated Parallel
                 Processors by Linear Programming",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "612--619",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that certain problems of optimal
                 preemptive scheduling of unrelated parallel processors
                 can be formulated and solved as linear programming
                 problems. As a by-product of the linear programming
                 formulations of these problems, upper bounds are
                 obtained on the number of preemptions required for
                 optimal schedules. In particular it is shown that no
                 more than $O(m^2)$ preemptions are necessary, in order
                 to schedule $n$ jobs on m unrelated processors so as to
                 minimize makespan.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; mathematical programming,
                 linear",
}

@Article{Vantilborgh:1978:EAE,
  author =       "Hendrik Vantilborgh",
  title =        "Exact Aggregation in Exponential Queueing Networks",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "620--629",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1978.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Aggregation is often used for the investigation of
                 large systems. This technique is particularly
                 attractive for nearly completely decomposable systems.
                 It is essentially an approximate method, but it remains
                 attractive since the error is small and bounds for it
                 can be obtained. The condition under which aggregation
                 will, in an exponential queueing network with a single
                 type of customer, yield exact results is derived and
                 discussed. It is shown how this result can be of use
                 for the parameterized investigation of subnetworks.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "922",
  descriptors =  "Queueing network; product form; aggregation",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Brand:1978:PCP,
  author =       "Daniel Brand",
  title =        "Path Calculus in Program Verification",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "630--651",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A method for proving and disproving properties of
                 programs is described. Its main features are:
                 recursively defined procedures can be used in
                 assertions; loop invariants are not necessary; absence
                 of run time errors is proven; counterexamples to
                 incorrect programs can be given. Experience with the
                 method's implementation is reported.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; program verification",
}

@Article{Downey:1978:ACA,
  author =       "Peter J. Downey and Ravi Sethi",
  title =        "Assignment Commands with Array References",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "652--666",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Straight line programs with assignment statements
                 involving both simple and array variables are
                 considered. Two such programs are equivalent if they
                 compute the same values as a function of the inputs.
                 Testing the equivalence of array programs is shown to
                 be NP-hard. If array variables are updated but never
                 subsequently referenced, equivalence can be tested in
                 polynomial time. Programs without array variables can
                 be tested for equivalence in expected linear time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Sethi:1978:CEE,
  author =       "Ravi Sethi",
  title =        "Conditional Expressions with Equality Tests",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "667--674",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:28:04 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arvillias:1978:PPC,
  author =       "A. C. Arvillias and D. G. Maritsas",
  title =        "Partitioning the Period of a Class of $m$-Sequences
                 and Application to Pseudorandom Number Generation",
  journal =      j-J-ACM,
  volume =       "25",
  number =       "4",
  pages =        "675--686",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/322092.322106",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "A criterion is derived for the ``$q$-equipartition''
                 of the period of $m$-sequences based on primitive
                 trinomials (PT's), $1 + D^q + D^p$. It is shown that
                 the class of PT's with $q = 2^t$, where $t$ is an
                 integer, can be implemented efficiently so as to
                 produce in parallel $q$ phase-shifted versions of the
                 same $m$-sequence with relative delays analytically
                 evaluated. These implementations lead to the
                 construction of efficient algorithms for the generation
                 of $q$-bit pseudorandom number sequences equivalent in
                 correlation performance to the Tausworthe-type
                 generators. The algorithms are of the GFSR type. The
                 advantage of utilizing the specific class of PT's is
                 that the initialization procedures is not required. The
                 corresponding linear recurrences directly yield coding
                 for the generators which deliver $q$-bit number
                 sequences uncorrelated over a length approximately
                 equal to $(2^p 1)/q$. It is important that three
                 members of this class, of degrees $p = 127, 175, 521$,
                 respectively, are Mersenne prime.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical statistics",
}

@Article{Hunt:1978:CLB,
  author =       "H. B. {Hunt, III} and T. G. Szymanski",
  title =        "Corrigendum: ``{Lower} Bounds and Reductions Between
                 Grammar Problems''",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "687--688",
  month =        oct,
  year =         "1978",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:26:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Hunt:1978:LBR}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Parchmann:1979:CSM,
  author =       "Rainer Parchmann",
  title =        "Control System Model for Critically Timed Sources",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "1--5",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:21:02 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Parchmann:1980:CCS}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Smith:1979:CSP,
  author =       "Alan Jay Smith",
  title =        "Characterizing the Storage Process and its Effect on
                 the Update of Main Memory by Write Through",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "6--27",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Os/storage.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of multiple, nonidentical copies of the
                 same data in computer systems with both local cache and
                 shared main memory has led some manufacturers to use
                 ``write-through'' updating for main memory despite some
                 known efficiency advantages favoring ``swap'' updating.
                 It is proposed that write throughs to main memory be
                 buffered, thus reducing the probability that the CPU
                 will have to wait for a main memory write operation to
                 take place. Statistics on the nonstationary point
                 process of stores to memory lead to a model in which
                 the sequence of stores is considered to be described by
                 a Poisson process which proceeds at rate $\lambda_i$
                 for a fraction of time $\beta_i$. This type of process
                 has been described as a regime process. Values for
                 $\lambda_i$ and $\beta_i$ are obtained by (least
                 squares) fitting the distribution function for the
                 number of stores per 100 memory cycles. This model is a
                 model for the effect of the storage process on
                 write-through updating, but is not a model of the
                 storage process itself. The model is then used to
                 estimate the frequency of blocking in a computer system
                 using a finite queue to buffer write-through
                 operations. The predicted frequency of blocking is
                 found to agree well with the actual frequency of
                 blocking as determined by trace driven simulation.
                 Comparisons are made with swap updating.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Architectures; computer operating systems; memory
                 hierarchy; Performance Evaluation: Queueing",
}

@Article{Gupta:1979:BSC,
  author =       "Udaiprakash Gupta",
  title =        "Bounds on Storage for Consecutive Retrieval",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "28--36",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A file with m permissible queries (that are known a
                 priori) can be partitioned into $2^m$-disjoint bins,
                 each consisting of exactly those records that are
                 pertinent to one specific set of queries, and not
                 pertinent to the remaining queries. A generalized
                 version of the consecutive retrieval organization (CRO)
                 called $f$-graph CRO (one in which redundancy of
                 records and explicit pointers are permitted) is
                 examined. It is shown that any $f$-graph CRO requires
                 at least one-half $m 2^{m - 1}$ bin occurrences. With
                 some additional restrictions on the structure of the
                 acyclic organization, the lower bound can be tightened
                 to $4/7 m 2^{m - 1}$. An $f$-graph CRO which requires
                 only $9/16 m 2^{m - 1}$ bin occurrences is also
                 exhibited and it is shown that with a broad class of
                 $f$-graph CRO's, it is not possible to do any better.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing --- File Organization; information
                 science",
}

@Article{Mendelzon:1979:AMD,
  author =       "Alberto O. Mendelzon",
  title =        "On Axiomatizing Multivalued Dependencies in Relational
                 Databases",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "37--44",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A complete set of inference rules for deriving
                 multivalued dependencies in a relational database has
                 recently been presented. The questions of independence
                 and redundancy of these rules are investigated and all
                 minimal complete subsets of the proposed set are
                 determined.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems",
}

@Article{Reiss:1979:SDC,
  author =       "Steven P. Reiss",
  title =        "Security in Databases; a Combinatorial Study",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "45--57",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Security is considered in the context of an abstract
                 model of a database where queries involving the mean or
                 median of a privileged field are allowed. For this
                 model, the method of limiting the number and types of
                 queries that can be asked of such a database is
                 considered as a means for providing statistical access
                 while insuring that no individual data are compromised.
                 The resultant questions are primarily combinatorial in
                 nature and are interesting in themselves.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems; data processing --- Security of
                 Data",
}

@Article{Galil:1979:FSA,
  author =       "Zvi Galil and Nimrod Megiddo",
  title =        "A Fast Selection Algorithm and the Problem of Optimum
                 Distribution of Effort",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "58--64",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 23:02:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lemme:1979:SPA,
  author =       "James M. Lemme and John R. Rice",
  title =        "Speedup in Parallel Algorithms for Adaptive
                 Quadrature",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "65--71",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A fast metalgorithm is described for adaptive
                 quadrature on a MIMD (Multiple Instruction, Multiple
                 Data) parallel computer and show that its speedup is at
                 least constant times $M / \log M$ using a total of $M$
                 processors.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer processing",
}

@Article{Rodrigue:1979:OER,
  author =       "Garry H. Rodrigue and Niel K. Madsen and Jack I.
                 Karush",
  title =        "Odd-Even Reductions for Banded Linear Equations",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "72--81",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 23:03:29 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fishman:1979:EMC,
  author =       "George S. Fishman and Louis R. Moore",
  title =        "Estimating the Mean of a Correlated Binary Sequence
                 with an Application to Discrete Event Simulation",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "82--94",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A procedure is discussed for interval estimation of
                 the mean $\Theta$ of a correlated binary $(0, 1)$
                 sequence. The proposed method can be applied to
                 simulation data that are not intrinsically binary in
                 nature. The procedure is applied to interval estimation
                 of the waiting time distribution in a simulation of the
                 M/M/1 queue with activity level 0.9 for $\Theta = 0.1$
                 and $0.5$. The proposed method works well. For $\Theta
                 = 0.9$ results show some degradation. An error analysis
                 leads to a set of recommendations for keeping
                 performance in practice close to the desired
                 theoretical levels. Algorithms are described for
                 computing the critical quantities upon which the
                 proposed method relies.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  descriptors =  "Simulation; time series analysis; correlation; M/M/1",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer simulation",
}

@Article{Papadimitriou:1979:OFF,
  author =       "Christos H. Papadimitriou",
  title =        "Optimality of the Fast {Fourier} Transform",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "95--102",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 23:05:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Savitch:1979:TBR,
  author =       "Walter J. Savitch and Michael J. Stimson",
  title =        "Time Bounded Random Access Machines with Parallel
                 Processing",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "103--118",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:59:12 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The RAM model of S. A. Cook and R. A. Reckhow is
                 extended to allow parallel recursive calls and the
                 elementary theory of such machines is developed. The
                 uniform cost criterion is used. The results include
                 proofs of (1) the equivalence of nondeterministic and
                 deterministic polynomial time for such parallel
                 machines and (2) the equivalence of polynomial time on
                 such parallel machines and polynomial space on ordinary
                 nonparallel RAM's. Also included are results showing
                 that parallelism appears to be strictly more powerful
                 than nondeterminism.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming; computer systems,
                 digital",
}

@Article{Cherniavsky:1979:CCH,
  author =       "John C. Cherniavsky and Samuel N. Kamin",
  title =        "A Complete and Consistent {Hoare} Axiomatics for a
                 Simple Programming Language",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "119--128",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A simple programming language $L_m$ is defined for
                 which a complete axiomatics is obtainable. Completeness
                 is shown by presenting a relatively complete Hoare
                 axiomatics, demonstrating, by direct construction, that
                 the first-order theory of addition $P_+$ is expressive,
                 and noting that $P_+$ is complete. It is then shown
                 that $L_m$ is maximal with this property. Further, a
                 notion of complexity of a Hoare system is introduced
                 based upon the lengths of proofs (disregarding proofs
                 in the underlying logic), and the system $L_m$, $P_+$
                 is shown to have polynomial complexity. The notion is
                 shown to be nontrivial by presenting a language for
                 which any Hoare axiom system has exponential
                 complexity.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  conference =   "ACM Symp on Princ of Program Lang, 5th, Pap",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages",
  meetingaddress = "Tucson, AZ, USA",
  meetingdate =  "Jan 23--25 1978",
  meetingdate2 = "01/23--25/78",
}

@Article{Clarke:1979:PLC,
  author =       "Edmund Melson {Clarke, Jr.}",
  title =        "Programming Language Constructs for Which It Is
                 Impossible To Obtain Good {Hoare} Axiom Systems",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "129--147",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/prog.lang.theory.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Hoare axiom systems for establishing partial
                 correctness of programs may fail to be complete because
                 of (a) incompleteness of the assertion language
                 relative to the underlying interpretation or (b)
                 inability of the assertion language to express the
                 invariants of loops. S. A. Cook has shown that if there
                 is a complete proof system for the assertion language
                 (i.e. all true formulas of the assertion language) and
                 if the assertion language satisfies a natural
                 expressibility condition then a sound and complete
                 axiom system for a large subset of Algol may be
                 devised. Programming language constructs are exhibited
                 for which it is impossible to obtain sound and complete
                 sets of Hoare axioms even in this special sense of
                 Cook's. These constructs include (i) recursive
                 procedures with procedure parameters in a programming
                 language which uses static scope of identifiers and
                 (ii) coroutines in a language which allows
                 parameterless recursive procedures. Modifications of
                 these constructs for which sound and complete systems
                 of axioms may be obtained are also discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  conference =   "ACM Symp on Princ of Program Lang, 5th, Pap",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages",
  meetingaddress = "Tucson, AZ, USA",
  meetingdate =  "Jan 23--25 1978",
  meetingdate2 = "01/23--25/78",
}

@Article{Berry:1979:MOC,
  author =       "G\'erard Berry and Jean-Jacques L\'evy",
  title =        "Minimal and Optimal Computations of Recursive
                 Programs",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "1",
  pages =        "148--175",
  month =        jan,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "J. Vuillemin's results on optimal computations of
                 recursive programs are generalized. New syntactic
                 results are obtained by considering spaces of
                 derivations instead of terms. The results apply to
                 classes of interpretations more general than the
                 sequential interpretations of Vuillemin.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  conference =   "ACM Symp on Princ of Program Lang, 5th, Pap",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
  meetingaddress = "Tucson, AZ, USA",
  meetingdate =  "Jan 23--25 1978",
  meetingdate2 = "01/23--25/78",
}

@Article{Hwang:1979:ARM,
  author =       "F. K. Hwang",
  title =        "An {$O(n \log n)$} Algorithm for Rectilinear Minimal
                 Spanning Tree",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "177--182",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/79.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $P$ be a set of points in the plane with
                 rectilinear distance. An $O(n \log n)$ algorithm for
                 the construction of a Voronoi diagram for $P$ is given.
                 By using previously known results, a minimal spanning
                 tree for $P$ can be derived from a Voronoi diagram for
                 $P$ in linear time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; mathematical techniques ---
                 Trees",
}

@Article{Lueker:1979:LTA,
  author =       "George S. Lueker and Kellogg S. Booth",
  title =        "A Linear Time Algorithm for Deciding Interval Graph
                 Isomorphism",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "183--195",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A graph is an interval graph if and only if each of
                 its vertices can be associated with an internal on the
                 real line in such a way that two vertices are adjacent
                 in the graph exactly when the corresponding intervals
                 have a nonempty intersection. An efficient algorithm
                 for testing isomorphism of interval graphs is
                 implemented using a data structure called a PQ-tree.
                 The algorithm runs in $O(n + e)$ steps for graphs
                 having $n$ vertices and $e$ edges. It is shown that for
                 a somewhat larger class of graphs, namely the chordal
                 graphs, isomorphism is as hard as for general graphs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; mathematical techniques --- Graph
                 Theory",
}

@Article{Bolour:1979:OPM,
  author =       "Azad Bolour",
  title =        "Optimality Properties of Multiple-Key Hashing
                 Functions",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "196--210",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/79.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An analysis of the achievable efficiency of retrieval
                 algorithms based on hashing for answering partial-match
                 queries is presented. The remarkable power of hashing
                 in limiting the search of a given key value in a file
                 is well known. Similarly, it is possible to avoid
                 searching major portions of a file in answering
                 partial-match or multiattribute queries by hashing a
                 multiattribute file into a number of buckets.
                 Multiple-key hashing is a simple procedure for doing so
                 and works by combining the effects of a number of
                 hashing functions, one for each attribute in a record.
                 By using a measure of retrieval efficiency in which
                 queries specifying the same set of attributes are given
                 equal weight, it is shown that multiple-key hashing
                 often provides about the most efficient means of
                 partitioning a file for the purpose of answering
                 partial-match queries.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Brown:1979:FMA,
  author =       "Mark R. Brown and Robert E. Tarjan",
  title =        "A Fast Merging Algorithm",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "211--226",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm that merges sorted lists represented as
                 height-balanced binary trees is given. If the lists
                 have lengths $m$ and $n$ ($m \leq n$) then the merging
                 procedure runs in $O(m \log(n/m))$ steps, which is the
                 same order as the lower bound on all comparison-based
                 algorithms for this problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Fussenegger:1979:CAL,
  author =       "Frank Fussenegger and Harold N. Gabow",
  title =        "A Counting Approach to Lower Bounds for Selection
                 Problems",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "227--238",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Lower bounds are derived on the number of comparisons
                 to solve several well-known selection problems. Among
                 the problems are finding the $t$ largest elements of a
                 given set in order $(W_t)$; finding the $s$ smallest
                 and $t$ largest elements in order $(W_{s,t})$; and
                 finding the $t$-th largest element $(V_t)$. The results
                 follow from bounds for more general selection problems,
                 where an arbitrary partial order is given. The bounds
                 for $W_t$ and $V_t$ generalize to the case where
                 comparisons between linear functions of the input are
                 allowed. The approach is to show that a comparison tree
                 for a selection problem contains a number of trees for
                 smaller problems, thus establishing a lower bound on
                 the number of leaves. An equivalent approach uses an
                 adversary, based on a numerical ``chaos'' function that
                 measures the number of unknown relations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; mathematical techniques ---
                 Trees",
}

@Article{Kacewicz:1979:IKS,
  author =       "Boleslaw Kacewicz",
  title =        "Integrals with a Kernel in the Solution of Nonlinear
                 Equations in ${N}$ Dimensions",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "239--249",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 23:13:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Traub:1979:CCN,
  author =       "J. F. Traub and H. Wo{\'z}niakowski",
  title =        "Convergence and Complexity of {Newton} Iteration for
                 Operator Equations",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "250--258",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An optimal convergence condition for Newton iteration
                 in a Banach space is established. It is shown that
                 there exist problems for which the iteration converges
                 but the complexity is unbounded. Thus for actual
                 computation convergence is not enough. What stronger
                 condition must be imposed to also assure ``good
                 complexity'' is shown.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Gelenbe:1979:OCI,
  author =       "Erol Gelenbe",
  title =        "On the Optimum Checkpoint Interval",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "259--270",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "One of the basic problems related to the efficient and
                 secure operation of a transaction oriented file or
                 database system is the choice of the checkpoint
                 interval. It is shown that the optimum checkpoint
                 interval (i.e. the time interval between successive
                 checkpoints which maximizes system availability) is a
                 function of the load of the system. It is proved that
                 the total operating time of the system (and not the
                 total real time) between successive checkpoints should
                 be a deterministic quantity in order to maximize the
                 availability. An explicit expression for this time
                 interval is obtained. The results are a significant
                 departure from previous work where load independent
                 results have been obtained. A rigorous analysis of the
                 queueing process related to the requests for
                 transaction processing arriving at the system is also
                 presented, and the ergodicity conditions for the system
                 are proved.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database systems",
}

@Article{Iglehart:1979:RSI,
  author =       "Donald L. Iglehart and Peter A. W. Lewis",
  title =        "Regenerative Simulation with Internal Controls",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "271--282",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/322123.322132",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "A new variance reduction technique called internal
                 control variables is introduced. This technique is to
                 be used in regenerative simulations. The idea is to
                 identify a sequence of control random variables, each
                 one defined within a regenerative cycle, whose mean can
                 be calculated analytically. These controls should be
                 highly correlated with the usual quantities observed in
                 a regenerative simulation. This correlation reduces the
                 variance of the estimate for the parameter of interest.
                 Numerical examples are included for the waiting time
                 process of an M/M/1 queue and for several Markov
                 chains.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  descriptors =  "Simulation; control variable; independent cycles;
                 M/M/1; Markov process",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer simulation; probability --- Queueing Theory",
}

@Article{Kowaltowski:1979:DSC,
  author =       "Tomasz Kowaltowski",
  title =        "Data Structures and Correctness of Programs",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "283--301",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A technique for proving correctness of programs
                 manipulating data structures is proposed. Its three
                 major components are: (i) an abstract representation of
                 the data structures called free state description
                 (FSD), (ii) a set of propositions which allow
                 transformations of such FSD's, and (iii) semantics of
                 assignment statements in terms of FSD transformations.
                 The technique provides a framework for rigorous proofs
                 about programs manipulating data structures with
                 arbitrary sharing of pointers and circularities.
                 Examples of applications include the
                 Deutsch--Schorr--Waite marking algorithm. A graphical
                 interpretation of proofs is sketched to illustrate the
                 intuitive concepts hidden behind this technique. The
                 method extends the one devised by R. M. Burstall by
                 allowing arbitrary data structures.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; data processing --- Data
                 Structures",
}

@Article{Milne:1979:CPT,
  author =       "George Milne and Robin Milner",
  title =        "Concurrent Processes and Their Syntax",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "302--321",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/CLiCS.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A mathematical model of concurrent computation is
                 presented. Starting from synchronized communication as
                 the only primitive notion, a process is defined as a
                 set of communication capabilities. The domain of
                 processes is built using the weak powerdomain
                 construction of M. Smyth. A minimal set of operations
                 for composing processes is defined. These operations
                 suggest a corresponding minimal syntax --- the language
                 of flowgraphs --- in which to specify these
                 compositions. The concept of flow algebra is defined;
                 processes and flowgraphs are examples of flow algebras.
                 It is shown that processes are a flow algebra, and
                 therefore constitute a suitable semantics for
                 flowgraphs. However, it is emphasized that the notion
                 of flowgraph evolved from the notion of process and not
                 the reverse.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; pcalc semantics domains",
}

@Article{Rosen:1979:DFA,
  author =       "Barry K. Rosen",
  title =        "Data Flow Analysis for Procedural Languages",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "322--344",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Global analysis and optimization techniques presuppose
                 local data flow information about the effects of
                 program statements on the values associated with names.
                 For procedure calls this information is not immediately
                 available but can presumably be obtained through flow
                 analysis of procedure bodies. Accurate information
                 proves to be surprisingly difficult to obtain. A
                 language independent formulation of the problem, an
                 interprocedural data flow algorithm, and a proof that
                 the algorithm is correct are presented. Symbolic data
                 flow analysis is introduced in the course of optimizing
                 the algorithm: We move much of the work outside of a
                 loop by manipulating partially evaluated symbolic
                 expressions for the data within the loop. Foundational
                 difficulties are revealed when the theory of data flow
                 analysis is extended to support extensive optimization
                 of procedural language programs: Several widespread
                 assumptions become false or ambiguous. A few of the
                 problems are resolved here. Inductive arguments are
                 facilitated by a simple path tree representation of
                 control flow that allows for both recursion and side
                 effects.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages",
}

@Article{Culik:1979:PHC,
  author =       "K. {Culik, II}",
  title =        "A Purely Homomorphic Characterization of Recursively
                 Enumerable Sets",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "345--350",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Characterizations of recursively enumerable sets as
                 mappings of equality and minimal sets are given. An
                 equality (minimal) set is the set of all (minimal)
                 solutions of an instance of the Post correspondence
                 problem where the solutions are viewed as strings. The
                 main result is that every recursively enumerable set
                 can be expressed (effectively) as a homomorphic image
                 of a minimal set. From the algebraic point of view this
                 seems to be the simplest characterization of
                 recursively enumerable languages. A corollary of the
                 main result is the solution of an open problem
                 formulated by A. Salomaa. A purely homomorphic
                 characterization of regular sets is derived. How such a
                 characterization can be obtained for various time and
                 space complexity classes for languages is outlined.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; computer programming languages",
}

@Article{Shostak:1979:PDP,
  author =       "Robert E. Shostak",
  title =        "A Practical Decision Procedure for Arithmetic with
                 Function Symbols",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "351--360",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/Constr.logic.prog.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A practical procedure is presented for an extension of
                 quantifier-free Presburger arithmetic that permits
                 arbitrary uninterpreted predicate and function symbols.
                 This theory includes many of the formulas one tends to
                 encounter in program verification and is powerful
                 enough to encode the semantics of array operators as
                 well as MAX, MIN, and ABSVALUE. An implementation of
                 the procedure has proved to be of great value in a
                 program verification system developed at SRI for the
                 United States Air Force.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; program verification",
}

@Article{Pippenger:1979:RAC,
  author =       "Nicholas Pippenger and Michael J. Fischer",
  title =        "Relations Among Complexity Measures",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "361--381",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/322123.322138",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Various computational models (such as machines and
                 combinational logic networks) induce various and, in
                 general, different computational complexity measures.
                 Relations among these measures are established by
                 studying the ways in which one model can ``simulate''
                 another. It is shown that a machine with
                 $k$-dimensional storage tapes (respectively, with
                 tree-structured storage media) can be simulated on-line
                 by a machine with one-dimensional storage tapes in time
                 $O(n^{2 - 1 / k})$ respectively, in time $O(n^2 / \log
                 n)$. An oblivious machine is defined to be one whose
                 head positions, as functions of time, are independent
                 of the input, and it is shown that any machine with
                 one-dimensional tapes can be simulated on-line by an
                 oblivious machine with two one-dimensional tapes in
                 time $O(n \log n)$. All of these results are the best
                 possible, at least insofar as on-line simulation is
                 concerned. By similar methods it is shown that $n$
                 steps of the computation of an arbitrary machine with
                 one-dimensional tapes can be performed by a
                 combinational logic network of cost $O(n \log n)$ and
                 delay $O(n)$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Anonymous:1979:CPF,
  author =       "Anonymous",
  title =        "Corrigendum: ``{Papers} from the {Fourth ACM Symposium
                 on Principles of Programming Languages}''",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "2",
  pages =        "382--382",
  month =        apr,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:27:02 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Henschen:1979:TPC,
  author =       "L. J. Henschen",
  title =        "Theorem Proving by Covering Expressions",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "385--400",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 23:22:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cohen:1979:TAD,
  author =       "Jacques Cohen and Timothy Hickey",
  title =        "Two Algorithms for Determining Volumes of Convex
                 Polyhedra",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "401--414",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/79.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Determining volumes of convex $n$-dimensional
                 polyhedra defined by a linear system of inequalities is
                 useful in program analysis. Two methods for computing
                 these volumes are proposed: (1) summing the volumes of
                 simplices which form the polyhedron, and (2) summing
                 the volumes of (increasingly smaller) parallelepipeds
                 which can be fit into the polyhedron. Assuming that
                 roundoff errors are small, the first method is
                 analytically exact whereas the second one converges to
                 the exact solution at the expense of additional
                 computer time. Examples of polyhedra whose volumes were
                 computed by programs representing the algorithms are
                 also provided.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Lee:1979:OAF,
  author =       "D. T. Lee and F. P. Preparata",
  title =        "An Optimal Algorithm for Finding the Kernel of a
                 Polygon",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "415--421",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/79.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The kernel $K(P)$ of a simple polygon $P$ with $n$
                 vertices is the locus of the points internal to $P$
                 from which all vertices of $P$ are visible.
                 Equivalently, $K(P)$ is the intersection of appropriate
                 half-planes determined by the polygon's edges. Although
                 it is known that to find the intersection of $n$
                 generic half-planes requires time $O(n \log n)$, it is
                 shown that one can exploit the ordering of the
                 half-planes corresponding to the sequence of the
                 polygon's edges to obtain a kernel finding algorithm
                 which runs in time $O(n)$ and is therefore optimal.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Tai:1979:TTC,
  author =       "Kuo-Chung Tai",
  title =        "The Tree-to-Tree Correction Problem",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "422--433",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The tree-to-tree correction problem is to determine,
                 for two labeled ordered trees $T$ and $T'$, the
                 distance from $T$ to $T'$ as measured by the minimum
                 cost sequence of edit operations needed to transform T
                 into $T'$. The edit operations investigated allow
                 changing one node of a tree into another node, deleting
                 one node from a tree, or inserting a node into a tree.
                 An algorithm which solves this problem is presented.
                 Possible applications are to the problems of measuring
                 the similarity between trees, automatic error recovery
                 and correction for programming languages, and
                 determining the largest common substructure of two
                 trees.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages; data processing",
}

@Article{Manacher:1979:SIH,
  author =       "Glenn K. Manacher",
  title =        "Significant Improvements to the {Hwang-Lin} Merging
                 Algorithm",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "434--440",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The Hwang-Lin merging algorithm is the best
                 general-purpose merging algorithm that has been found.
                 Many improvements to it have been devised, but these
                 are either for special values of $m$ and $n$, the
                 number of items being merged, or else improvements by a
                 term less than linear in $n + m$ when the ratio $n / m$
                 is fixed. A new methodology is developed in which, for
                 fixed ratio $n / m$, it is possible to decrease the
                 number of comparisons by a factor proportional to $m$,
                 in fact $m / 12$, provided $n / m \geq 8$ and $m \geq
                 24$. It is shown that the coefficient $1/12$ is not
                 best possible, and a technique for improving it
                 slightly to $31 / 336$ is sketched.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; computer systems programming ---
                 Merging",
}

@Article{Manacher:1979:FJS,
  author =       "Glenn K. Manacher",
  title =        "The {Ford-Johnson} Sorting Algorithm Is Not Optimal",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "441--456",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "One way of expressing the efficiency of a sorting
                 algorithm is in terms of the number of pairwise
                 comparisons required in the worst case to sort t items.
                 The most efficient algorithm known is that of L. R.
                 Ford and S. B. Johnson [FJA], which achieves the
                 ``information-theoretic'' lower bound $[\log t]$ for $1
                 \leq t \leq 11$ and $21 \leq t \leq 22$. No value of
                 $t$ has been discovered for which $S(t)$ less than
                 $F(t)$, where $S(t)$ is the smallest number of
                 comparisons required and $F(t)$ is the number of
                 comparisons required by the FJA. It has been uncertain
                 since the FJA first appeared in 1959 whether it is
                 optimal in the sense that $F(t)$ equals $S(t)$ for all
                 $t$. It is shown that this is not the case, and it is
                 shown constructively how to compute infinitely many
                 $t$, $t \geq 189$, for which $F(t) - S(t) = kt - O(\log
                 t)$ for positive $k$. No algorithm is known that will
                 sort $t$ items with fewer comparisons than the FJA for
                 any $t$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; computer systems programming ---
                 Sorting",
}

@Article{Strong:1979:SWP,
  author =       "H. R. Strong and G. Markowsky and A. K. Chandra",
  title =        "Search Within a Page",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "457--482",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Three families of strategies for organizing an index
                 of ordered keys are investigated. It is assumed either
                 that the index is small enough to fit in main memory or
                 that some superstrategy organizes the index into pages
                 and that search within a page is being studied.
                 Examples of strategies within the three families are
                 B-tree Search, Binary Search, and Square Root Search.
                 The expected access times of these and other strategies
                 are compared, and their relative merits in different
                 indexing situations are discussed and conjectured on.
                 Considering time and space costs and complexity of
                 programming, it is concluded that a Binary Search
                 strategy is generally preferable.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing --- Data Structures; information
                 retrieval systems",
}

@Article{Bui:1979:SSS,
  author =       "T. D. Bui",
  title =        "Some ${A}$-Stable and ${L}$-Stable Methods for the
                 Numerical Integration of Stiff Ordinary Differential
                 Equations",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "483--493",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Some $A$-stable and $L$-stable Rosenbrock type
                 (semi-implicit Runge--Kutta) methods accurate to the
                 fourth local order with only one computation of a
                 Jacobian matrix per step of integration are constructed
                 for the solution of the Cauchy problem for systems of
                 stiff ordinary differential equations. Numerical
                 experiments show high efficiency of the proposed
                 methods for excessively stiff systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Skeel:1979:SNS,
  author =       "Robert D. Skeel",
  title =        "Scaling for Numerical Stability in {Gaussian}
                 Elimination",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "494--526",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Roundoff error in the solution of linear algebraic
                 systems is studied using a more realistic notion of
                 what it means to perturb a problem, namely, that each
                 datum is subject to a relatively small change. This is
                 particularly appropriate for sparse linear systems. The
                 condition number is determined for this approach. The
                 effect of scaling on the stability of Gaussian
                 elimination is studied, and it is discovered that the
                 proper way to scale a system depends on the right-hand
                 side. However, if only the norm of the error is of
                 concern, then there is a good way to scale that does
                 not depend on the right-hand side.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "lud; mathematical techniques; nla; rounding error;
                 scaling",
}

@Article{Werschulz:1979:MOO,
  author =       "Arthur G. Werschulz",
  title =        "Maximal Order and Order of Information for Numerical
                 Quadrature",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "527--537",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 23:26:43 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Frederickson:1979:AAS,
  author =       "Greg N. Frederickson",
  title =        "Approximation Algorithms for Some Postman Problems",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "538--554",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Approximation algorithms for several NP-complete
                 edge-covering routing problems are presented and
                 analyzed in terms of the worst-case ratio of the cost
                 of the obtained solution to the cost of the optimum
                 solution. A worst-case bound of 2 is proved for the
                 mixed postman algorithm of Edmonds and Johnson, and a
                 related algorithm for the mixed postman problem is
                 shown also to have a worst-case bound of 2. A mixed
                 strategy approach is used to obtain a bound of 5/3 for
                 the mixed postman problem. A second mixed strategy
                 algorithm, for the mixed postman on a planar graph, is
                 shown to have a worst-case bound of 3/2.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Baker:1979:CMB,
  author =       "Brenda S. Baker and S. Rao Kosaraju",
  title =        "A Comparison of Multilevel break and next Statements",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "555--566",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A study is made of the descriptive power of if then
                 else statements and repeat (do forever) statements,
                 multilevel break statements (which cause a jump out of
                 an enclosing repeat), and multilevel next statements
                 (which cause a jump to an iteration of an enclosing
                 repeat). Ledgard and Marcotty conjectured that
                 multilevel next statements could be removed without
                 increasing the number of levels of break statements to
                 obtain another program with operations executed in the
                 same order. The conjecture is shown to be true for one
                 level of next statement but false for next statements
                 with level greater than 1. It is also shown that next
                 statements are weaker than break statements in the
                 sense that $n$ levels of next statements can be
                 transformed into 2n levels of break statement, while
                 there is no function $f$ such that $n$ levels of break
                 can be replaced by f(n) levels of next.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages",
}

@Article{Gurari:1979:NCN,
  author =       "Eitan M. Gurari and Oscar H. Ibarra",
  title =        "An {NP}-Complete Number-Theoretic Problem",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "567--581",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Math/hilbert10.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  mr =           "80e:68107",
}

@Article{Kedem:1979:CDR,
  author =       "Zvi M. Kedem",
  title =        "Combining Dimensionality and Rate of Growth Arguments
                 for Establishing Lower Bounds on the Number of
                 Multiplications and Divisions",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "3",
  pages =        "582--601",
  month =        jul,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new method for establishing lower bounds on the
                 number of multiplications and divisions required to
                 compute rational functions is described. The method is
                 based on combining two known methods, dimensionality
                 and rate of growth. The method is applied to several
                 problems and new lower bounds are obtained.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Beyer:1979:LAI,
  author =       "T. Beyer and W. Jones and S. Mitchell",
  title =        "Linear Algorithms for Isomorphism of Maximal
                 Outerplanar Graphs",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "603--610",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Two linear algorithms are presented for solving the
                 isomorphism problem for maximal outerplanar graphs
                 (mops). These algorithms present improvements over
                 corresponding linear algorithms for planar graph
                 isomorphism when applied to mops. The algorithms are
                 based on a code for a mop $G$ which is obtained from a
                 unique Hamiltonian cycle in $G$. The first involves a
                 string-matching automation and the second involves the
                 removal of vertices of degree two in layers until
                 either an edge or triangular face remains.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Graph Theory",
}

@Article{Gross:1979:LTP,
  author =       "Jonathan L. Gross and Ronald H. Rosen",
  title =        "A Linear Time Planarity Algorithm for $2$-Complexes",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "611--617",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 01 16:58:00 2002",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/79.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A linear time algorithm to decide whether a given
                 finite 2-complex is planar is described. Topological
                 results of Gross, Harary, and Rosen are the
                 mathematical basis for the algorithm. Optimal running
                 time is achieved by constructing various lists
                 simultaneously and keeping their orderings compatible.
                 If the complex is simplicial with$\rho$vertices, then
                 the algorithm has $O(\rho)$ time and space bounds. The
                 algorithm uses depth-first search both in application
                 of the graph planarity algorithm of J. Hopcroft and R.
                 Tarjan and elsewhere.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Graph Theory",
}

@Article{Yannakakis:1979:ECR,
  author =       "Mihalis Yannakakis",
  title =        "The Effect of a Connectivity Requirement on the
                 Complexity of Maximum Subgraph Problems",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "618--630",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "If pi is a property on graphs (or digraphs), the
                 corresponding maximum subgraph problem is: Given a
                 graph $G$ find a maximum (induced) subgraph of G
                 satisfying property pi. This problem was previously
                 shown to be NP-hard for a large class of properties
                 (the class of properties that are hereditary on induced
                 subgraphs). The effect of adding a connectivity
                 requirement to pi is now considered. It is shown that
                 for the same class of properties the connected maximum
                 subgraph problem is also NP-hard; moreover, for a
                 certain important subclass of properties, even
                 approximating the node-deletion version of it in any
                 ``reasonable'' ways is NP-hard.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Papadimitriou:1979:SCD,
  author =       "Christos H. Papadimitriou",
  title =        "The Serializability of Concurrent Database Updates",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "631--653",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/real.time.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A sequence of interleaved user transactions in a
                 database system may not be serializable, i.e.,
                 equivalent to some sequential execution of the
                 individual transactions. Using a simple transaction
                 model, it is shown that recognizing the transaction
                 histories that are serializable is an NP-complete
                 problem. Several efficiently recognizable subclasses of
                 the class of serializable histories are therefore
                 introduced; most of these subclasses correspond to
                 serializability principles existing in the literature
                 and used in practice. Two new principles that subsume
                 all previously known ones are also proposed. Necessary
                 and sufficient conditions are given for a class of
                 histories to be the output of an efficient history
                 scheduler; these conditions imply that there can be no
                 efficient scheduler that outputs all of serializable
                 histories, and also that all subclasses of serializable
                 histories studied above have an efficient scheduler.
                 Finally, it is shown how these results can be extended
                 to far more general transaction models, to transactions
                 with partly interpreted functions, and to distributed
                 database systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A sequence of interleaved user transactions in a
                 database system may not be serializable. Eswaran
                 provided a simple criterion. here several recognizable
                 subclasses are introduced; most of these correspond to
                 serializability principles in the literature and used
                 in practice. Two principles that subsume all known ones
                 are proposed. These permit more schedules, but their
                 determination is NP-hard. The results can be extended
                 to more general transaction models, transactions with
                 partly interpreted functions, and to distributed
                 database systems.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems; database systems concurrency",
}

@Article{Mendelson:1979:PMO,
  author =       "Haim Mendelson and Uri Yechiali",
  title =        "Performance Measures for Ordered Lists in
                 Random-Access Files",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "654--667",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A random-access file with $N$ storage locations is
                 considered. Records are added to the file from time to
                 time. A record with key omega is hashed to storage
                 locations $F(\omega)$. A collision is resolved by the
                 following chaining method: All records hashed to the
                 same location are chained to each other to form an
                 ordered list, ordered in ascending order of the keys.
                 The first record of a list is stored either at location
                 $F(\omega)$ or at an alternative start if location
                 $F(\omega)$ is occupied. For this process the
                 multidimensional time-dependent generating function is
                 derived, and the expected values of various state
                 variables are calculated. These values are used to
                 obtain formulas for the expected number of I/O
                 operations needed for retrieval, addition, or updating
                 of a record. Two measures of retrieval performance are
                 calculated and addition of a record is considered.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing",
}

@Article{Rosenberg:1979:EDS,
  author =       "Arnold L. Rosenberg",
  title =        "Encoding Data Structures in Trees",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "668--689",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Encodings of data structures in trees are studied with
                 an eye toward developing techniques for analyzing such
                 encodings. Two guest structures are studied here,
                 namely, lines and arrays. Upper and lower bounds on the
                 costs of encodings of these structures in trees are
                 derived; in several cases these bounds are
                 asymptotically coincident, or at least very close. The
                 main results concerning line-guests exhibit certain
                 (best possible) sufficient conditions for the costs of
                 encodings of lines in trees to be independent of the
                 lengths of the lines. The main results concerning
                 array-guests are exemplified by the following: The
                 costs of encodings of $d$-dimensional arrays in
                 $2^d$-ary trees are shown to have coincident upper and
                 lower bounds of $4 + o(1)$; and the costs of encodings
                 of such arrays in binary trees are shown to have upper
                 and lower bounds of $3d + 1 + o(1)$ and $2.885 d + 1 +
                 0.116 / d + o(1)$, respectively; for the case $d$
                 equals $2$, the derived bounds are even closer than
                 this general result would suggest that the upper and
                 lower bounds for encodings of 2-dimensional arrays in
                 binary trees are $7 + O(1)$ and $6.98 + O(1)$,
                 respectively.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing; mathematical techniques --- Trees",
}

@Article{Tarjan:1979:APC,
  author =       "Robert Endre Tarjan",
  title =        "Applications of Path Compression on Balanced Trees",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "690--715",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Several fast algorithms are presented for computing
                 functions defined on paths in trees under various
                 assumptions. The algorithms are based on tree
                 manipulation methods first used to efficiently
                 represent equivalence relations. The algorithms have
                 $O((m + n) \alpha (m + n,n))$ running times, where $m$
                 and $n$ are measures of the problem size and $\alpha$
                 is a functional inverse of Ackermann's function. By
                 using one or more of these algorithms in combination
                 with other techniques, it is possible to solve several
                 graph problems in $O(m \alpha (m,n))$ time, where $m$
                 is the number of edges and $n$ is the number of
                 vertices in the problem graph.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; data processing;
                 mathematical techniques --- Trees",
}

@Article{Bustoz:1979:ITD,
  author =       "Joaqu{\'\i}n Bustoz and Alan Feldstein and Richard
                 Goodman and Seppo Linnainmaa",
  title =        "Improved Trailing Digits Estimates Applied to Optimal
                 Computer Arithmetic",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "716--730",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "New results are given on the distribution of trailing
                 digits for logarithmically distributed numbers and on
                 error in floating-point multiplication. Some of the
                 results have application to computer design. In
                 particular, there are certain values of the base
                 (indeed, $\beta=2,4,6$, and sometimes, $8$, but {\em
                 not\/} $16$) which, when carefully balanced with other
                 design parameters, minimize the mean multiplicative
                 error. For these special minimizing situations, it
                 suffices to have only one guard $\beta$it provided that
                 postnormalization occurs after symmetric rounding.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer arithmetic; computer programming;
                 floating-point multiplication; floating-point numbers;
                 floating-point precision and significance; fraction
                 error; guard digits; logarithmically distributed
                 numbers; mean and standard deviation of error;
                 nonleading digits; normalization options; roundoff
                 error; trailing digits; uniformly distributed numbers",
}

@Article{Butcher:1979:TIR,
  author =       "J. C. Butcher",
  title =        "A Transformed Implicit {Runge--Kutta} Method",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "731--738",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Certain implicit Runge--Kutta methods are capable of
                 being transformed into a form which makes the modified
                 Newton iterates in their implementation capable of
                 efficient computation. For the class of such methods
                 considered, the transformations are given explicitly,
                 and it is shown how error estimates, as well as initial
                 iterates for a succeeding step, can be expressed in
                 terms of the transformed variables.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques",
}

@Article{Johnson:1979:RAF,
  author =       "Donald B. Johnson and Webb Miller and Brian Minnihan
                 and Celia Wrathall",
  title =        "Reducibility Among Floating-Point Graphs",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "739--760",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The graph-theoretic models of this paper can be used
                 to compare the rounding-error behavior of numerical
                 programs. The models follow the approach, popularized
                 by Wilkinson, of assuming independent rounding errors
                 in each arithmetic operation. Models constructed on
                 this assumption are more tractable than would be the
                 case under more realistic assumptions. There are
                 identified two easily tested conditions on programs
                 which guarantee that error analyses are relatively
                 insensitive to the particular graph model employed. The
                 development has the additional benefit of sometimes
                 providing an elementary proof that one program is
                 comparable in stability to another. Examples of such
                 results are given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Numerical Methods",
}

@Article{Bhat:1979:ECE,
  author =       "U. Narayan Bhat and Richard E. Nance",
  title =        "An Evaluation of {CPU} Efficiency Under Dynamic
                 Quantum Allocation",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "761--778",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A model for a time-sharing operating system is
                 developed in order to assess the effects of dynamic
                 quantum allocation and overhead variability on central
                 processing unit (CPU) efficiency. CPU efficiency is
                 determined by the proportion of time devoted to
                 user-oriented (problem state) tasks within a busy
                 period. Computational results indicate that a dynamic
                 quantum allocation strategy produces significant
                 differences in CPU efficiency compared to a constant
                 quantum. The differences are affected significantly by
                 the variability among allocated quantum values and the
                 demand on the system. Overhead variability also has a
                 pronounced effect. A function that depicts overhead as
                 decreasing with demand produces more stable values of
                 CPU efficiency. The interaction between demand and the
                 amount of overhead is observed to be significant.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  descriptors =  "Model; time sharing; performance evaluation; CPU;
                 feedback; overhead time; semi Markov process; operating
                 system",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems",
}

@Article{Noetzel:1979:GQD,
  author =       "Andrew S. Noetzel",
  title =        "A generalized queueing discipline for product form
                 network solutions",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "779--793",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Certain queueing disciplines, such as processor
                 sharing, the preemptive last-come-first-served
                 discipline, and the infinite server queue, are known to
                 result in network equilibrium state probabilities that
                 have a convenient product form. A generalization of the
                 above disciplines is introduced. The general class is
                 presented in the form of a parameterized discipline,
                 called the last-batch-processor-sharing (LBPS)
                 discipline. The equilibrium state probabilities for
                 disciplines of the LBPS class are shown, and, by use of
                 the concept of local balance, it is shown that
                 arbitrary networks of LBPS queues have product form
                 equilibrium state probabilities. It is also shown that
                 within the class of symmetric disciplines, the LBPS is
                 necessary if the product form solution is to be
                 obtained for general service time distributions. A
                 discipline is symmetric if the processor assignments to
                 the customers in the queue depend on total queue
                 occupancy and queue position (relative arrival time)
                 only. Generalizations of the LBPS rule beyond the
                 symmetric disciplines are discussed. A multiple
                 customer-class form of the LBPS discipline is also
                 demonstrated, and it is shown to have the local balance
                 property.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 922",
  descriptors =  "Queueing network; processor sharing; Markov process;
                 product form; network; local balance",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; probability --- Queueing
                 Theory",
}

@Article{Milner:1979:FFA,
  author =       "Robin Milner",
  title =        "Flowgraphs and Flow Algebras",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "794--818",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/dbase.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algebra $G$ of flowgraphs or nets is presented. It
                 is shown to be a free algebra of a simple equational
                 system F, which is called the laws of flow. This holds
                 both for the algebra of finite nets, and for the
                 algebra of finite or infinite nets in which certain
                 infinite nets may be described by recursion equations.
                 To demonstrate this fact, some results concerning
                 categories of continuous algebras, which are explicit
                 in the work of the ADJ group, are presented in a
                 self-contained form. It follows that the algebra of
                 processes, which satisfies the laws of flow F, is a
                 suitable semantics for flowgraphs. Some simple examples
                 of infinite nets are given, and their possible
                 interpretation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Logrippo:1979:RMP,
  author =       "Luigi Logrippo",
  title =        "Renamings, Maximal Parallelism, and Space-Time
                 Tradeoff in Program Schemata",
  journal =      j-J-ACM,
  volume =       "26",
  number =       "4",
  pages =        "819--833",
  month =        oct,
  year =         "1979",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Concepts such as ``maximal parallelism'', ``greater
                 parallelism'', and ``instruction look-ahead'' are
                 investigated in the framework of program schemata
                 theory. A method for increasing the parallelism of a
                 program schema by changing its control structure and
                 the name of its variables is given. A characterization
                 result of maximal parallelism, a method for
                 approximating the maximally parallel form of a given
                 finite schema, and a space-time tradeoff principle are
                 obtained. It is shown that maximal parallelism is a
                 decidable property for finite schemata, but that there
                 are finite schemata whose maximally parallel form
                 requires an infinite control and an infinite number of
                 memory variables.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Proskurowski:1980:GBT,
  author =       "Andrzej Proskurowski",
  title =        "On the Generation of Binary Trees",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A binary tree may be uniquely represented by a code
                 reflecting traversal of the corresponding extended
                 binary tree in a given monotonic order. A general
                 algorithm for constructing codes of all binary trees
                 with $n$ vertices is presented. Different orders of
                 traversal yield different orderings of the generated
                 trees. The algorithm is illustrated with an example of
                 the sequence of binary trees obtained from ballot
                 sequences.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "binary trees; computer programming; mathematical
                 techniques --- Trees",
}

@Article{Solomon:1980:NEB,
  author =       "Marvin Solomon and Raphael A. Finkel",
  title =        "A Note on Enumerating Binary Trees",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "3--5",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "G. Knott has presented algorithms for computing a
                 bijection between the set of binary trees on $n$ nodes
                 and an initial segment of the positive integers. D.
                 Rotem and Y. L. Varol presented a more complicated
                 algorithm that computes a different bijection, claiming
                 that their algorithm is more efficient and has
                 advantages if a sequence of several consecutive trees
                 is required. A modification of Knott's algorithm that
                 is simpler than Knott's and as efficient as Rotem and
                 Varol's is presented. Also given is a new linear-time
                 algorithm for transforming a tree into its successor in
                 the natural ordering of binary trees.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Trees",
}

@Article{Nassimi:1980:ORA,
  author =       "David Nassimi and Sartaj Sahni",
  title =        "An Optimal Routing Algorithm for Mesh-Connected
                 Parallel Computers",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "6--29",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.comm.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An optimal algorithm to route data in a mesh-connected
                 parallel computer is presented. This algorithm can be
                 used to perform any data routing that can be specified
                 by the permutation and complementing of the bits in a
                 PE address. Matrix transpose, bit reversal, vector
                 reversal, and perfect shuffle are examples of data
                 permutations that can be specified in this way. The
                 algorithm presented uses the minimum number of unit
                 distance routing steps for every data permutation that
                 can be specified as above.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; computer systems, digital ---
                 Parallel Processing",
}

@Article{Pawlikowski:1980:MWT,
  author =       "Krzysztof Pawlikowski",
  title =        "Message Waiting Time in a Packet Switching System",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "30--41",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The behavior of a buffer having an arbitrary number of
                 common output channels in a packet switching system
                 with an arbitrary number of priority classes of
                 messages is studied. Because of the random lengths of
                 the messages and the fixed packet size, some messages
                 must be split into several packets. Packets of the same
                 message may not be sent immediately in sequence because
                 of the packets of higher priority messages. Therefore,
                 the message waiting time is defined as the waiting time
                 of the last packet carrying a part of the given
                 message. The limiting probability distribution of this
                 delay is calculated for the case of independent packet
                 arrival processes with stationary independent
                 increments. Some numerical results are also
                 presented.\\
                 The results obtained can be used in the analysis of
                 message path delay in certain store-and-forward
                 communication systems, particularly loop communication
                 systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  descriptors =  "Queueing system; Markov process; packet switching;
                 priority; ring network; loop system",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks",
}

@Article{Swartz:1980:PLS,
  author =       "G. Boyd Swartz",
  title =        "Polling in a Loop System",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "42--59",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A communication system consisting of $n$ buffered
                 input terminals connected to a computer by a single
                 channel is analyzed. The terminals are polled in
                 sequence. Data are removed one unit at a time from the
                 terminal's buffer. When the buffer has been emptied,
                 the channel is used for system overhead for a randomly
                 determined length of time. The system continues with a
                 poll of the next terminal. The stationary distributions
                 of waiting times and queueing delay are determined for
                 independent input processes. The queueing delay is
                 minimized by proper selection of the polling order.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  descriptors =  "Communication network; queueing system; polling;
                 statistical multiplexing",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks",
}

@Article{Henderson:1980:SPS,
  author =       "Peter B. Henderson and Yechezkel Zalcstein",
  title =        "Synchronization Problems Solvable by Generalized {PV}
                 Systems",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "60--71",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A basic question in the area of asynchronous
                 computation is: Given a synchronization problem, what
                 synchronization primitives are needed for an
                 ``efficient'' solution? This study is directed toward
                 answering this question by providing characterizations
                 of those synchronization problems solvable by
                 Dijkstra's PV system of primitives and its various
                 generalizations including PV general, PV multiple, PV
                 chunk, Vector Addition, and Loopless Petri Net systems.
                 These characterizations form the foundations of a
                 formal synthesis procedure for determining efficient
                 solutions to synchronization problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Silberschatz:1980:CHD,
  author =       "Abraham Silberschatz and Zvi Kedem",
  title =        "Consistency in Hierarchical Database Systems",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "72--80",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problems of locking and consistency in database
                 systems are examined. It is assumed that each
                 transaction, when executed alone, transforms a
                 consistent state into a consistent state. A set of
                 conditions is derived to guarantee that when
                 transactions are processed concurrently, the results
                 are the same as would be obtained by processing the
                 transactions serially. These conditions are used to
                 establish a locking protocol in hierarchical database
                 systems. The locking protocol allows transactions to
                 request new locks after releasing a lock. However, a
                 data item may be locked almost at once as a result of
                 each transaction. It is shown that the protocol ensures
                 consistency and that it is deadlock free.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems",
}

@Article{Lipton:1980:EHS,
  author =       "Richard J. Lipton and Arnold L. Rosenberg and Andrew
                 C. Yao",
  title =        "External Hashing Schemes for Collections of Data
                 Structures",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "81--95",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The use of external hashing schemes for storing broad
                 classes of data structures is studied. The general
                 framework of the paper considers a class of data
                 structures partitioned into smaller classes by the
                 number of positions in the structure. For instance, one
                 could start with the class of all binary trees and
                 partition that class into subclasses comprising all
                 $n$-node binary trees. The main results establish
                 nonconstructively the existence of an external hashing
                 scheme $h_n$ with $O(n)$ storage demand and $O(1)$
                 expected access time. Classes of data structures
                 subsumed by these results include ragged arrays, binary
                 trees, string-indexed arrays, and refinable arrays.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing",
}

@Article{Engelfriet:1980:SMC,
  author =       "Joost Engelfriet and Erik Meineche Schmidt and Jan van
                 Leeuwen",
  title =        "Stack Machines and Classes of Nonnested Macro
                 Languages",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "96--117",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new class of generalized one-way stack automata,
                 called s-pd machines, is investigated. The machines are
                 obtained by augmenting a stack automaton with a
                 pushdown store, whose bottom is attached to the top of
                 the stack and whose top follows the movements of the
                 stack-pointer into the stack. Motivations for the model
                 include a possible protocol for macro expansion with
                 intermittent parameter evaluation. The language
                 recognized by these machines are characterized by a
                 natural class of grammars, viz., the class of OI macro
                 grammars with set-parameters and nonnested function
                 calls (the ``extended basic'' or EB macro grammars). If
                 the stack is required to be nonerasing or checking,
                 then a useful machine characterization for the ETOL
                 languages is obtained, together with the known
                 characterization of this family by means of extended
                 ``linear'' basic or ELB macro grammars. It follows that
                 the nonerasing one-way stack languages are (strictly)
                 included in ETOL.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Kannan:1980:PAT,
  author =       "Ravindran Kannan",
  title =        "A Polynomial Algorithm for the Two-Variable Integer
                 Programming Problem",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "118--122",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A polynomial time algorithm is presented for solving
                 the following two-variable integer programming problem:
                 maximize $c_1x_1 + c_2x_2$ subject to $a_{i_1} x_1 +
                 a_{i_2} x_2 \leq b_i$, $i = 1, 2, \ldots{}, n$, and
                 $x_1, x_2 \geq 0$, integers, where $a_{i_j}$, $c_j$,
                 and $b_i$ are assumed to be nonnegative integers. This
                 generalizes a result of D. S. Hirschberg and C. K.
                 Wong, who developed a polynomial algorithm for the same
                 problem with only one constraint (i.e., where $n = 1$).
                 However, the techniques used here are quite
                 different.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{DeMillo:1980:STT,
  author =       "Richard A. DeMillo and Stanley C. Eisenstat and
                 Richard J. Lipton",
  title =        "Space-Time Trade-Offs in Structured Programming: {An}
                 Improved Combinatorial Embedding Theorem",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "123--127",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $G$ and G* be programs represented by directed
                 graphs. There is defined a relation less than
                 equivalent to $S, T$ between $G$ and $G*$ that
                 formalizes the notion of $G*$ simulating $G$ with
                 $S$-fold loss of space efficiency and $T$-fold loss of
                 time efficiency; it is proved that if $G$ less than or
                 equivalent to $S,T G*$, where $G$ has $n$ statements
                 and $G*$ is structured, then in the worst case $T +
                 \log_2 \log_2 S$ is greater than or equivalent to
                 $\log_2 n + O(\log_2 \log_2 n)$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Kaplan:1980:SAI,
  author =       "Marc A. Kaplan and Jeffrey D. Ullman",
  title =        "A Scheme for the Automatic Inference of Variable
                 Types",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "128--145",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm for the determination of run-time types
                 in a programming language requiring no type
                 declarations is presented. It is demonstrated that this
                 algorithm is superior to other published algorithms in
                 the sense that it produces stronger assertions about
                 the set of possible types for variables than do other
                 known algorithms. In fact this algorithm is to be the
                 best possible algorithm from among all those that use
                 the same set of primitive operators.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Prabhala:1980:ECE,
  author =       "Bhaskaram Prabhala and Ravi Sethi",
  title =        "Efficient Computation of Expressions with Common
                 Subexpressions",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "146--163",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Previous results have shown that it is easy to
                 generate optimal code from expression trees, and that
                 optimal code generation becomes very difficult if
                 arbitrary common subexpressions are handled. In this
                 paper a class of expressions containing restricted
                 common subexpressions from which optimal code can be
                 generated efficiently is studied. These expressions are
                 represented by a class of series-parallel graphs, which
                 the authors call collapsible graphs, that include trees
                 and are general enough to permit large common
                 subexpressions, but from which optimal code can be
                 generated in polynomial time for a class of stack
                 machines.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Wand:1980:CBP,
  author =       "Mitchell Wand",
  title =        "Continuation-Based Program Transformation Strategies",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "164--180",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Program transformations often involve the
                 generalization of a function to take additional
                 arguments. It is shown that in many cases such an
                 additional variable arises as a representation of the
                 continuation or global context in which the function is
                 evaluated. By considering continuations, local
                 transformation strategies can take advantage of global
                 knowledge. The general results are followed by two
                 examples: the $\alpha$--$\beta$ tree pruning algorithm
                 and an algorithm for the conversion of a propositional
                 formula to conjunctive normal form.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Bender:1980:NFF,
  author =       "Edward A. Bender",
  title =        "The Number of Fanout-Free Functions with Various
                 Gates",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "181--190",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Generating functions for the number of fanout-free and
                 cascade networks built from an arbitrary set of
                 symmetric gates are studied. Recursions and asymptotic
                 estimates are obtained. The average number of gates in
                 $n$-input networks is studied. It grows linearly with
                 $n$, in contrast to the situation when a much larger
                 set of gates is allowed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "switching theory",
}

@Article{Suzuki:1980:VDP,
  author =       "Norihisa Suzuki and David Jefferson",
  title =        "Verification Decidability of {Pressburger} Array
                 Programs",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "1",
  pages =        "191--205",
  month =        jan,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A program annotated with inductive assertions is said
                 to be verification decidable if all of the verification
                 conditions generated from the program and assertions
                 are formulas in a decidable theory. A theory is
                 defined, which is called Presburger array theory,
                 containing two logical sorts: integer and array of
                 integer. Addition, subtraction, and comparisons are
                 permitted for integers. Array access and assignment
                 functions are allowed. Since the elements of the arrays
                 are integers, array accesses may be nested. First, it
                 is observed that the validity of unquantified formulas
                 in Presburger array theory is decidable, yet quantified
                 formulas in general are undecidable. It is then shown
                 that, with certain restrictions, one can add a new
                 predicate Perm(M, N) --- meaning array M is a
                 permutation of array $N$ --- to the assertion language
                 and still have a solvable decision problem for
                 verification conditions generated from unquantified
                 assertions. The significance of this result is that
                 almost all known one-array sorting programs are
                 verification decidable when annotated with inductive
                 assertions for proving that the output is a permutation
                 of the input.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Yao:1980:NAP,
  author =       "Andrew Chi-Chih Yao",
  title =        "New Algorithms for Bin Packing",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "207--227",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/bin-packing.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In the bin-packing problem a list $L$ of $n$ numbers
                 are to be packed into unit-capacity bins. For any
                 algorithm $S$, let $r(S)$ be the maximum ratio
                 $S(L)/L*$ for large $L*$, where $S(L)$ denotes the
                 number of bins used by $S$ and $L*$ denotes the minimum
                 number needed. An on-line $O(n \log n)$-time algorithm
                 RFF with $r(RFF) = 5/3$ and an off-line polynomial-time
                 algorithm RFFD with $r(RFFD) \leq 11/9 - \epsilon$, for
                 some fixed epsilon greater than $0$, are given. These
                 are strictly better, respectively, than two prominent
                 algorithms: the First-Fit (FF), which is on-line with
                 $r(FF) = 17/10$, and the First-Fit-Decreasing (FFD)
                 with $r(FFD) = 11/9$. Furthermore, it is shown that any
                 on-line algorithm $S$ must have $r(S) \geq 3/2$. The
                 question, ``How well can an $o(n \log n)$-time
                 algorithm perform?'' is also discussed. It is shown
                 that in the generalized $d$-dimensional bin packing,
                 any $o(n \log n)$-time algorithm $S$ must have $r(S)
                 \geq d$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Pease:1980:RAP,
  author =       "M. Pease and R. Shostak and L. Lamport",
  title =        "Reaching Agreements in the Presence of Faults",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "228--234",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "This paper is similar to their 1982 publication
                 \cite{Lamport:1982:BGP}, but contains a rigorous proof
                 of the impossibility of Byzantine agreement for the
                 case $n=3$, $t=1$. As usual, $n$ is the total number of
                 processes and $t$ is the number of faulty processes.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Byzantine generals.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Reiter:1980:EDC,
  author =       "Raymond Reiter",
  title =        "Equality and Domain Closure for First-Order
                 Databases",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "235--249",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A class of first-order databases with no function
                 signs is considered. A closed database DB is one for
                 which the only existing individuals are those
                 explicitly referred to in the formulas of DB. Formally,
                 this is expressed by including in DB a domain closure
                 axiom. It is shown how to completely capture the
                 effects of this axiom by means of suitable
                 generalizations of the projection and division
                 operators of relational algebra, thereby permitting the
                 underlying theorem prover used for query evaluation to
                 ignore this axiom. A database is $E$-saturated if all
                 of its constants denote distinct individuals. It is
                 shown that such databases circumvent the usual problems
                 associated with equality, which arise in more general
                 databases. Finally, it is proved for Horn databases and
                 positive queries that only definite answers are
                 obtained, and for databases with infinitely many
                 constants that infinitely long indefinite answers can
                 arise.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems",
}

@Article{Sagiv:1980:AIM,
  author =       "Yehoshua Sagiv",
  title =        "An Algorithm for Inferring Multivalued Dependencies
                 with an Application to Propositional Logic",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "250--262",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:08:45 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wasilkowski:1980:CSI,
  author =       "G. W. Wasilkowski",
  title =        "Can Any Stationary Iteration Using Linear Information
                 be Globally Convergent?",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "263--269",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "All known globally convergent iterations for the
                 solution of a nonlinear operator equation f(x) equals 0
                 are either nonstationary or use nonlinear information.
                 It is asked whether there exists a globally convergent
                 stationary iteration which uses linear information. It
                 is proved that even if global convergence is defined in
                 a weak sense, there exists no such iteration for as
                 simple a class of problems as the set of all analytic
                 complex functions having only simple zeros. It is
                 conjectured that even for the class of all real
                 polynomials which have real simple zeros there does not
                 exist a globally convergent stationary iteration using
                 linear information.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Kameda:1980:TDF,
  author =       "Tiko Kameda",
  title =        "Testing Deadlock-Freedom of Computer Systems",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "270--280",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of determining whether it is possible for
                 a set of ``free-running'' processes to become
                 deadlocked is considered. It is assumed that any
                 request by a process is immediately granted as long as
                 there are enough free resource units to satisfy the
                 request. The question of whether or not there exists a
                 polynomial algorithm for predicting deadlock in a
                 ``claim-limited'' serially reusable resource system has
                 been open. An algorithm employing a network flow
                 technique is presented for this purpose. Its running
                 time is bounded by $O(m n^{1.5})$ if the system
                 consists of $n$ processes sharing $m$ types of serially
                 reusable resources.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; concurrency control",
}

@Article{Chow:1980:CTD,
  author =       "We-Min Chow",
  title =        "The Cycle Time Distribution of Exponential Cyclic
                 Queues",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "281--286",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The cycle time distribution of a cyclic queue with two
                 exponential servers is derived. Results show that when
                 the population size $N$ is large enough, the cycle time
                 distribution is not sensitive to the ratio of service
                 rates and asymptotically approaches an Erlangian
                 distribution. If service rates are identical, however,
                 the cycle time has an exact Erlangian distribution for
                 any $N$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 922",
  descriptors =  "loop queue; time in system; exponential distribution;
                 Erlang distribution; model; cyclic service; cycle
                 time",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; probability --- Queueing
                 Theory",
}

@Article{Gonzalez:1980:NAP,
  author =       "Teofilo F. Gonzalez and Donald B. Johnson",
  title =        "A New Algorithm for Preemptive Scheduling of Trees",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "287--312",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm which schedules forests of $n$ tasks on
                 $m$ identical processors in $O(n\log m)$ time, offline,
                 is given. The schedules are optimal with respect to
                 finish time and contain at most $n-2$ preemptions, a
                 bound which is realized for all $n$. Also given is a
                 simpler algorithm which runs in $O(n\times m)$ time on
                 the same problem and can be adapted to give optimal
                 finish time schedules on-line for independent tasks
                 with release times.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  descriptors =  "Method; runtime/storage efficiency; queueing
                 discipline; optimization; preemptive scheduling; finish
                 time",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Reiser:1980:MVA,
  author =       "M. Reiser and S. S. Lavenberg",
  title =        "Mean-Value Analysis of Closed Multichain Queuing
                 Networks",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "313--322",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Reiser:1981:CMV}.",
  abstract =     "It is shown that mean queue sizes, mean waiting times,
                 and throughputs in closed multiple-chain queueing
                 networks which have product-form solution can be
                 computed recursively without computing product terms
                 and normalization constants. The resulting
                 computational procedures have improved properties
                 (avoidance of numerical problems and, in some cases,
                 fewer operations) compared to previous algorithms.
                 Furthermore, the new algorithms have a physically
                 meaningful interpretation which provides the basis for
                 heuristic extensions that allow the approximate
                 solution of networks with a very large number of closed
                 chains, and which is shown to be asymptotically valid
                 for large chain populations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "922",
  descriptors =  "Method; queueing network; model; performance
                 evaluation; queueing approximation; closed queueing
                 network; expectation; waiting time; queue length;
                 runtime/storage efficiency; throughput performance",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Towsley:1980:QNM,
  author =       "Don Towsley",
  title =        "Queuing Network Models with State-Dependent Routing",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "323--337",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:53:42 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/Discrete.event.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A model of a closed queueing network within which
                 customer routing between queues may depend on the state
                 of the network is presented. The routing functions
                 allowed may be rational functions of the queue lengths
                 of various downstream queues which reside within
                 special subnetworks called $p$-subnetworks. If a
                 network with no state-dependent routing has a
                 product-form joint equilibrium distribution of the
                 queue lengths, then the introduction of these routing
                 functions will preserve the product form of the
                 equilibrium distribution. An example to illustrate the
                 applicability of the model to the problem of analyzing
                 a load balancing strategy is presented. It is also
                 indicated how the parametric analysis of a network with
                 routing functions can be simplified through the
                 analysis of a simpler ``equivalent'' network.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "922",
  descriptors =  "Model; routing algorithm; closed queueing network;
                 product form; network; load balancing; state dependent
                 routing; local balance",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Krishnaswamy:1980:CSS,
  author =       "Ramachandran Krishnaswamy and Arthur B. Pyster",
  title =        "On the Correctness of Semantic-Syntax-Directed
                 Translations",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "338--355",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/AG.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The correctness of semantic-syntax-directed
                 translators (SSDTs) is examined. SSDTs are a
                 generalization of syntax-directed translators in which
                 semantic information is employed to partially direct
                 the translator. Sufficient conditions for an SSDT to be
                 ``semantic-preserving,'' or ``correct,'' are presented.
                 A further result shows that unless certain conditions
                 are met, it is undecidable, in general, whether an SSDT
                 is semantic-preserving.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "compilation; computer programming; valid",
}

%% Page 280 is blank
@Article{Nelson:1980:FDP,
  author =       "Greg Nelson and Derek C. Oppen",
  title =        "Fast Decision Procedures Based on Congruence Closure",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "356--364",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The notion of the congruence closure of a relation on
                 a graph is defined and several algorithms for computing
                 it are surveyed. A simple proof is given that the
                 congruence closure algorithm provides a decision
                 procedure for the quantifier-free theory of equality. A
                 decision procedure is then given for the
                 quantifier-free theory of LISP list structure based on
                 the congruence closure algorithm. Both decision
                 procedures determine the satisfiability of a
                 conjunction of literals of length $n$ in average time
                 $O(n \log n)$ using the fastest known congruence
                 closure algorithm. It is also shown that if the
                 axiomatization of the theory of list structure is
                 changed slightly, the problem of determining the
                 satisfiability of a conjunction of literals becomes
                 NP-complete. The decision procedures have been
                 implemented in the authors' simplifier for the Stanford
                 Pascal Verifier.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Ward:1980:STM,
  author =       "Stephen A. Ward and Robert H. {Halstead, Jr.}",
  title =        "A Syntactic Theory of Message Passing",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "365--383",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Recent developments by Hewitt and others have
                 stimulated interest in message-passing constructs as an
                 alternative to the more conventional applicative
                 semantics on which most current languages are based.
                 The present work illuminates the distinction between
                 applicative and message-passing semantics by means of
                 the $\mu$-calculus, a syntactic model of
                 message-passing systems similar in mechanism to the
                 $\lambda$-calculus. Algorithms for the translation of
                 expressions from the $\lambda$ --- to the
                 $\mu$-calculus are presented, and differences between
                 the two approaches are discussed. Message-passing
                 semantics seem particularly applicable to the study of
                 multiprocessing. The $\mu$-calculus, through the
                 mechanism of conduits, provides a simple model for a
                 limited but interesting class of parallel computations.
                 Multiprocessing capabilities of the $\mu$-calculus are
                 illustrated, and multiple-processor implementations are
                 discussed briefly.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming",
}

@Article{Abelson:1980:LBI,
  author =       "Harold Abelson",
  title =        "Lower Bounds on Information Transfer in Distributed
                 Computations",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "384--392",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:53:46 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Lower bounds on the interprocessor communication
                 required for computing a differentiable real-valued
                 function in a distributed network are derived. These
                 bounds are independent of the network interconnection
                 configuration, and they impose no assumptions other
                 than differentiability constraints on the computations
                 performed by individual processors. As a sample
                 application, lower bounds on information transfer in
                 the distributed computation of some typical matrix
                 operations are exhibited.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital",
}

@Article{Lichtenstein:1980:GPS,
  author =       "David Lichtenstein and Michael Sipser",
  title =        "{GO} is Polynomial-Space Hard",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "393--401",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:19:15 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Parchmann:1980:CCS,
  author =       "R. Parchmann",
  title =        "Corrigendum: ``{Control} System Model for Critically
                 Timed Sources''",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "2",
  pages =        "402--402",
  month =        apr,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:27:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Parchmann:1979:CSM}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Oppen:1980:RAR,
  author =       "Derek C. Oppen",
  title =        "Reasoning About Recursively Defined Data Structures",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "403--411",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Altenkamp:1980:CUP,
  author =       "Doris Altenkamp and Kurt Mehlhorn",
  title =        "Codes: {Unequal} Probabilities, Unequal Letter Costs",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "412--427",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:22:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Graham:1980:IBW,
  author =       "Ronald L. Graham and Andrew C. Yao and F. Frances
                 Yao",
  title =        "Information Bounds Are Weak in the Shortest Distance
                 Problem",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "428--444",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:23:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shiloach:1980:PSU,
  author =       "Yossi Shiloach",
  title =        "A Polynomial Solution in the Undirected Two Paths
                 Problem",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "445--456",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:23:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Trivedi:1980:OSC,
  author =       "Kishor S. Trivedi and Robert A. Wagner and Timothy M.
                 Sigmon",
  title =        "Optimal Selection of {CPU} Speed, Device Capacities,
                 and File Assignments",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "457--473",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:24:31 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mendelson:1980:NAA,
  author =       "Haim Mendelson and Uri Yechiali",
  title =        "A New Approach to the Analysis of Linear Probing
                 Schemes",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "474--483",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:27:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new approach to the analysis of hash table
                 performance is presented. This approach is based on a
                 direct probabilistic analysis, where the underlying
                 probabilities are derived by using the ballot theorem
                 and its ramifications. The method is first applied to
                 analyze the performance of the classical (cyclic)
                 linear probing scheme, and the results are used to
                 solve an optimal storage allocation problem. A scheme
                 frequently used in practice where the table is linear
                 rather than cyclic is then analyzed using the same
                 methodology.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Abramson:1980:CPG,
  author =       "Fred G. Abramson and Yuri Breitbart and Forbes D.
                 Lewis",
  title =        "Complex Properties of Grammars",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "484--498",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:33:14 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Engelfriet:1980:FPL,
  author =       "J. Engelfriet and G. Rozenberg",
  title =        "Fixed Point Languages, Equality Languages, and
                 Representation of Recursively Enumerable Languages",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "499--518",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:33:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fayolle:1980:SPA,
  author =       "G. Fayolle and I. Mitrani and R. Iasnogorodski",
  title =        "Sharing a Processor Among Many Job Classes",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "519--532",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:42:15 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A single-server processor-sharing system with $M$ job
                 classes is analyzed in the steady state. The scheduling
                 strategy considered divides the total processor
                 capacity in unequal fractions among the different job
                 classes. More precisely, if there are $N_j$ jobs of
                 class $j$ in the system, $j=1,2, \ldots{},M$, each
                 class $k$ job receives a fraction $g_k/(\sum_{j=1}^M
                 g_jN_j)$ of the processor capacity.\\
                 Earlier analyses of this system are shown to be
                 incorrect and new expressions for the conditional
                 expected response times $W_k(t)$ of class $k$ jobs with
                 required service time $t$ are obtained (for general
                 required service time distributions). These yield the
                 asymptotic behavior of $W_k(t)$ at $t\rightarrow\infty$
                 and rather simple formulas in the exponential case. The
                 unconditional average response times are also
                 obtained.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  descriptors =  "Processor sharing; priority; Laplace transform;
                 characteristic function",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "discriminatory job classes; egalitarian;
                 Fourier--Stieltjes transform; Laplace transform;
                 operating systems scheduling priority; processor
                 sharing; strategy",
}

@Article{Papadimitriou:1980:FSL,
  author =       "Christos H. Papadimitriou and Paris C. Kanellakis",
  title =        "Flowshop Scheduling with Limited Temporary Storage",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "533--549",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:43:02 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "scheduling database",
}

@Article{Sahni:1980:SIT,
  author =       "Sartaj Sahni and Yookun Cho",
  title =        "Scheduling Independent Tasks with Due Times on a
                 Uniform Processor System",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "550--563",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:43:37 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  descriptors =  "Process management; evaluation; independent tasks;
                 preemptive scheduling; due time; complexity",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "operating real-time multiprocessor",
}

@Article{Ghezzi:1980:APS,
  author =       "Carlo Ghezzi and Dino Mandrioli",
  title =        "Augmenting Parsers to Support Incrementality",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "564--579",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:43:59 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "extensibility",
}

@Article{Sethi:1980:CCV,
  author =       "Ravi Sethi and Adrian Tang",
  title =        "Constructing Call-by-value Continuation Semantics",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "3",
  pages =        "580--597",
  month =        jul,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:44:37 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aronson:1980:NFD,
  author =       "Alan R. Aronson and Barry E. Jacobs and Jack Minker",
  title =        "A Note on Fuzzy Deduction",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "599--603",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:45:16 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lee:1980:TDV,
  author =       "D. T. Lee",
  title =        "Two-dimensional {Voronoi} diagrams in the
                 {$L_p$}-metric",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "604--618",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/80.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tsukiyama:1980:AEA,
  author =       "S. Tsukiyama and I. Shirakawa and H. Ozaki and H.
                 Ariyoshi",
  title =        "An Algorithm to Enumerate All Cutsets of a Graph in
                 Linear Time per Cutset",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "619--632",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sagiv:1980:EAR,
  author =       "Yehoshua Sagiv and Mihalis Yannakakis",
  title =        "Equivalences Among Relational Expressions with the
                 Union and Difference Operators",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "633--655",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:48:43 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "database query optimization",
}

@Article{Ehrenfeucht:1980:SEP,
  author =       "A. Ehrenfeucht and G. Rozenberg",
  title =        "The Sequence Equivalence Problem Is Decidable for {0S}
                 Systems",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "656--663",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:49:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Maier:1980:MCR,
  author =       "David Maier",
  title =        "Minimum Covers in the Relational Database Model",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "664--674",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:50:11 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "database",
}

@Article{Greibach:1980:SPS,
  author =       "S. A. Greibach and E. P. Friedman",
  title =        "Superdeterministic {PDA}s: a Subclass with a Decidable
                 Inclusion Problem",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "675--700",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:51:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Schwartz:1980:FPA,
  author =       "J. T. Schwartz",
  title =        "Fast Probabilistic Algorithms for Verification of
                 Polynomial Identities",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "701--717",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:51:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fisher:1980:DLC,
  author =       "Marshall L. Fisher and Dorit S. Hochbaum",
  title =        "Database Location in Computer Networks",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "718--735",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:52:02 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ramakrishnan:1980:STC,
  author =       "K. G. Ramakrishnan",
  title =        "Solving Two-Commodity Transportation Problems with
                 Coupling Constraints",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "736--757",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:52:29 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/netflow.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Downey:1980:VCS,
  author =       "Peter J. Downey and Ravi Sethi and Robert Endre
                 Tarjan",
  title =        "Variations on the Common Subexpression Problem",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "758--771",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:52:49 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "optimization",
}

@Article{Raoult:1980:OSE,
  author =       "Jean-Claude Raoult and Jean Vuillemin",
  title =        "Operational and Semantic Equivalence Between Recursive
                 Programs",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "772--796",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:53:16 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Huet:1980:CRA,
  author =       "G\'erard Huet",
  title =        "Confluent Reductions: {Abstract} Properties and
                 Applications to Term Rewriting Systems",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "797--821",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/LF.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Preliminary version in {\em Proceedings}, 18th IEEE
                 Symposium on Foundations of Computer Science, IEEE,
                 1977, pages 30--45",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "One of the best single papers in this area and a must
                 for anyone working on rewriting. Is importance for
                 theorem proving stems from the fact that the best known
                 techniques for dealing with equational problems are
                 based on rewriting.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "functional Church Rosser theorems",
}

@Article{JaJa:1980:CBF,
  author =       "Joseph Ja'Ja'",
  title =        "Computation of Bilinear Forms over Finite Fields",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "822--830",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:54:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ladner:1980:PPC,
  author =       "Richard E. Ladner and Michael J. Fischer",
  title =        "Parallel Prefix Computation",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "831--838",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/322217.322232",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:55:08 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Par.Arch.Indep.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The prefix problem is to compute all the products $
                 x_1 * x_2 * \cdots * x_k $ for $ 1 \leq k \leq n $,
                 where $*$ is an associative operation. A recursive
                 construction is used to obtain a product circuit for
                 solving the prefix problem which has depth exactly $
                 \lceil \log n \rceil $ and size bounded by $ 4 n $ An
                 application yields fast, small Boolean circuits to
                 simulate finite-state transducers. By simulating a
                 sequential adder, a Boolean circuit which has depth $ 2
                 \lceil \log_2 n \rceil + 2 $ and size bounded by $ 14 n
                 $ is obtained for $n$-bit binary addition. The size can
                 be decreased significantly by permitting the depth to
                 increase by an additive constant.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

%% Page 298 is blank
@Article{Reischuk:1980:IBP,
  author =       "R{\"{u}}diger Reischuk",
  title =        "Improved Bounds on the Problem of Time-Space Trade-Off
                 in the Pebble Game",
  journal =      j-J-ACM,
  volume =       "27",
  number =       "4",
  pages =        "839--849",
  month =        oct,
  year =         "1980",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 26 22:56:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Even:1981:LED,
  author =       "Shimon Even and Yossi Shiloach",
  title =        "An On-Line Edge-Deletion Problem",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "1--4",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Heaps.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Perl:1981:MMT,
  author =       "Yehoshua Perl and Stephen R. Schach",
  title =        "Max-Min Tree Partitioning",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "5--15",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:04:39 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rodeh:1981:LAD,
  author =       "Michael Rodeh and Vaughan R. Pratt and Shimon Even",
  title =        "Linear Algorithm for Data Compression via String
                 Matching",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "16--24",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:05:19 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bernstein:1981:USJ,
  author =       "Philip A. Bernstein and Dah-Ming W. Chiu",
  title =        "Using Semi-Joins to Solve Relational Queries",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "25--40",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:06:02 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lipski:1981:DII,
  author =       "Witold {Lipski, Jr.}",
  title =        "On Databases with Incomplete Information",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "41--70",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 15:18:35 1991",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/incomplete.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Semantic and logical problems arising in an incomplete
                 information database are investigated. A simple query
                 language is described, and its semantics, which refers
                 the queries to the information about reality contained
                 in a database, rather than to reality itself, is
                 defined. This approach, called the internal
                 interpretation, is shown to lead in a natural way to
                 the notions of a topological Boolean algebra and a
                 model logic related to S4 in the same way as referring
                 queries directly to reality (external interpretation)
                 leads to Boolean algebras and classical logic. An axiom
                 system is given for equivalent (with respect to the
                 internal interpretation) transformation of queries,
                 which is then exploited as a basic tool in a method for
                 computing the internal interpretation for a broad class
                 of queries. An interesting special case of the problem
                 of determining the internal interpretation amounts to
                 deciding whether an assertion about reality (a
                 ``yes-no'' query) is consistent with the incomplete
                 information about reality contained in a database. A
                 solution to this problem, which relies on the classical
                 combinatorial problem of distinct representatives of
                 subset, is given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "database; implicit information; incomplete
                 information; modal logic; null values; query language
                 semantics; relational model",
}

@Article{Wasilkowski:1981:ECM,
  author =       "G. W. Wasilkowski",
  title =        "$n$-Evaluation Conjecture for Multipoint Iterations
                 for the Solution of Scalar Nonlinear Equations",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "71--80",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:07:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Achugbue:1981:BSI,
  author =       "James O. Achugbue and Francis Y. Chin",
  title =        "Bounds on Schedules for Independent Tasks with Similar
                 Execution Times",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "81--99",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:07:59 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bruno:1981:STE,
  author =       "J. Bruno and P. Downey and G. N. Frederickson",
  title =        "Sequencing Tasks with Exponential Service Times to
                 Minimize the Expected Flow Time or Makespan",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "100--113",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:08:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chandra:1981:A,
  author =       "Ashok K. Chandra and Dexter C. Kozen and Larry J.
                 Stockmeyer",
  title =        "Alternation",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "114--133",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:09:34 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "alternation; complexity",
}

@Article{Galil:1981:SMR,
  author =       "Z. Galil",
  title =        "String Matching in Real Time",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "134--149",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:10:20 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A sufficient condition for an on-line algorithm to be
                 transformed into a real-time algorithm is given. This
                 condition is used to construct real-time algorithms for
                 various string-matching problems by random access
                 machines and by Turing machines.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kirkpatrick:1981:ULB,
  author =       "David G. Kirkpatrick",
  title =        "A Unified Lower Bound for Selection and Set
                 Partitioning Problems",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "150--165",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:11:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Leong:1981:NRT,
  author =       "Benton L. Leong and Joel I. Seiferas",
  title =        "New Real-Time Simulations of Multihead Tape Units",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "166--180",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:12:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rowland:1981:UTP,
  author =       "John H. Rowland and Philip J. Davis",
  title =        "On the Use of Transcendentals for Program Testing",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "1",
  pages =        "181--190",
  month =        jan,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 01:43:54 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Andrews:1981:TPM,
  author =       "Peter B. Andrews",
  title =        "Theorem Proving by Matings",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "193--214",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:14:15 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "automatic theorem proving; matings",
}

@Article{Mateti:1981:DPC,
  author =       "Prabhaker Mateti",
  title =        "A Decision Procedure for the Correctness of a Class of
                 Programs",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "215--222",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Verification of certain properties of a class of
                 programs is considered. The programs are written in a
                 miniprogramming language that has variables of only two
                 data types: a linear array of elements, and pointers to
                 these elements. The array elements can only be
                 exchanged; pointers can only be incremented or
                 decremented by one. Program properties to be verified
                 are expressed in a severely restricted assertion
                 language which contains essentially Boolean expressions
                 of comparisons among pointers and among array elements.
                 Several in-place sorting algorithms can be readily
                 written and asserted in these languages. A decision
                 procedure for the truthhood of the verification
                 conditions generated for the above class of asserted
                 programs is presented. An algorithm for generating
                 counterexamples for false verification conditions is
                 also given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Peterson:1981:CSR,
  author =       "Gerald E. Peterson and Mark E. Stickel",
  title =        "Complete Sets of Reductions for Some Equational
                 Theories",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "223--264",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:15:27 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chu:1981:NME,
  author =       "C. K. Chu",
  title =        "A Note on Multiple Error Detection in {ASCII} Numeric
                 Data Communication",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "265--269",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Numeric data communication generally calls upon a
                 check sum to detect single transmission errors.
                 Multiple errors, which cannot be detected by simple
                 check sums alone, necessitate additional check
                 symbol(s). A check scheme is defined to consist of a
                 (simple) check sum and a (positional) check product. A
                 ``perfect'' $p$-error check scheme is a check scheme
                 that detects all combinations of $p$ or fewer errors in
                 a logical record of length $n$. It is shown that a
                 check scheme, as specified by the modulo factor mod
                 $m$, is a ``perfect'' double-error check scheme when
                 $m$ is a prime number that is greater than or equal to
                 the maximum of $n$ and 11.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Although this paper makes no reference to the
                 International Standard Book Number checksum process,
                 first adopted in 1972, the positional check product in
                 the paper is exactly that used for ISBNs. This suggests
                 that the ISBN checksum choice was not accidental, and
                 that there is likely earlier literature that justifies
                 the choice. Nevertheless, it is gratifying to find a
                 proof that the ISBN checksum scheme can detect all
                 single- and double-digit errors, though not all
                 triple-digit errors (a counterexample is exhibited in
                 the paper).",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data transmission",
}

@Article{Trivedi:1981:ODL,
  author =       "Kishor S. Trivedi and Timothy M. Sigmon",
  title =        "Optimal Design of Linear Storage Hierarchies",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "270--288",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The performance-oriented design of linear storage
                 hierarchies which are operating in multi-programming
                 environments is considered. An optimization model is
                 superimposed upon an experimental queuing network model
                 of the hierarchy, yielding a problem whose objective is
                 to maximize throughput subject to a cost constraint.
                 The decision variables are the speeds and capacities of
                 the various memory levels. It is shown that any local
                 optimum is needed a globally optimal solution to the
                 problem. Several special cases of and extensions to the
                 basic problem are discussed, and some examples are
                 given to illustrate the usefulness and computational
                 tractability of the problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital",
}

@Article{Gonnet:1981:ELL,
  author =       "Gaston H. Gonnet",
  title =        "Expected Length of the Longest Probe Sequence in Hash
                 Code Searching",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "289--304",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An investigation is made of the expected value of the
                 maximum number of accesses needed to locate any element
                 in a hashing file under various collision resolution
                 schemes. This differs from usual worst-case
                 considerations which, for hashing, would be the largest
                 sequence of accesses for the worst possible file.
                 Asymptotic expressions of these expected values are
                 found for full and partly full tables. Results are
                 given for the open addressing scheme with a
                 clustering-free model and the open addressing scheme
                 which reorders the insertions to minimize the worst
                 case. The results show that for these schemes, the
                 actual behavior of the worst case in hash tables is
                 quite good on the average.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing",
}

@Article{Karr:1981:SFT,
  author =       "Michael Karr",
  title =        "Summation in Finite Terms",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "305--350",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:27:45 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Feldman:1981:MBF,
  author =       "R. M. Feldman and G. W. Adkins and G. L. Curry and U.
                 W. Pooch",
  title =        "Measurement Bias in Feedback Queues",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "351--357",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A classical method of measuring the number of jobs in
                 a time-shared computer system is to collect statistics
                 at the epochs of quantum completions. A computer system
                 utilizing round-robin quantum allocations is modeled as
                 a feedback queue with Poisson arrivals and exponential
                 service times, and the bias in the statistic taken at
                 the quantum completions is quantified. The difference
                 between this statistic and the true time-average system
                 size is given for such a system including quanta and
                 overhead.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A classical method of measuring the number of jobs in
                 a time-shared computer system is to collect statistics
                 at the epochs of quantum completions. A computer system
                 utilizing round-robin quantum allocations is modeled as
                 a feedback queue with poisson arrivals and exponential
                 service times, and the bias in the statistic taken at
                 the quantum completions is quantified. The difference
                 between this statistic and the true time-average system
                 size is given for such a system including quanta and
                 overhead.",
  classification = "722; 723; 922",
  descriptors =  "feedback; queue length; round robin; overhead time;
                 priority",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; probability --- Queueing
                 Theory",
}

@Article{Sevcik:1981:DQN,
  author =       "K. C. Sevcik and I. Mitrani",
  title =        "The Distribution of Queuing Network States at Input
                 and Output Instants",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "358--371",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Queuing networks are studied at selected points in the
                 steady state, namely, at the moments when jobs of a
                 given class arrive into a given node and at the moments
                 when jobs of a given class leave a given node. For a
                 large class of networks having product-form equilibrium
                 distributions it is shown that (a) if the given job
                 class belongs to an open subchain, the state
                 distributions at input points, output points, and
                 random points are identical, and (b) if the job class
                 belongs to a closed subchain, the distribution at input
                 and output points is the same as the steady-state
                 distribution of a network with one less job in that
                 subchain.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "\ldots{} For a large class of networks having
                 product-form equilibrium distributions it is shown that
                 (a) if the given job class belongs to an open subchain,
                 the state distributions at input points, output points,
                 and random points are identical, and (b) if the job
                 class belongs to a closed subchain, the distribution at
                 input and output points is the same as the steady-state
                 distribution of a network with one less job in that
                 subchain.",
  classification = "922",
  descriptors =  "Queueing network; waiting time; product form; network;
                 queueing theory",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Hogger:1981:DLP,
  author =       "C. J. Hogger",
  title =        "Derivation of Logic Programs",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "372--392",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:30:27 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rem:1981:CSP,
  author =       "Martin Rem",
  title =        "The Closure Statement: a Programming Language
                 Construct Allowing Ultraconcurrent Execution",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "393--410",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:31:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lieberherr:1981:CPS,
  author =       "K. J. Lieberherr and E. Specker",
  title =        "Complexity of Partial Satisfaction",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "411--421",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:32:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stickel:1981:UAA,
  author =       "Mark E. Stickel",
  title =        "A Unification Algorithm for Associative-Commutative
                 Functions",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "2",
  pages =        "423--434",
  month =        apr,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:33:21 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/algebraic.spec.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Logic",
}

@Article{Sagiv:1981:EBR,
  author =       "Yehoshua Sagiv and Claude Delobel and D. Stott
                 {Parker, Jr.} and Ronald Fagin",
  title =        "An Equivalence Between Relational Database
                 Dependencies and a Fragment of Propositional Logic",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "435--453",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Sagiv:1987:CEB}.",
  abstract =     "It is known that there is an equivalence between
                 functional dependencies in a relational database and a
                 certain fragment of propositional logic. This
                 equivalence is extended to include both functional and
                 multivalued dependencies. Thus, for each dependency
                 there is a corresponding statement in propositional
                 logic. It is then shown that a dependency (functional
                 or multivalued) is a consequence of a set of
                 dependencies if and only if the corresponding
                 propositional statement is a consequence of the
                 corresponding set of propositional statements. Examples
                 are given to show that these techniques are valuable in
                 providing much shorter proofs of theorems about
                 dependencies than have been obtained by more
                 traditional means. It is shown that this equivalence
                 cannot be extended to include either join dependencies
                 or embedded multivalued dependencies.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems",
}

@Article{Dobkin:1981:OTM,
  author =       "David Dobkin and J. Ian Munro",
  title =        "Optimal Time Minimal Space Selection Algorithms",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "454--461",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Algorithms for finding medians and solving arbitrary
                 selection problems using a minimum number of data
                 storage locations are investigated. A linear-time
                 algorithm is given in the first case, and it is shown
                 that no such scheme exists for many other interesting
                 selection problems, such as finding a quartile. A tight
                 trade-off is demonstrated balancing extra space versus
                 time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Chin:1981:MMF,
  author =       "Francis Y. Chin and Long Lieh Tsai",
  title =        "On {$J$}-Maximal and {$J$}-Minimal Flow-Shop
                 Schedules",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "462--476",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Scheduling problems are considered for a common kind
                 of flow shop where the execution time for certain tasks
                 in each job is always longer or shorter than that for
                 the other tasks. NP-completeness is shown for some
                 cases, simple optimal algorithms are found for the
                 others, and bounds are given for the worst cases.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "operations research",
}

@Article{Kleinrock:1981:OSA,
  author =       "Leonard Kleinrock and Arne Nilsson",
  title =        "On Optimal Scheduling Algorithms for Time-Shared
                 Systems",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "477--486",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of finding those optimum scheduling
                 algorithms for time-shared systems that minimize a cost
                 function that depends on waiting time and required
                 service time is considered. An optimality condition
                 which sometimes leads to infeasible algorithms is
                 established. The procedure is improved upon by use of a
                 mathematical programming technique but still does not
                 always generate feasible algorithms. These results are
                 used as upper bounds on the performance of known
                 feasible algorithms so that it is possible to evaluate
                 how close to optimal the present algorithms come.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  descriptors =  "time sharing; feedback; process management; queueing
                 discipline; optimization; upper bound",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital",
}

@Article{Samet:1981:CCL,
  author =       "Hanan Samet",
  title =        "Connected Component Labeling Using Quadtrees",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "487--501",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/81.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm is presented for labeling the connected
                 components of an image represented by a quadtree. The
                 algorithm proceeds by exploring all possible
                 adjacencies for each node once and only once. As soon
                 as this is done, any equivalences generated by the
                 adjacency labeling phase are propagated. Analysis of
                 the algorithm reveals that its average execution time
                 is of the order ($W$ plus $B \times \log B$) where $B$
                 and $W$ correspond to the number of blocks comprising
                 the foreground and background, respectively, of the
                 image. These results are relevant to image processing
                 and pattern recognition.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "image processing; pattern recognition systems",
}

@Article{Kumar:1981:PAB,
  author =       "Sarangan Krishna Kumar and Melvin A. Breuer",
  title =        "Probabilistic Aspects of {Boolean} Switching Functions
                 via a New Transform",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "502--520",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new algorithm is introduced for computing the
                 probability expression, F equals Pr(f equals 1), that a
                 Boolean function $f$ equals $1$ as a function of the
                 probabilities that its inputs equal 1. It is shown that
                 this expression is uniquely characterized by a spectrum
                 vector $S$. A new matrix $P$ which has the property
                 that $S = AP$, where $A$ is the minterm vector of the
                 function $f$, is then introduced. Next, $S$ is related
                 to the Reed--Muller canonic (RMC) form of the function
                 $f$, and it is shown that the RMC coefficient vector
                 $a$ can be obtained trivially from the vector $S$. The
                 reverse transformation is computationally harder. It is
                 also shown how $S$ and $P$ can be used to compute the
                 Walsh coefficients of $f$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; switching theory --- Switching
                 Functions",
}

@Article{Brent:1981:ATC,
  author =       "R. P. Brent and H. T. Kung",
  title =        "The Area-Time Complexity of Binary Multiplication",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "521--534",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 22:44:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Brent:1982:CAT}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gurari:1981:CEP,
  author =       "Eitan M. Gurari and Oscar H. Ibarra",
  title =        "The Complexity of the Equivalence Problem for Simple
                 Programs",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "535--560",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The complexity of the equivalence problem for several
                 simple programming languages is investigated. In
                 particular, it is shown that a class of programs,
                 called XL, has an NP-complete inequivalence problem;
                 hence its equivalence problem is decidable in
                 deterministic time $2^{p(N)}$, where $p(N)$ is a
                 polynomial in the sum of the sizes of the programs.
                 This bound is a four-level exponential improvement over
                 a previously known result. A very simple subset of XL,
                 called SL, is also considered, and it is shown that
                 every XL-program is polynomial-time reducible to an
                 equivalent SL-program. Moreover, SL is minimal in the
                 sense that all its instructions are independent. On the
                 other hand, XL is maximal in that a ``slight''
                 generalization yields a language with an undecidable
                 equivalence problem. XL-programs realize precisely the
                 relations (functions) definable by Presburger
                 formulas.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages",
}

@Article{Mayr:1981:CFC,
  author =       "Ernst W. Mayr and Albert R. Meyer",
  title =        "The Complexity of the Finite Containment Problem for
                 {Petri} Nets",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "561--576",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Math/hilbert10.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tarjan:1981:UAP,
  author =       "Robert Endre Tarjan",
  title =        "A Unified Approach to Path Problems",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "577--593",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A general method is described for solving path
                 problems on directed graphs. Such path problems include
                 finding shortest paths, solving sparse systems of
                 linear equations, and carrying out global flow analysis
                 of computer programs. The method consists of two steps.
                 First, a collection of regular expressions representing
                 sets of paths in the graph is constructed. This can be
                 done by using any standard algorithm, such as Gaussian
                 or Gauss--Jordan elimination. Next, a natural mapping
                 from regular expressions into the given problem domain
                 is applied. The mappings required to find shortest
                 paths are exhibited, sparse systems of linear equations
                 are solved, and global flow analysis is carried out.
                 The results provide a general-purpose algorithm for
                 solving any path problem and show that the problem of
                 constructing path expressions is in some sense the most
                 general path problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques",
}

@Article{Tarjan:1981:FAS,
  author =       "Robert Endre Tarjan",
  title =        "Fast Algorithms for Solving Path Problems",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "594--614",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $G = (V, E)$ be a directed graph with a
                 distinguished source vertex $s$. The single-source path
                 expression problem is to find, for each vertex $v$, a
                 regular expression $P(s,v)$ which represents the set of
                 all paths in $G$ from $s$ to $v$. A solution to this
                 problem can be used to solve shortest path problems,
                 solve sparse systems of linear equations, and carry out
                 global flow analysis. A method is described for
                 computing path expressions by dividing $G$ into
                 components, computing path expressions on the
                 components by Gaussian elimination, and combining the
                 solutions. This method requires $O(m \alpha (m, n))$
                 time on a reducible flow graph, where $n$ is the number
                 of vertices in $G$, $m$ is the number of edges in $G$,
                 and $\alpha$ is a functional inverse of Ackermann's
                 function. The method makes use of an algorithm for
                 evaluating functions defined on paths in trees. A
                 simplified version of the algorithm, which runs in $O(m
                 \log n)$ time on reducible flow graphs, is quite easy
                 to implement and efficient in practice.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Graph Theory",
}

@Article{Yao:1981:STS,
  author =       "Andrew Chi Chih Yao",
  title =        "Should Tables Be Sorted?",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "615--628",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Optimality questions are examined in the following
                 information retrieval problem: Given a set $S$ of $n$
                 keys, store them so that queries of the form, ``Is $x$
                 an element of $S$?'' can be answered quickly. In a
                 rather general model including all the commonly used
                 schemes, the number probes to the table needed in the
                 worst case is determined, for sufficiently large key
                 space. The effects of smaller key space and arbitrary
                 encoding are also explored.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information science",
}

@Article{Reiser:1981:CMV,
  author =       "M. Reiser and S. S. Lavenberg",
  title =        "Corrigendum: ``{Mean-Value} Analysis of Closed
                 Multichain Queuing Networks''",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "3",
  pages =        "629--629",
  month =        jul,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:27:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Reiser:1980:MVA}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bibel:1981:MC,
  author =       "Wolfgang Bibel",
  title =        "On Matrices with Connections",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "633--645",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Theorem proving is considered as the problem of
                 verifying that each path through a matrix consisting of
                 a set of clauses can be made complementary. By
                 introducing connections to such a matrix the following
                 three results are derived from that conceptual basis.
                 First, a simple and short proof for the consistency and
                 completeness of the connection graph procedure is
                 given. Second, a macrosimplification rule for the
                 preparatory step of any ATP-method is defined which,
                 like the deletion or subsumption rules, properly
                 reduces a given matrix whenever it applies. It can be
                 regarded as a generalization to arbitrary clauses of
                 the well-known fact that sets of two-literal clauses
                 can be decided quickly. Finally, in view of the
                 relation between resolution-based and
                 natural-deduction-based methods, a constructive
                 transformation is specified which explicitly relates
                 each resolution step to a pair of complementary
                 literals in an axiom of a natural deduction, and vice
                 versa. Although the treatment is restricted to the
                 ground case, it is obvious that all results can be
                 easily lifted to the general case in the usual way.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "systems science and cybernetics",
}

@Article{Loveland:1981:DRG,
  author =       "D. W. Loveland and C. R. Reddy",
  title =        "Deleting Repeated Goals in the Problem Reduction
                 Format",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "646--661",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Although the classical problem reduction format for
                 organizing automatic proof search is incomplete, a
                 complete extension of the format is known. Elimination
                 of identical descendent subgoals is a well-known
                 deletion rule for the classical format but is not
                 obviously valid in the extended format. Because of its
                 intuitive appeal and ease of application, one would
                 wish to know that the rule is safe to use in the
                 extended format. It is shown here that the deletion
                 rule is indeed safe. The result appears to be decidedly
                 nontrivial.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "systems science and cybernetics",
}

@Article{Latouche:1981:AAM,
  author =       "Guy Latouche",
  title =        "Algorithmic Analysis of a
                 Multiprogramming-Multiprocessor Computer System",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "662--679",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A computer system consisting of several identical
                 CPU'S and several identical I/O units is described. The
                 system works under light load conditions in a
                 multiprogramming mode. Programs belong either to an
                 incoming queue, which may be empty, or to an inner loop
                 if they are allowed access to the resources of the
                 system. The maximum number of programs in the inner
                 loop is finite.\\
                 Under Markovian assumptions it is shown that the
                 steady-state probability distribution is of
                 matrix-geometric form. The stability condition is
                 explicitly given. For stable systems it is shown how
                 the stationary probability distribution, the virtual
                 waiting time in the incoming queue, and other features
                 of interest may be computed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  descriptors =  "Model; multiprocessor system; multiprogramming;
                 Queueing network; steady state probability; matrix
                 geometric method",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming --- Multiprogramming;
                 computer systems, digital",
}

@Article{Maier:1981:CTI,
  author =       "David Maier and Yehoshua Sagiv and Mihalis
                 Yannakakis",
  title =        "On the Complexity of Testing Implications of
                 Functional and Join Dependencies",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "680--695",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 21 15:14:47 2000",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that testing whether a dependency $\sigma$
                 is implied by a set $\Sigma$ of functional and join
                 dependencies is NP-hard if $\sigma$ is a join
                 dependency, but it requires only $O(|U| \parallel
                 \Sigma \parallel)$ time if $\sigma$ is either a
                 functional or a multivalued dependency $|U|$ is the
                 number of elements in the set of all the attributes
                 $U$, and $\parallel \Sigma \parallel$ is the space
                 required to write down $\Sigma$. It is also shown that
                 the problem of deciding whether a JD-rule can be
                 applied to a tableau $T$ and the problem of testing
                 whether a relation tau does not obey a join dependency
                 are NP-complete. Finally, it is proved that there is no
                 universal constant $n$ such that for every set of
                 multivalued dependencies $\Sigma$ and a join dependency
                 $\sigma$ that is not implied by $\Sigma$, there is a
                 relation with no more than $n$ tuples in which $\Sigma$
                 holds but $\sigma$ fails.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems; relational databases",
}

@Article{Fredman:1981:LBC,
  author =       "Michael L. Fredman",
  title =        "A Lower Bound on the Complexity of Orthogonal Range
                 Queries",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "696--705",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/81.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $S$ be an arbitrary commutative semigroup (set of
                 elements closed under a commutative and associative
                 addition operation, plus). Given a set of records with
                 $d$-dimensional key vectors over an ordered key space,
                 such that each record has associated with it a value in
                 $S$, an orthogonal range query is a request for the sum
                 of the values associated with each record in some
                 specified hypercube (cross product of intervals). Data
                 structures which accommodate insertions and deletions
                 of records and orthogonal range queries, such that an
                 arbitrary sequence of $n$ such operations takes time
                 $O(n(\log N)^d)$, have been presented by G. Lueker and
                 D. Willard. It is shown here that $\Omega (n(\log
                 n)^d)$ is a lower bound on the inherent worst case time
                 required to process a sequence of $n$ intermixed
                 insertions, deletions, and range queries, which implies
                 that the Lueker and Willard data structures are in some
                 sense optimal.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; data
                 processing",
}

@Article{Ehrenfeucht:1981:MRC,
  author =       "A. Ehrenfeucht and G. Rozenberg and K. Ruohonen",
  title =        "A Morphic Representation of Complements of Recursively
                 Enumerable Sets",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "706--714",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 21 15:14:53 2000",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "After extending two word morphisms $f$ and $g$ to
                 languages, an equation $f(X) = g(X)$ can be written and
                 its language solutions investigated. An elementary
                 characterization of the family of all solutions of the
                 equation is given, and it used to investigate the
                 maximal solution which is the main subject of this
                 paper. It turns out that going through all propagating
                 morphisms $f$ and $g$, the family of maximal solutions
                 obtained equals the family of complements of
                 recursively enumerable languages after intersecting
                 with regular languages and mapping with propagating
                 morphisms. In the general case (of arbitrary morphisms
                 $f$ and $g$) the corresponding family is larger and
                 includes the full-AFL closure of the family of
                 complements of recursively enumerable languages.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Jazayeri:1981:SCS,
  author =       "Mehdi Jazayeri",
  title =        "A Simpler Construction for Showing the Intrinsically
                 Exponential Complexity of the Circularity Problem for
                 Attribute Grammars",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "715--720",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/AG.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Dill:1989:CES}.",
  abstract =     "The recognition problem for alternating Turing
                 machines is reduced to the circularity problem for
                 attribute grammars, and thus an inherently exponential
                 lower bound for the complexity of the circularity
                 problem is derived. Although the result is already
                 known, the use of alternation allows a simpler
                 construction.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "alternating Turing machines; attribute grammars;
                 automata theory; circularity problem; computational
                 complexity; exponential time",
  note2 =        "A \'et\'e prouv\'e faux\ldots{} (mj)",
}

@Article{Davis:1981:AST,
  author =       "Ernest Davis and Jeffrey M. Jaffe",
  title =        "Algorithms for Scheduling Tasks on Unrelated
                 Processors",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "721--736",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Several algorithms are presented for the nonpreemptive
                 assignment of $n$ independent tasks to $m$ unrelated
                 processors. One algorithm requires polynomial time in
                 $n$ and $m$ and is at most $2m$ one-half times worse
                 than optimal in the worst case. This is the best
                 polynomial-time algorithm known for scheduling such
                 sets of tasks. An algorithm with slightly better worst
                 case performance requires polynomial time in $n$ but
                 exponential time in $m$. This is the best algorithm
                 known that requires time $O(n \log n)$ for every fixed
                 value of $m$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 912; 913",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; computer
                 systems, digital; operations research",
}

@Article{Gnesi:1981:DPG,
  author =       "Stefania Gnesi and Ugo Montanari and Alberto
                 Martelli",
  title =        "Dynamic Programming as Graph Searching: an Algebraic
                 Approach",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "737--751",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Finding the solution of a dynamic programming problem
                 in the form of polyadic functional equations is shown
                 to be equivalent to searching a minimal cost path in an
                 AND\slash OR graph with monotone cost functions. The
                 proof is given in an algebraic framework and is based
                 on a commutativity result between solution and
                 interpretation of a symbolic system. This approach is
                 similar to the one used by some authors to prove the
                 equivalence between the operational and denotational
                 semantics of programming languages.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming, dynamic",
}

@Article{Katoh:1981:ABS,
  author =       "N. Katoh and T. Ibaraki and H. Mine",
  title =        "An Algorithm for the ${K}$ Best Solutions of the
                 Resource Allocation Problem",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "752--764",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:54:08 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm is presented for obtaining the K best
                 solutions of the resource allocation problem with an
                 objective function which is the sum of convex functions
                 of one variable. It requires $O(T* + K\log K + K(n \log
                 n))^{1/2}$ time and $O(K(n \log n)^{1/2} + n)$ space,
                 where $n$ is the number of variables and $T*$ is the
                 computational time to obtain the best solution.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Subroutines; operations
                 research",
}

@Article{Papadimitriou:1981:CIP,
  author =       "Christos H. Papadimitriou",
  title =        "On the Complexity of Integer Programming",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "765--768",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A simple proof that integer programming is in NP is
                 given. The proof also establishes that there is a
                 pseudopolynomial-time algorithm for integer programming
                 with any (fixed) number of constraints.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "integer programming; mathematical programming",
}

@Article{Shostak:1981:DLI,
  author =       "Robert Shostak",
  title =        "Deciding Linear Inequalities by Computing Loop
                 Residues",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "769--779",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/Constr.logic.prog.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "V. R. Pratt has shown that the real and integer
                 feasibility of sets of linear inequalities of the form
                 $x \leq 20 \leq y + c$ can be decided quickly by
                 examining the loops in certain graphs. Pratt's method
                 is generalized, first to real feasibility of
                 inequalities in two variables and arbitrary
                 coefficients, and ultimately to real feasibility of
                 arbitrary sets of linear inequalities. The method is
                 well suited to applications in program verification.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; program verification",
}

@Article{Yao:1981:LBF,
  author =       "Andrew Chi-Chih Yao",
  title =        "A Lower Bound to Finding Convex Hulls",
  journal =      j-J-ACM,
  volume =       "28",
  number =       "4",
  pages =        "780--787",
  month =        oct,
  year =         "1981",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/81.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Given a set $S$ of $n$ distinct points, the convex
                 hull problem is to determine the vertices of the convex
                 hull H(S). All the known algorithms for solving this
                 problem have a worst case running time of $cn \log n$
                 or higher and employ only quadratic tests, that is,
                 tests of the form $f(x_0, y_0, x_1, y_1, \ldots{},
                 x_{n- 1}, y_{n-1}):O$, where $f$ is any polynomial of
                 degree not exceeding $2$. It is shown here that any
                 algorithm in the quadratic decision-tree model must
                 make $cn \log n$ tests for some input.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Ernst:1982:MDC,
  author =       "George W. Ernst and Michael M. Goldstein",
  title =        "Mechanical Discovery of Classes of Problem-Solving
                 Strategies",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "1--23",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/Learning.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is assumed that a problem-solving method has an
                 applicability condition which specifies the properties
                 of ``good'' problem-dependent parameters for the
                 method. Such a condition is used as the basis of a
                 computer program that mechanically generates good
                 parameters for the method to use in solving the
                 problem. Such problem-dependent parameters for a method
                 constitute a problem-solving strategy. To show the
                 feasibility of this approach, it is used on two
                 different methods: the GPS method for solving problems
                 and the Nim-like method for playing games.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; systems science and
                 cybernetics",
}

@Article{Freuder:1982:SCB,
  author =       "Eugene C. Freuder",
  title =        "A Sufficient Condition of Backtrack-Free Search",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "24--32",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/Reverse.eng.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A constraint satisfaction problem involves finding
                 values for a set of variables subject to a set of
                 constraints (relations) on those variables. Backtrack
                 search is often used to solve such problems. A
                 relationship involving the structure of the constraints
                 is described which characterizes to some degree the
                 extreme case of minimum backtracking (none). The
                 relationship involves a concept called ``width,'' which
                 may provide some guidance in the representation of
                 constraint satisfaction problems and the order in which
                 they are searched. The width concept is studied and
                 applied, in particular, to constraints which form tree
                 structures.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "graph coloring related algorithms; systems science and
                 cybernetics",
}

@Article{McDermott:1982:NLI,
  author =       "Drew McDermott",
  title =        "Nonmonotonic Logic {II}: {Nonmonotonic} Modal
                 Theories",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "33--57",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Oct 24 23:50:43 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "prolog",
}

@Article{Becker:1982:SAM,
  author =       "Ronald I. Becker and Stephen R. Schach and Yehoshua
                 Perl",
  title =        "A Shifting Algorithm for Min-Max Tree Partitioning",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "58--67",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:54:15 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of finding a min-max partition of a
                 weighted tree $T$ with $n$ vertices into $q$ subtrees
                 by means of $k = q -1 1$ cuts is considered. A top-down
                 shifting algorithm for this problem is presented. An
                 outline is given of an efficient implementation of the
                 algorithm with complexity $O(k^3rd(T) + kn)$, where
                 $rd(T)$ is the number of edges in the radius of $T$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Trees; min-max tree partitioning; shifting algorithm",
}

@Article{Hoffmann:1982:PMT,
  author =       "Christoph M. Hoffmann and Michael J. O'Donnell",
  title =        "Pattern Matching in Trees",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "68--95",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/algebraic.spec.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Five new techniques for tree pattern matching are
                 presented, analyzed for time and space complexity, and
                 compared with previously known methods. Particularly
                 important are applications where the same patterns are
                 matched against many subjects and where a subject may
                 be modified incrementally. Therefore, methods which
                 spend some time preprocessing patterns in order to
                 improve the actual matching time are included.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; functional; mathematical
                 techniques --- Trees; pattern matching",
}

@Article{Galil:1982:ALT,
  author =       "Zvi Galil",
  title =        "An Almost Linear-Time Algorithm for Computing a
                 Dependency Basis in a Relational Database",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "96--102",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Oct 24 23:52:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sagiv:1982:SDC,
  author =       "Yehoshua Sagiv and Scott F. Walecka",
  title =        "Subset Dependencies and a Completeness Result for a
                 Subclass of Embedded Multivalued Dependencies",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "103--117",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/handbook.prob.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that embedded multivalued dependencies do
                 not have a complete axiomatization. A new type of
                 dependencies, called subset dependencies, is
                 introduced. Subset dependencies are a generalization of
                 embedded multivalued dependencies. It is shown that a
                 subclass of subset dependencies (that does not include
                 all the embedded multivalued dependencies) has a
                 complete axiomatization consisting of reflexivity and
                 transitivity rules. As a result, it is shown how to
                 test implications of embedded multivalued dependencies
                 under some restricted conditions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems",
}

@Article{Maurer:1982:DHG,
  author =       "H. A. Maurer and A. Salomaa and D. Wood",
  title =        "Dense Hierarchies of Grammatical Families",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "118--126",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A technique is presented for constructing dense
                 hierarchies of grammatical subfamilies of context-free
                 languages. The question of ``where'' such dense
                 hierarchies may lie is also investigated. Infinite
                 hierarchies of successors are studied. The major open
                 problems concern questions dealing with finite grammar
                 forms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Chow:1982:CFQ,
  author =       "D. Chow and C. T. Yu",
  title =        "On the Construction of Feedback Queries",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "127--151",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/bibdb.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Optimal feedback queries in information retrieval
                 systems are constructed. An optimal retrieval rule is
                 derived using the Neyman--Pearson decision rule. Three
                 probabilistic models and the optimal queries to be used
                 in the models are presented. Parameters which are
                 required to construct these queries are estimated on
                 the basis of relevance information from the user about
                 the retrieved documents. Finally, the effects on
                 retrieval performance of deleting a term from the
                 optimal query in one of the three models are
                 analyzed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "feedback queries; information science",
}

@Article{Yu:1982:TWI,
  author =       "C. T. Yu and K. Lam and G. Salton",
  title =        "Term Weighting in Information Retrieval Using the Term
                 Precision Model",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "152--170",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/bibdb.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is known that the use of weighted, as opposed to
                 binary, content identifiers attached to the records of
                 an information file improves the effectiveness of the
                 retrieval operations. Under well-defined conditions the
                 term precision offers the best possible term weighting
                 system. A mathematical model is used in the present
                 study to relate the term precision weights to the
                 frequency of occurrence of the terms in a given
                 document collection and to the number of relevant
                 documents a user wishes to retrieve in response to a
                 query. This provides for the assignment of
                 user-dependent weights to the content identifiers and
                 relates the term precision weights to other well-known
                 term weighting systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A mathematical model is used to relate the term
                 precision weights to the frequency of occurrence of the
                 terms in a given document collection and to the number
                 of relevant documents a user wishes to retrieve in
                 response to a query.",
  classification = "723; 901",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "information science",
  notes =        "H.3.1.RM.PR and",
}

@Article{Book:1982:COT,
  author =       "Ronald V. Book",
  title =        "Confluent and Other Types of {Thue} Systems",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "171--182",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Confluent and other types of finite Thue systems are
                 studied. Sufficient conditions are developed for every
                 congruence class and every finite union of congruence
                 classes defined by such a system to be a deterministic
                 context-free language. It is shown that the word
                 problem for Church--Rosser systems is decidable in
                 linear time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Burns:1982:DRI,
  author =       "James E. Burns and Paul Jackson and Nancy A. Lynch and
                 Michael J. Fischer and Gary L. Peterson",
  title =        "Data Requirements for Implementation of ${N}$-Process
                 Mutual Exclusion Using a Single Shared Variable",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "183--205",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An analysis is made of the shared memory requirements
                 for implementing mutual exclusion of $N$ asynchronous
                 parallel processes in a model where the only primitive
                 communication mechanism is a general test-and-set
                 operation on a single shared variable. While two
                 variable values suffice to implement simple mutual
                 exclusion without deadlock, it is shown that any
                 solution which avoids possible lockout of processes
                 requires at least $(2 N)^{1/2} + 1/2$ values. A
                 technical restriction on the model increases this
                 requirement to $N / 2$ values, while achieving a fixed
                 bound on waiting further increases the requirement to
                 $N + 1$ values. These bounds are shown to be nearly
                 optimal.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer systems, digital
                 --- Parallel Processing",
}

@Article{Ehrich:1982:TSI,
  author =       "H.-D. Ehrich",
  title =        "On the Theory of Specification, Implementation, and
                 Parametrization of Abstract Data Types",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "206--227",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/algebraic.spec.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In the framework of a category spec of equational
                 specifications of abstract data types, implementations
                 are defined to be certain pairs of morphisms with a
                 common target. This concept covers, among others,
                 arbitrary recursion schemes for defining the derived
                 operations. It is shown that for given single steps of
                 a multilevel implementation, there is always a
                 multilevel implementation composed of these steps, but
                 there is no effective construction of this overall
                 implementation. Some suggestions are given for
                 practical composition of implementations utilizing
                 pushouts. Parametric specifications and parameter
                 assignments are defined to be special morphisms in
                 spec, and parameter substitution is made precise by
                 means of pushouts.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages",
}

@Article{Hunt:1982:CFL,
  author =       "H. B. {Hunt, III}",
  title =        "On the Complexity of Flowchart and Loop Program
                 Schemes and Programming Languages",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "228--249",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Uniform NP-hard and PSPACE-hard lower bounds are
                 presented for problems for various classes of flowchart
                 and loop program schemes and programming languages.
                 These lower bounds hold for the isomorphism, strong
                 equivalence, containment, weak equivalence, totality,
                 divergence, and executability problems. These lower
                 bounds hold for any reasonably nontrivial flowchart and
                 loop programming language.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; computer programming languages
                 --- Theory",
}

@Article{Fredman:1982:CMA,
  author =       "Michael L. Fredman",
  title =        "The Complexity of Maintaining an Array and Computing
                 Its Partial Sums",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "250--260",
  month =        jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 09:57:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rackoff:1982:RQI,
  author =       "Charles Rackoff",
  title =        "Relativized Questions Involving Probabilistic
                 Algorithms",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "1",
  pages =        "261--268",
  month =        Jan,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Oct 24 23:58:54 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Rackoff attempts to prove $R \not = P$ by assuming $P
                 \not = NP$ and relativization (i.e., for a class of
                 languages $C$, $C^A$ is the same as $C$ except that one
                 can answer questions concerning membership in $A$ in
                 constant time). Interestingly, he proves that for some
                 oracle A, $P^A \not = NP^A$ and $R^A \not = P^A$, and
                 at the same time, for some other oracle $B$,
                 $P^B\not=NP^B$ and $R^B \not = P^B$. An earlier version
                 of this paper appeared in {\em Proc. 10th Ann. ACM
                 Symp. on Theory of Computing}, 1978, pp. 338--342.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Winker:1982:GVF,
  author =       "Steve Winker",
  title =        "Generation and Verification of Finite Models and
                 Counterexamples Using an Automated Theorem Prover
                 Answering Two Open Questions",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "273--284",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:00:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Papadimitriou:1982:CRS,
  author =       "Christos H. Papadimitriou and Mihalis Yannakakis",
  title =        "The Complexity of Restricted Spanning Tree Problems",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "285--309",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:01:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jacobs:1982:DL,
  author =       "Barry E. Jacobs",
  title =        "On Database Logic",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "310--332",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:01:25 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Database logic is a proposed theory which can serve
                 the relational, hierarchical, and network approaches as
                 first-order logic serves the relational approach. The
                 key definitions for database logic are established.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lien:1982:EDM,
  author =       "Y. Edmund Lien",
  title =        "On the Equivalence of Database Models",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "333--362",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:02:20 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/gesturing.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sadri:1982:TDL,
  author =       "Fereidoon Sadri and Jeffrey D. Ullman",
  title =        "Template Dependencies: a Large Class of Dependencies
                 in Relational Databases and Its Complete
                 Axiomatization",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "363--372",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:03:13 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Relational database theory has discovered complete
                 axiomatizations for functional and multivalued
                 dependencies. A database design system based on
                 dependencies must deal with some more general kinds of
                 dependencies; at least with embedded multivalued
                 dependencies.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sciore:1982:CAF,
  author =       "Edward Sciore",
  title =        "A Complete Axiomatization of Full Join Dependencies",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "373--393",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:03:44 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "join dependencies, chase procedure.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sethi:1982:UAM,
  author =       "Ravi Sethi",
  title =        "Useless Actions Make a Difference: {Strict}
                 Serializability of Database Updates",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "394--403",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "When several transactions read and write items in a
                 database, the question of consistency of the database
                 arises. Consistency is maintained if transactions are
                 serial: the read and write actions of a transaction
                 execute completely before the actions of the next
                 transaction begin. A particular history of interleaved
                 read and write actions belonging to several
                 transactions is correct if it is equivalent to a serial
                 history. Since serializability of histories is known to
                 be NP-complete, subclasses of serializable histories
                 have been studied. One such class consists of histories
                 serializable in a strict sense; transactions that are
                 already in serial in a history must remain in the same
                 relative order. When there are no useless actions in a
                 history, it is shown that strict serializability can be
                 determined in polynomial time. If useless actions are
                 permitted, then strict serializability becomes
                 NP-complete. The results apply to two-step transactions
                 in which there is a read step followed by a write step.
                 Each step involves some subset of the items in the
                 database. With multistep transactions strict
                 serializability is NP-complete even if there are no
                 useless actions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "NP completeness in 2-phase protocols.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems",
}

@Article{Bader:1982:GOL,
  author =       "Christopher Bader and Arnaldo Moura",
  title =        "A Generalization of {Ogden}'s Lemma",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "404--406",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:05:01 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cohen:1982:UBS,
  author =       "Jacques Cohen and Timothy Hickey and Joel Katcoff",
  title =        "Upper Bounds for Speedup in Parallel Parsing",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "408--428",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:07:46 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hunt:1982:DGP,
  author =       "H. B. {Hunt, III}",
  title =        "On the Decidability of Grammar Problems",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "429--447",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brown:1982:DCR,
  author =       "Theodore Brown",
  title =        "Determination of the Conditional Response for Quantum
                 Allocation Algorithms",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "448--460",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An analytic-numeric procedure for finding the response
                 time for a given job size ( ``conditional response'')
                 is demonstrated for a wide class of quanta-of-service
                 allocation disciplines. The procedure is demonstrated
                 for a discipline that is like standard round robin
                 except that the queue of waiting jobs is ordered by the
                 number of services previously received.
                 Laplace--Stieltjes transforms (LST) are found for this
                 ``ordered round robin'' for an M/G/1 queue allowing
                 allocation of nonidentical quanta of service for a job.
                 The derivation of the mean is shown explicitly, and
                 higher moments can be derived by differentiation of the
                 LST. The mean conditional response is found for the
                 steady state, and it is shown that the method is
                 capable as well of determining the mean conditional
                 response under specified initial conditions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer programming ---
                 Subroutines; probability --- Queueing Theory",
}

@Article{Bryant:1982:MPR,
  author =       "R. M. Bryant",
  title =        "Maximum Processing Rates of Memory Bound Systems",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "461--477",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Existing methods of determining maximum processing
                 rates for multiresource queuing systems are limited to
                 small memory sizes because problem complexity grows
                 exponentially with increasing memory size. By
                 restricting attention to a particular scheduling
                 discipline (first-come-first-loaded or FCFL) and
                 treating memory as the limiting resource, methods of
                 calculating maximum processing rates of memory bound
                 systems for realistic main memory sizes are derived.
                 The distribution of the number of jobs loaded under the
                 FCFL policy is given in terms of a convolution of the
                 memory request size distribution. The time averaged
                 behavior of the number of loaded jobs is also found.
                 Finally, the framework is extended to allow multiple
                 job classes in the input stream. The results of this
                 approach allow one to estimate main memory size
                 requirements from a workload characterization given in
                 terms of arrival rate, memory size distribution, and
                 CPU service rate.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; probability --- Queueing
                 Theory",
}

@Article{Kameda:1982:FSQ,
  author =       "Hisao Kameda",
  title =        "A Finite-Source Queue with Different Customers",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "478--491",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1982.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A finite-source queuing model (sometimes called the
                 finite-population, machine interference, or
                 machine-repairman model), which has often been used in
                 analyzing time-sharing systems and multiprogrammed
                 computer systems, is investigated. The model studied
                 has two service stations, a processor (single server)
                 and peripherals (infinite server), and a finite number
                 of customers (or jobs) that have a distinct service
                 rate at the processor. The model is in equilibrium. It
                 is shown that the utilization factor of the processor
                 can be obtained in an analytic form and is independent
                 of various scheduling disciplines employed at the
                 processor, such as FCFS, generalized processor sharing,
                 preemptive (resume) and nonpreemptive priority
                 disciplines, under some condition. Other relevant
                 properties of this model are also shown. The range
                 within which these properties hold is discussed, and
                 some examples are given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A finite-source queueing model, which has often been
                 used in analyzing time-sharing sytems and
                 multiprogrammed computer system $s$, is investigated.
                 The model studied here has two service stations, a
                 processor (single server) and peripherals (infinite
                 server), and a finite number of customers (or jobs)
                 that have a distinct service rate at the processor. The
                 model is in equilibrium. it is shown that the
                 utilization factor of the processor can be \ldots{}.",
  classification = "723; 922",
  descriptors =  "Time sharing; model; multiprogramming; processor
                 sharing; FIFO; priority; finite source",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; probability --- Queueing
                 Theory",
}

@Article{Lam:1982:DSG,
  author =       "Simon S. Lam",
  title =        "Dynamic Scaling and Growth Behavior of Queuing Network
                 Normalization Constants",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "492--513",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1982.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A simple dynamic scaling technique is shown that
                 avoids both the overflow and underflow problems that
                 are often encountered in the evaluation of
                 normalization constants of closed product-form queuing
                 networks. With dynamic scaling, normalization constants
                 for very large routing chain population sizes can be
                 evaluated within the bounds of a relatively small range
                 of numbers. It is shown that the product-form solution
                 possesses a local balance property and the M implies M
                 property with respect to routing chains. The
                 relationships between normalization constants of closed
                 networks and certain equilibrium aggregate state
                 probabilities in networks that permit external arrivals
                 and departures are examined. The growth behavior of
                 normalization constants is shown to be modeled by a
                 birth-death process traversing over the set of chain
                 population vectors.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A simple dynamic scaling technique is shown that
                 avoids both the overflow and underflow problems that
                 are often encountered in the evaluation of
                 normalization constants of closed product-form queueing
                 networks. \ldots{}",
  classification = "723; 922",
  descriptors =  "Queueing network; Poisson distribution; output
                 process; product form; network; normalization constant;
                 numerical evaluation; local balance",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; probability --- Queueing
                 Theory",
}

@Article{Ruschitzka:1982:PJC,
  author =       "Manfred Ruschitzka",
  title =        "The Performance of Job Classes with Distinct Policy
                 Functions",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "514--526",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1982.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Policy function schedulers provide a flexible
                 framework for specifying the response behavior of a
                 system. The latter is often expressed in terms of a
                 response function, the equilibrium residence time of a
                 job conditioned on its service requirement. Jobs of
                 different classes typically require different responses
                 and thus different policy functions. The relation
                 between a set of policy functions (one per class) and
                 the resulting set of response functions is derived for
                 processor-sharing M/G/1 systems and a large variety of
                 policy function shapes. Given a set of desirable
                 response functions, this relation may be used to solve
                 the performance synthesis problem. Two types of class
                 notions, one with and one without preemption based on
                 externally assigned priorities, are considered. Plots
                 of corresponding sets of policy and response functions
                 are displayed for specific examples, and the
                 differences caused by the two class types are
                 discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Policy function schedulers provide a flexible
                 framework for specifying the response behavior of a
                 system. The latter is often expressed in terms of a
                 response function, the equilibrium residence time of a
                 job conditioned on its service requirement. Jobs of
                 different classes typically require different responses
                 and thus different policy functions. The relation
                 between a set of policy functions (one per class) and
                 the resulting set of response \ldots{}.",
  classification = "723; 922",
  descriptors =  "M/G/1; processor sharing; time in system; priority;
                 queueing discipline; policy function",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; probability --- Queueing
                 Theory",
}

@Article{Tzelnic:1982:APB,
  author =       "Percy Tzelnic and Izidor Gertner",
  title =        "An Approach to Program Behavior Modeling and Optimal
                 Memory Control",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "525--554",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:12:22 1994",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new technique is proposed for analyzing models of
                 (paged) virtual memory management. This technique,
                 which is based on recent developments in the theory of
                 optimal control, permits the use of a very general
                 model of program behavior. A general jump stochastic
                 process is used to describe the page reference
                 generator. A model of memory management is formally
                 defined as three component processes: the program
                 behavior, the memory allocation, and the control
                 process. Equations linking the evolution of the memory
                 allocation process with the other two processes are
                 derived. Necessary and sufficient conditions for an
                 optimal control policy are given as a set of optimality
                 equations. An analytic solution is presented for the
                 case of stationary ranking of pages. The equations of
                 motion of the memory allocation process are used in
                 applications where the performance of a given control
                 policy is to be assessed for specified program
                 behavior. Another use of the proposed technique is the
                 formulation of a Markov phase behavior model.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 731",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; control systems, optimal
                 --- Theory",
}

@Article{Meyer:1982:ADP,
  author =       "Albert R. Meyer and Joseph Y. Halpern",
  title =        "Axiomatic Definitions of Programming Languages: a
                 Theoretical Assessment",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "555--576",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:15:39 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arbib:1982:PCE,
  author =       "Michael A. Arbib and Ernest G. Manes",
  title =        "The Pattern-of-Calls Expansion Is the Canonical
                 Fixpoint for Recursive Definitions",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "2",
  pages =        "577--602",
  month =        apr,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:16:02 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "functional",
}

@Article{Floyd:1982:CRE,
  author =       "Robert W. Floyd and Jeffrey D. Ullman",
  title =        "The Compilation of Regular Expressions into Integrated
                 Circuits",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "603--622",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The design of integrated circuits to implement
                 arbitrary regular expressions is considered. In
                 general, a regular expression with $n$ operands may be
                 converted into a nondeterministic finite automaton with
                 at most $n$ states and $n$ transitions. Instead of
                 converting the nondeterministic device to a
                 deterministic one, two ways of implementing the
                 nondeterministic device directly are proposed. One
                 approach is to produce a PLA (programmable logic array)
                 of approximate dimensions $n$ rows and $2n$ columns by
                 representing the states of the nondeterministic finite
                 automaton directly by columns. Another approach is to
                 use the hierarchical structure of the automaton
                 produced from the regular expression by the
                 McNaughton--Yamada algorithm to guide a hierarchical
                 layout of the circuit. The advantages of each approach
                 are discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "713; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automatic layout; integrated circuits",
}

@Article{Takamizawa:1982:LTC,
  author =       "K. Takamizawa and T. Nishizeki and N. Saito",
  title =        "Linear-Time Computability of Combinatorial Problems in
                 Series-Parallel Graphs",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "623--641",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A series --- parallel graph can be constructed from a
                 certain graph by recursively applying ``series'' and
                 ``parallel'' connections. The class of such graphs,
                 which is a well-known model of series --- parallel
                 electrical networks, is a subclass of planar graphs. It
                 is shown in a unified manner that there exist
                 linear-time algorithms for many combinatorial problems
                 if an input graph is restricted to the class of series
                 --- parallel graphs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Nassimi:1982:PPS,
  author =       "David Nassimi and Sartaj Sahni",
  title =        "Parallel Permutation and Sorting Algorithms and a New
                 Generalized Connection Network",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "642--667",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/322326.322329",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "$O(k \log N)$ algorithms are obtained to permute and
                 sort $N$ data items on cube and perfect shuffle
                 computers with $N^{1 + 1 / k}$ processing elements, $1
                 \leq k \leq \log N$. These algorithms lead directly to
                 a generalized connection-network construction having
                 $O(k \log N)$ delay and $O(k N^{1 + 1 / k} \log N)$
                 contact pairs. This network has the advantage that the
                 switches can be set in $O(k \log N)$ time by either a
                 cube or perfect shuffle computer with $N^{1 + 1 / k}$
                 processing elements.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer architecture; computer programming ---
                 Subroutines",
}

@Article{Honeyman:1982:TSF,
  author =       "Peter Honeyman",
  title =        "Testing Satisfaction of Functional Dependencies",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "668--677",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Determining whether a single relation satisfies a set
                 of functional dependencies is a straightforward task.
                 However, determining whether a set of relations
                 satisfies a set of functional dependencies is a more
                 difficult problem. Even the meaning of this notion of
                 ``satisfaction'' needs to be settled. Several
                 definitions for satisfaction are considered, one of
                 which is determined to be most sound. This definition
                 requires that one can construct a single relation that
                 satisfies the dependencies while containing all of the
                 information in the set of relations. A polynomial-time
                 algorithm is then developed to test satisfaction using
                 this definition.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems",
}

@Article{Ginsburg:1982:PFD,
  author =       "Seymour Ginsburg and Sami Mohammed Zaiddan",
  title =        "Properties of Functional-Dependency Families",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "678--698",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A functional-dependency (FD-) family is defined here
                 as the family of all instances satisfying a set of
                 functional dependencies. These families are studied
                 with respect to projection, join, and decomposition and
                 their connection with generating families and
                 generators. Typical results obtained are: (i) a
                 characterization for when the projection of an
                 FD-family is an FD-family; (ii) a characterization for
                 when the join of two FD-families is an FD-family; (iii)
                 a necessary and sufficient condition for an FD-family
                 to be decomposable; and (iv) that every domain-infinite
                 FD-family has a generator.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems",
}

@Article{Klug:1982:ERA,
  author =       "Anthony Klug",
  title =        "Equivalence of Relational Algebra and Relational
                 Calculus Query Languages Having Aggregate Functions",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "699--717",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Aggregate functions in relational query languages
                 allow intricate reports to be written. In this paper
                 aggregate functions are precisely defined. The
                 definition does not use the notion of `duplicates'.
                 Relational algebra and relational calculus are extended
                 in a general and natural fashion to include aggregate
                 functions. It is shown that the languages so extended
                 have equivalent expressive power.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Aggregate functions are precisely defined. Relational
                 algebra and relational calculus are extended in a
                 general and natural fashion to include aggregate
                 functions.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems; database query optimization",
}

@Article{Yannakakis:1982:TSL,
  author =       "Mihalis Yannakakis",
  title =        "A Theory of Safe Locking Policies in Database
                 Systems",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "718--740",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "When several transactions access (read and update) the
                 same database concurrently, there must be some kind of
                 coordination to ensure that all transactions receive a
                 consistent view of the data. Such coordination is
                 usually achieved by locking the transactions according
                 to some locking policy. A locking policy that
                 guarantees the preservation of consistency of the
                 database is called safe. Necessary and sufficient
                 conditions are found for a locking policy to be safe,
                 but it is shown that in general it is NP-complete to
                 test for these conditions. However, when the database
                 has a given structure, a simple set of rules which is
                 sufficient for safety and, moreover, necessary for a
                 wide class of natural locking policies is developed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Necessary and sufficient conditions are found for a
                 locking policy to be safe, in general it is NP-complete
                 to test for these conditions. However, when the
                 database has a given structure a simple set of rules
                 which is sufficient for safety and, moreover, necessary
                 for a wide class of natural locking policies is
                 developed. Concurrency and deadlock avoidance --- 2
                 phase and hierarchical locks.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data base systems",
}

@Article{Angluin:1982:IRL,
  author =       "Dana Angluin",
  title =        "Inference of Reversible Languages",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "741--765",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:22:14 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gabow:1982:ALA,
  author =       "Harold N. Gabow",
  title =        "An Almost-Linear Algorithm for Two-Processor
                 Scheduling",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "766--780",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A well-known problem in scheduling theory is to
                 execute $n$ unit-length jobs subject to precedence
                 constraints on two processors in minimum finish time.
                 Previous algorithms begin by finding the transitive
                 closure of the precedence dag and so use time $O(\min(e
                 n, n^{2.61}))$. An $O(e + n \alpha (n))$ algorithm is
                 presented which is based on the idea of a
                 ``highest-level-first'' (HLF) schedule. Such a schedule
                 always executes nodes on the longest paths of the
                 precedence dag. An HLF schedule is guaranteed to be
                 optimum and can be constructed efficiently.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer programming ---
                 Subroutines",
}

@Article{Lloyd:1982:CPS,
  author =       "Errol L. Lloyd",
  title =        "Critical Path Scheduling with Resource and Processor
                 Constraints",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "781--811",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An investigation is made of the worst-case performance
                 of two related algorithms for scheduling
                 unit-execution-time task systems with resources. Unlike
                 most previous scheduling results for task systems with
                 resources, it is assumed that there are a fixed number
                 of processors in the system. This assumption has both
                 practical and theoretical interest. An upper bound is
                 given for the worst-case performance of critical path
                 scheduling for these task systems. This bound depends
                 on both the number of processors and the number of
                 resources. Moreover, it is shown that this is
                 (asymptotically) the best possible upper bound. It is
                 also noted that exactly the same bound holds for the
                 worst-case performance of Coffman --- Graham
                 scheduling.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer programming ---
                 Subroutines",
}

@Article{Martel:1982:PSR,
  author =       "Charles Martel",
  title =        "Preemptive Scheduling with Release Times, Deadlines,
                 and Due Times",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "812--829",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Given $n$ jobs, each of which has a release time, a
                 deadline, and a processing requirement, the problem of
                 determining whether there exists a preemptive schedule
                 on $m$ uniform machines which completes each job in the
                 time interval between its release time and its deadline
                 is examined. An $O(m^2n^4+n^5)$ algorithm is presented
                 which uses a generalization of network flow techniques
                 to construct such a schedule whenever one exists. This
                 algorithm is then used with search techniques to find a
                 schedule which minimizes maximum lateness.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer programming ---
                 Subroutines",
}

@Article{Samelson:1982:NPF,
  author =       "Christopher L. Samelson and William G. Bulgren",
  title =        "A Note on Product-Form Solution for Queuing Networks
                 with {Poisson} Arrivals and General Service-Time
                 Distributions with Finite Means",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "830--840",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1982.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The steady-state joint probability distribution of
                 queue lengths is obtained for queuing networks with
                 Poisson arrivals in which some of the service-time
                 distribution functions are general (e.g., not even
                 differentiable). In particular, an analytical model for
                 queuing networks which is more general than those
                 considered to date is produced by using the concept of
                 generalized function. Previous results on the
                 relationships between the properties of queuing
                 discipline, product form, and local balance can be
                 shown to hold in this more general setting.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The steady-state joint probability distribution of
                 queue lengths is obtained for queuing networks with
                 Poisson arrivals in which some of the service-time
                 distribution functions are general (e.g., not even
                 differentiable). In particular, an analytical model for
                 queuing networks which is more general than those
                 considered to date is produced by using the concept of
                 generalized function. Previous results on the
                 relationships between the properties\ldots{}",
  classification = "723; 922",
  descriptors =  "Queueing network; product form; network; local
                 balance",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; probability --- Queueing
                 Theory",
}

@Article{Apt:1982:CTL,
  author =       "Krzysztof R. Apt and M. H. {Van Emden}",
  title =        "Contributions to the Theory of Logic Programming",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "841--862",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:24:52 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/constr.logic.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "foundations; negation; prolog; SLD resolution",
}

@Article{Gurari:1982:TWC,
  author =       "Eitan M. Gurari and Oscar H. Ibarra",
  title =        "Two-Way Counter Machines and {Diophantine} Equations",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "863--873",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Math/hilbert10.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $Q$ be the class of deterministic two-way
                 1-counter machines accepting only bounded languages.
                 Each machine in $Q$ has the property that in every
                 accepting computation, the counter makes at most a
                 fixed number of reversals. It is shown that the
                 emptiness problem for $Q$ is decidable. When the
                 counter is unrestricted or the machine is provided with
                 two reversal-bounded counters, the emptiness problem
                 becomes undecidable. The decidability of the emptiness
                 problem for $Q$ is useful in proving the solvability of
                 some number-theoretic problems. It can also be used to
                 prove that a certain language cannot be accepted by any
                 machine in $Q$ ($u_1$ and $u_2$ are distinct
                 symbols).",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Jerrum:1982:SEC,
  author =       "Mark Jerrum and Marc Snir",
  title =        "Some Exact Complexity Results for Straight-Line
                 Computations over Semirings",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "874--897",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of computing polynomials in certain
                 semirings is considered. Precise bounds are obtained on
                 the number of multiplications required by straight-line
                 algorithms which compute such functions as iterated
                 matrix multiplication, iterated convolution, and
                 permanent. Using these bounds, it is shown that the use
                 of branching can exponentially speed up computations
                 using the min, plus operations, and that subtraction
                 can exponentially speed up arithmetic computations.
                 These results can be interpreted as denying the
                 existence of fast ``universal'' algorithms for
                 computing certain polynomials.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; mathematical techniques ---
                 Polynomials",
}

@Article{Yao:1982:PCK,
  author =       "Andrew Chi Chih Yao",
  title =        "On Parallel Computation for the Knapsack Problem",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "898--903",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The complexity of solving the knapsack problem with
                 $n$ input real numbers on a parallel computer with real
                 arithmetic and branching operations is considered. A
                 time--processor trade-off constraint is derived; in
                 particular, it is shown that an exponential number of
                 processors have to be used if the problem is to be
                 solved in time $t \leq \sqrt{n^{1/2}/2}$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; knapsack problem",
}

@Article{Brent:1982:CAT,
  author =       "R. P. Brent and H. T. Kung",
  title =        "Corrigendum: ``{The} Area-Time Complexity of Binary
                 Multiplication''",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "904--904",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Nov 19 23:27:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Brent:1981:ATC}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Tobagi:1982:DPD,
  author =       "Fouad A. Tobagi",
  title =        "Distributions of Packet Delay and Interdeparture Time
                 in Slotted {ALOHA} and Carrier Sense Multiple Access",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "3",
  pages =        "907--927",
  month =        jul,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:29:55 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1982.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Packet communication systems of the multiaccess\slash
                 broadcast type, in which all communicating devices
                 share a common channel that is multiaccessed in some
                 random fashion, are considered. Among the various
                 multiaccess schemes known, two prominent ones are
                 considered: slotted Aloha and Carrier Sense Multiple
                 Access (CSMA)\ldots{} Unfortunately, average
                 performance is not adequate when designing
                 communication systems intended for real-time \ldots{}",
  descriptors =  "Distribution; time in system; interdeparture time;
                 communication network; TDMA=time division multiple
                 access; broadcast; communication; slotted ALOHA;
                 CSMA=carrier sense multiple access",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Storer:1982:DCT,
  author =       "James A. Storer and Thomas G. Szymanski",
  title =        "Data Compression via Textual Substitution",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "928--951",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 01 09:59:15 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fagin:1982:HCD,
  author =       "Ronald Fagin",
  title =        "{Horn} Clauses and Database Dependencies",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "952--985",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:31:26 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Grant:1982:FGD,
  author =       "John Grant and Barry E. Jacobs",
  title =        "On the Family of Generalized Dependency Constraints",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "986--997",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:32:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Papadimitriou:1982:TDC,
  author =       "Christos H. Papadimitriou",
  title =        "A Theorem in Database Concurrency Control",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "998--1006",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 1 10:04:43 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Papadimitriou:1985:CTD}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Consider two straight-line programs $A$ and $B$, and
                 let $H$ be a set of sequences of steps $A$ and $B$,
                 possibly interleaved, but each containing all steps of
                 $A$ and $B$ in the right order; a necessary and
                 sufficient condition is given for $H$ to be realizable
                 as the set of all sequences of steps that are legal
                 under some insertion of lock-unlock steps between the
                 steps of $A$ and $B$.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Beatty:1982:RBL,
  author =       "John C. Beatty",
  title =        "On the Relationship Between the {LL(1)} and {LR(1)}
                 Grammars",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "1007--1022",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:33:51 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Minoura:1982:DAR,
  author =       "Toshimi Minoura",
  title =        "Deadlock Avoidance Revisited",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "1023--1048",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Feb 24 09:34:55 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The algorithms mentioned are Havender (fixed ordering
                 of resources), Modified Havender (dynamical ordering of
                 resources), Habermann (do not let a process in
                 execution unless all the resources are available), and
                 Modfied Habermann (based on more localized resource
                 claim). An extended model with multiple resources is
                 introduced as well.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stark:1982:SPS,
  author =       "Eugene W. Stark",
  title =        "Semaphore Primitives and Starvation-Free Mutual
                 Exclusion",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "1049--1072",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:34:57 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldschlager:1982:UIP,
  author =       "Leslie M. Goldschlager",
  title =        "A Universal Interconnection Pattern for Parallel
                 Computers",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "1073--1086",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:36:13 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lengauer:1982:ATB,
  author =       "Thomas Lengauer and Robert E. Tarjan",
  title =        "Asymptotically Tight Bounds on Time-Space Trade-offs
                 in a Pebble Game",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "1087--1130",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:36:51 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Matula:1982:BDS,
  author =       "David W. Matula",
  title =        "Basic Digit Sets for Radix Representation",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "1131--1143",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:37:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Smith:1982:PPA,
  author =       "Carl H. Smith",
  title =        "The Power of Pluralism for Automatic Program
                 Synthesis",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "1144--1165",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:38:53 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/colt.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Earlier version in FOCS81",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ukkonen:1982:EPS,
  author =       "Esko Ukkonen",
  title =        "The Equivalence Problem for Some Non-Real-Time
                 Deterministic Pushdown Automata",
  journal =      j-J-ACM,
  volume =       "29",
  number =       "4",
  pages =        "1166--1181",
  month =        oct,
  year =         "1982",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 00:39:29 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bagchi:1983:SAU,
  author =       "A. Bagchi and A. Mahanti",
  title =        "Search Algorithms Under Different Kinds of
                 Heuristics--{A} Comparative Study",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "1--21",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Three heuristic search algorithms, called Algorithms
                 A, B, and C, are presented. Their performance, with the
                 admissibility condition relaxed, is compared using the
                 following two criteria: (i) number of node expansions
                 and (ii) cost of solution found. First, a general
                 comparison is made. In this process some variations and
                 extensions of C are also considered. Subsequently, two
                 types of heuristic estimates, called proper and path
                 dependent, are defined, and the algorithms are
                 reexamined. It is shown that on the whole A (Nilsson's
                 algorithm) and B (Martelli's algorithm) are inferior to
                 C, which is a slightly modified version of B.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{deChampeaux:1983:BHS,
  author =       "Dennis {de Champeaux}",
  title =        "Bidirectional Heuristic Search Again",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "22--32",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Extensive modifications of a previously published
                 bidirectional heuristic search algorithm are presented
                 in order to preserve the property that shortest
                 solutions are found under appropriate circumstances.
                 Theoretical results encompass the generalization of the
                 unidirectional optimality theorem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Sarwate:1983:NNM,
  author =       "D. V. Sarwate",
  title =        "A Note on ``{A} Note on Multiple Error Detection in
                 {ASCII} Numeric Data Communication''",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "33--35",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A recent paper by C. K. Chu proposes a scheme for
                 double error detection which is based on naive and
                 unrealistic assumptions about the data communication
                 system. Under more realistic conditions, the scheme
                 fails to work as claimed. Suitably modified versions of
                 Chu's scheme do work: they are also well known in the
                 coding literature as Reed--Solomon coding schemes.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "codes, symbolic --- Error Detection; data
                 transmission",
}

@Article{Klug:1983:LEI,
  author =       "Anthony Klug",
  title =        "Locking Expressions for Increased Database
                 Concurrency",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "36--54",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Access to a relation $R$ in a relational database is
                 sometimes based on how $R$ joins with other relations
                 rather than on what values appear in the attributes of
                 $R$-tuples. Using simple predicate locks forces the
                 entire relation to be locked in these cases. A
                 technique is presented which allows locking of the
                 smallest possible set of tuples even when the selection
                 is based on joins with other relations. The algorithms
                 are based on a generalization of tableaux. The tableaux
                 used here can represent relational algebra queries with
                 any of the domain comparison operators $=$, $!=$,
                 $\leq$, $>$, and $\geq$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database systems",
}

@Article{Korth:1983:LPD,
  author =       "Henry F. Korth",
  title =        "Locking Primitives in a Database System",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "55--79",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Locking is a frequently used concurrency control
                 mechanism in database systems. Most systems offer one
                 or more lock modes, usually read and write modes. Here,
                 one operational lock mode is assumed for each database
                 operation, and a criterion for ``good'' lock
                 compatibility functions, called maximal permissiveness,
                 is given. Operational modes are used as a basis to
                 define generalized update modes that correspond to
                 arbitrary lock conversions. The notion of intention
                 modes from System R is extended to arbitrary lock
                 modes, and the interaction among the classes of lock
                 modes thus created is studied.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "An arbitrary number of lock modes, operational modes
                 and derived modes, combination mode, generalized update
                 mode, and the intention mode.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database systems",
}

@Article{Frederickson:1983:IDS,
  author =       "Greg N. Frederickson",
  title =        "Implicit Data Structures for the Dictionary Problem",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "80--94",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Several new data structures for dictionaries are
                 presented that use just one location in addition to
                 those required for key values. The structures are
                 generalizations of a rotated sorted list. Structures
                 adapted to allow fast average search times and
                 structures that allow partial match retrieval on
                 records with $d$ keys, $d > 1$, are also considered.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing",
}

@Article{Maurer:1983:SFT,
  author =       "H. A. Maurer and A. Salomaa and D. Wood",
  title =        "A Supernormal-Form Theorem for Context-Free Grammars",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "95--102",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "For every triple $(k,l,m)$ of nonnegative integers,
                 every context-free grammar $G$ can be transformed into
                 a normal form where (i) each nonterminating production
                 is of the type $A$ produces $w_kBw_lCw_m$, and (ii)
                 each terminating production $A$ produces $w$ has the
                 property that vertical $w$ vertical appears in the
                 length set of $L(G)$. Applications and generalizations
                 of this result are discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Lord:1983:SLA,
  author =       "R. E. Lord and J. S. Kowalik and S. P. Kumar",
  title =        "Solving Linear Algebraic Equations on an {MIMD}
                 Computer",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "103--117",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Two practical parallel algorithms for solving systems
                 of dense linear equations on an MIMD computer are
                 presented. They are based on Gaussian elimination and
                 Givens transformations. The algorithms are numerically
                 stable and have been tested on the Denelcor HEP
                 machine.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; computer systems, digital ---
                 Parallel Processing",
}

@Article{Gavish:1983:FAC,
  author =       "Bezalel Gavish",
  title =        "Formulations and Algorithms for the Capacitated
                 Minimal Directed Tree Problem",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "118--132",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The Capacitated Minimal Directed Tree Problem is
                 fundamental in many network design problems. A new
                 linear integer programming formulation of the problem
                 which leads to a Dantzig-Wolfe decomposition and to a
                 new Lagrangean relaxation procedure for the Capacitated
                 Minimal Directed Tree Problem is presented. This
                 relaxation is used for deriving tight lower bounds on
                 the optimal solution and in heuristics for obtaining
                 approximate solutions. The effectiveness of the
                 procedure is demonstrated in computational tests.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks",
}

@Article{Kannan:1983:PTA,
  author =       "Ravindran Kannan",
  title =        "Polynomial-Time Aggregation of Integer Programming
                 Problems",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "133--145",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that a set of linear Diophantine equations
                 in nonnegative variables with nonnegative coefficients
                 can be reduced to a single equation with the same
                 solution set in polynomial time. A weaker version of
                 the above statement is shown to be true when the
                 coefficients are allowed to be negative. Beside being
                 polynomial-time bounded, the present aggregation scheme
                 differs from existing ones in that the final equation
                 is in variables that are not explicitly bounded. Three
                 applications of this aggregation technique are
                 presented: (i) it is proved that a certain type of
                 knapsack problem cannot have a polynomial-time
                 approximation algorithm unless NP equals P; (ii) an
                 analog of Farkas' lemma for integer programming is
                 proved; and (iii) it is shown that a decision problem
                 involving integer variables is NP-complete.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "integer programming; mathematical programming",
}

@Article{Schassberger:1983:TRT,
  author =       "R. Schassberger and H. Daduna",
  title =        "The Time for a Round Trip in a Cycle of Exponential
                 Queues",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "146--150",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The distribution of the time for a round trip of a job
                 in a cycle of M exponential FIFO queues, where $N$ jobs
                 are cycling, is derived.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The distribution of the time for a round trip of a job
                 in a cycle of $m$ exponential FIFO queues, where $n$
                 jobs are cycling, is derived.",
  classification = "922",
  descriptors =  "Loop queue; exponential queueing network; FIFO; time
                 in system; distribution; cycle time",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Fortune:1983:ESS,
  author =       "Steven Fortune and Daniel Leivant and Michael
                 O'Donnell",
  title =        "The Expressiveness of Simple and Second-Order Type
                 Structures",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "151--185",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Typed lambda ( lambda -) calculi provide convenient
                 mathematical settings in which to investigate the
                 effects of type structure on the function definition
                 mechanism in programming languages. Lambda expressions
                 mimic programs that do not use while loops or circular
                 function definitions. Two typed $\lambda$-calculi are
                 investigated: the simply typed $\lambda$-calculus,
                 whose types are similar to Pascal types, and the
                 second-order typed $\lambda$-calculus, which has a type
                 abstraction mechanism similar to that of modern data
                 abstraction languages such as ALPHARD. Two related
                 questions are considered for each calculus: (1) What
                 functions are definable in the calculus? and (2) How
                 difficult is the proof that all expressions in the
                 calculus are normalizable (i.e., that all computations
                 terminate)?",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  checked =      "4 September 1990",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages; functional",
}

@Article{Strong:1983:VEF,
  author =       "H. R. Strong",
  title =        "Vector Execution of Flow Graphs",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "186--196",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Consideration is given to the optimal scheduling of an
                 SIMD (Single Instruction Multiple Data) machine that is
                 a set of processors synchronized at the instruction
                 level so that only one instruction may be executed at a
                 time, but that instruction may be executed by all or
                 any subset of the set of processors. Each processor is
                 assumed to be executing the same program; however,
                 since each is operating on different data, each may
                 take a different path through that program. A scheduler
                 decides at each point in time which instruction to
                 execute next without knowledge of the future paths
                 through the program that each processor will take. An
                 optimal scheduler would schedule these executions to
                 minimize the total execution time (number of
                 instructions executed). Programs for which such an
                 optimal scheduler exists are characterized by
                 graph-theoretic properties of the corresponding flow
                 graph: They are exactly the reducible flow graphs with
                 only disjoint cycles. Scheduling methods based on
                 priority ordering and node listing are compared as to
                 worst-case behavior on programs for which no optimal
                 scheduler exists.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital",
}

@Article{Apt:1983:FJP,
  author =       "Krzysztof R. Apt",
  title =        "Formal Justification of a Proof System for
                 Communicating Sequential Processes",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "197--216",
  month =        jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In a previous paper a proof system dealing with
                 partial correctness of communicating sequential
                 processes was introduced. Soundness and relative
                 completeness of this system are proved here. It is also
                 indicated in what way the semantics and the proof
                 system can be extended to deal with the total
                 correctness of the programs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory --- Programming Theory; computer
                 programming",
}

@Article{Ibarra:1983:PAD,
  author =       "Oscar H. Ibarra and Shlomo Moran",
  title =        "Probabilistic Algorithms for Deciding Equivalence of
                 Straight-Line Programs",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "1",
  pages =        "217--228",
  month =        Jan,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Oct 24 23:19:13 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "They study the complexity of deciding the equivalence
                 of straight-line programs, i.e., those in which there
                 are no loops, and only statements of the form $x := y$,
                 $x := y + z$, $x := y - z$, and $x := y * z$ are
                 permitted. Given two such programs $P$ and $Q$, Ibarra
                 and Moran ask the question: Is $P = Q$? If the domain
                 of the variables is an infinite field such as the
                 integers, then they show that there exists a
                 polynomial-time probabilistic algorithm to solve this
                 problem. If the domain is a finite field, the problem
                 is shown to be {\em NP\/}-hard.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vitter:1983:ASP,
  author =       "Jeffrey Scott Vitter",
  title =        "Analysis of the Search Performance of Coalesced
                 Hashing",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "2",
  pages =        "231--258",
  month =        apr,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An analysis is presented of the coalesced hashing
                 method, in which a portion of memory (called the
                 address region) serves as the range of the hash
                 function while the rest of memory (called the cellar)
                 is devoted solely to storing records that collide when
                 inserted. If the cellar should get full, subsequent
                 colliders must be stored in empty slots in the address
                 region and thus may cause later collisions. Varying the
                 relative size of the cellar affects search performance.
                 The main result of this paper expresses the average
                 search times as a function of the number of records and
                 the cellar size, solving a long-standing open problem.
                 These formulas are used to pick the cellar size that
                 leads to optimum search performance, and it is shown
                 that this ``tuned'' method outperforms several
                 well-known hashing schemes. A discussion of past work
                 on coalesced hashing and a generalization of the method
                 of nonuniform hash functions is included.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Chaining and open addressing; by appropriate tuning
                 outperforms other schemes.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing; database indexing",
  review =       "ACM CR 40,398",
}

@Article{Sippu:1983:CLK,
  author =       "Seppo Sippu and Eljas Soisalon-Soininen and Esko
                 Ukkonen",
  title =        "The Complexity of {LALR}(k) Testing",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "2",
  pages =        "259--270",
  month =        apr,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of testing whether or not a context-free
                 grammar possesses the LALR(k) property is studied. For
                 each fixed integer $k\geq 1$ (i.e., only the subject
                 grammar is a problem parameter) the problem is shown to
                 be complete for polynomial space (PSPACE). For free $k$
                 (i.e., both the grammar and the integer $k$ are problem
                 parameters) the problem is shown to be PSPACE-complete
                 when $k$ is expressed in unary and complete for
                 nondeterministic one-level exponential time (NE) when
                 $k$ is expressed in binary.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Stewart:1983:CEB,
  author =       "G. W. Stewart",
  title =        "Computable Error Bounds for Aggregated {Markov}
                 Chains",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "2",
  pages =        "271--285",
  month =        apr,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A method is described for computing the steady-state
                 probability vector of a nearly completely decomposable
                 Markov chain. The method is closely related to the one
                 proposed by H. A. Simon and A. Ando and developed by P.
                 J. Courtois. However, the method described here does
                 not require the determination of a completely
                 decomposable stochastic approximation to the transition
                 matrix, and hence it is applicable to nonstochastic
                 matrices. An error analysis of the procedure which
                 results in effectively computable error bounds is
                 given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "For some discrete finite Markov chains, the matrix a
                 of transition probabilities can be partitioned so that
                 the off diagonal blocks are smaller (in norm) than the
                 square submatrices on the diagonal. Thus, a can be
                 approximated by a block-diagonal matrix. The
                 computation of the left eigenvector with eigenvalue 1,
                 which gives the steady-state probabilities of the
                 chain, then reduces to the computation of left
                 eigenvectors of the submatrices on \ldots{}.",
  classification = "922",
  descriptors =  "Markov process; transition matrix; eigenvalue; error
                 bound; transient Markov chain; steady state",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "aggregation; eig; Markov chain; nla; pert;
                 probability",
}

@Article{Chandy:1983:CPF,
  author =       "K. M. Chandy and A. J. Martin",
  title =        "A Characterization of Product-Form Queueing Networks",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "2",
  pages =        "286--299",
  month =        apr,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Simple criteria are given for determining whether a
                 queueing network model has a product-form solution and
                 is thus computationally tractable.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Simple criteria are given for determining whether a
                 queuing network model has a product-from solution and
                 is thus computationally tractable.",
  classification = "922",
  descriptors =  "product form; network; stochastic analysis;
                 performance; queuing theory; stochastic analysis;
                 networks",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Jaffe:1983:DSR,
  author =       "Jeffrey M. Jaffe",
  title =        "Decentralized Simulation of Resource Managers",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "2",
  pages =        "300--322",
  month =        apr,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "There are two primary means of resource allocation in
                 computer systems. One is the powerful mechanism of
                 using a centralized resource manager to allocate the
                 resources. An apparently weaker mechanism is for the
                 asynchronous processes of the system to allocate
                 resources with some type of message passing. A unifying
                 treatment of these two methods is provided. It is shown
                 that a managed system may be simulated by the processes
                 using test and set instructions. As a corollary, a wide
                 variety of synchronization algorithms may be
                 accomplished without a manager. The simulation works
                 correctly even in an environment where processes die in
                 an undetectable manner.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; performance modelling",
}

@Article{Brand:1983:CFS,
  author =       "Daniel Brand and Pitro Zafiropulo",
  title =        "On Communicating Finite-State Machines",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "2",
  pages =        "323--342",
  month =        apr,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/des.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A model of communications protocols based on
                 finite-state machines is investigated. The problem is
                 how to ensure certain generally desirable properties,
                 which make protocols ``well-formed,'' that is, specify
                 a response to those and only those events that can
                 actually occur. It is determined to what extent the
                 problem is solvable, and one approach to solving it is
                 described.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  descriptors =  "Protocol engineering",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks",
}

@Article{Nourani:1983:AIT,
  author =       "C. Farshid Nourani",
  title =        "Abstract Implementations and their Correctness
                 Proofs",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "2",
  pages =        "343--359",
  month =        apr,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Formal implementations and their correctness proofs
                 are studied. Properties of initial algebras are used to
                 structure proofs of correctness of implementations. A
                 new formulation of implementation is given
                 incorporating parameter types. Canonical term algebras
                 are argued to be the natural choice of representation
                 for both the abstract and the more concrete
                 specifications as far as correctness proofs are
                 concerned. The ``fine structure'' of initial algebras
                 is captured by the notion of signature of constructors.
                 This notion leads to simple sufficient conditions for
                 obtaining injective homomorphisms of algebras, a
                 necessary step in algebraic correctness proofs.
                 Signature of constructors is also used in connection
                 with the deductive properties of the equational theory
                 of the specification to arrive at sufficient conditions
                 for injectivity of homorphisms of algebras modeling
                 parameterized specifications. A proof methodology is
                 prescribed and is demonstrated by a nontrivial
                 example.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages; functional",
}

@Article{Galil:1983:EGP,
  author =       "Zvi Galil and Wolfgang J. Pauli",
  title =        "An Efficient General-Purpose Parallel Computer",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "2",
  pages =        "360--387",
  month =        apr,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The question of what is a good way to interconnect a
                 large number of processors is investigated. The main
                 result is the construction of a universal parallel
                 machine that can simulate every reasonable parallel
                 machine with only a small loss of time and with
                 essentially the same number of processors.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital",
}

@Article{Tarsi:1983:OSS,
  author =       "Michael Tarsi",
  title =        "Optimal Search on Some Game Trees",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "389--396",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/tree-search.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Also as Tech. Report UCLA-ENG-CSL-8108",
  abstract =     "It is proved that the directional algorithm for
                 solving a game tree is optimal, in the sense of average
                 run time, for balanced trees (a family containing all
                 uniform trees). This result implies that the alpha-beta
                 pruning method is asymptotically optimal among all game
                 searching algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; probability;
                 systems science and cybernetics --- Artificial
                 Intelligence",
}

@Article{Rosenberg:1983:TDV,
  author =       "Arnold L. Rosenberg",
  title =        "Three-Dimensional {VLSI}: a Case Study",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "397--416",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The advantages of three-dimensional circuits are
                 studied by comparing sample three-dimensional
                 realizations of certain common families of circuits,
                 namely, permutation networks, FFT circuits, and
                 complete binary trees, with the families' optimal
                 two-dimensional realizations. These circuits are then
                 used as building blocks to obtain efficient
                 three-dimensional realizations of arbitrary circuits.
                 The results obtained indicate (roughly) that bounds on
                 area (both upper and lower) in the neighborhood of
                 order $n^2$ in the two-dimensional case translate to
                 bounds on volume in the neighborhood of order $n^{3/2}$
                 in the three-dimensional case. Moreover, several of the
                 upper bounds are attainable using (idealized)
                 realizations that have active devices on only one level
                 and that use the third dimension only for wire-routing.
                 However, it is also shown that unrestricted use of the
                 third dimension can yield realizations that are more
                 conservative of volume (by the factor $\log^{1/2} n$)
                 than any ``one-active-level'' realization can be.
                 Finally, examples are presented wherein two-dimensional
                 realizations require device-to-device wire lengths as
                 large as $n/\log n$, while equivalent three-dimensional
                 realizations can get by with wire lengths not exceeding
                 $n^{1/2}$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "713; 714",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "integrated circuits, VLSI",
}

@Article{Matula:1983:SLO,
  author =       "David W. Matula and Leland L. Beck",
  title =        "Smallest-Last Ordering and Clustering and Graph
                 Coloring Algorithms",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "417--427",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Smallest-last vertex ordering and priority search are
                 utilized to show for any graph $G$ equals (V, E) that
                 the set of all connected subgraphs maximal with respect
                 to their minimum degree can be determined in $O(|E| +
                 |V|)$ time and $2 |E| + O(|V|)$ space. It is further
                 noted that the smallest-last graph coloring algorithm
                 can be implemented in $O(|E| + |V|)$ time, and
                 particularly effective aspects of the resulting
                 coloring are discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; mathematical
                 techniques",
}

@Article{Supowit:1983:RNG,
  author =       "Kenneth J. Supowit",
  title =        "The Relative Neighborhood Graph, with an Application
                 to Minimum Spanning Trees",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "428--448",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 21 15:56:08 2000",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The relative neighborhood graph (RNG) of a set $V$ of
                 points in Euclidean space is the graph $(V, E)$ where
                 $(p, q)$ are elements $E$ if there is no point $z$
                 belonging to $V$ such that $d(p,z) < d(p,q)$ and
                 $d(q,z) < d(p,q)$. It is shown that (1) the RNG of $n$
                 points in the plane can be found in $O(n \log n)$ time,
                 which is optimal to within a multiplicative constant.
                 (2) The RNG, as well as minimum spanning tree, of the
                 vertices of a convex, $n$-vertex polygon can be found
                 in $O(n)$ time, given the vertices in sorted clockwise
                 order. (3) Under the assumption that no three input
                 points form an isosceles triangle, the RNG of $n$
                 points in $r$-dimensional space can be found in
                 $O(n^2)$ time for fixed $r$ greater than equivalent to
                 $3$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "421; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; mathematical
                 techniques",
}

@Article{Arjomandi:1983:ESV,
  author =       "Eshrat Arjomandi and Michael J. Fischer and Nancy A.
                 Lynch",
  title =        "Efficiency of Synchronous Versus Asynchronous
                 Distributed Systems",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "449--456",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A system of parallel processes is said to be
                 synchronous if all processes run using the same clock,
                 and it is said to be asynchronous if each process has
                 its own independent clock. For any $s$, $n$, a
                 particular distributed problem is defined involving
                 system behavior at $n$ ``ports''. This problem can be
                 solved in time $s$ by a synchronous system but requires
                 time at least $(s-1)(\log_b n)$ on any asynchronous
                 system, where $b$ is a constant reflecting the
                 communication bound in the model. This appears to be
                 the first example of a problem for which an
                 asynchronous system is provably slower than a
                 synchronous one, and it shows that a straightforward
                 step-by-step and process-by-process simulation of an
                 $n$-process synchronous system by an $n$-process
                 asynchronous system necessarily loses a factor of
                 $\log_b n$ in speed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital",
}

@Article{Coffman:1983:ISE,
  author =       "E. G. {Coffman, Jr.} and Ravi Sethi",
  title =        "Instruction Sets for Evaluating Arithmetic
                 Expressions",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "457--478",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The evaluation of arithmetic expressions on both
                 register-oriented and stack-oriented machines can be
                 studied using the same model because registers can be
                 treated as a stack during the evaluation of expression
                 trees, without loss in code efficiency. The machine
                 model in this paper has a hardware stack in which all
                 computations take place. Register-register and
                 register-memory instructions are modeled by considering
                 four possible instructions for each binary operator,
                 depending on whether one or two operands are taken from
                 the stack and on whether the left or the right operand
                 is on top of the stack. There is a cost associated with
                 each operation code, as well as costs for accessing a
                 value in a register or in memory. The minimum cost of
                 computing an expression tree is used to compare
                 machines. As part of the framework that allows the
                 comparisons to be performed, a parameterized algorithm
                 for determining the number of stores that must occur in
                 an optimal computation is developed. This algorithm
                 forms the basis of an optimal code generation
                 algorithm.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer architecture; computer programming ---
                 Algorithms",
}

@Article{Beeri:1983:DAD,
  author =       "Catriel Beeri and Ronald Fagin and David Maier and
                 Mihalis Yannakakis",
  title =        "On the Desirability of Acyclic Database Schemes",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "479--513",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A class of database schemes, called acyclic, was
                 recently introduced. It is shown that this class has a
                 number of desirable properties. In particular, several
                 desirable properties that have been studied by other
                 researchers in very different terms are all shown to be
                 equivalent to acyclicity. In addition, several
                 equivalent characterizations of the class in terms of
                 graphs and hypergraphs are given, and a simple
                 algorithm for determining acyclicity is presented. Also
                 given are several equivalent characterizations of those
                 sets M of multivalued dependencies such that M is the
                 set of multivalued dependencies that are the
                 consequences of a given join dependency. Several
                 characterizations for a conflict-free ( in the sense of
                 Lien) set of multivalued dependencies are provided.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database systems; database systems relational model
                 graph theory",
}

@Article{Fagin:1983:DAH,
  author =       "Ronald Fagin",
  title =        "Degrees of Acyclicity for Hypergraphs and Relational
                 Database Schemes",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "514--550",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Database schemes can be viewed as hypergraphs. A class
                 of `acyclic' database schemes was recently introduced.
                 A number of basic desirable properties of database
                 schemes have been shown to be equivalent to acyclicity.
                 This shows the naturalness of the concept. However,
                 unlike the situation for ordinary, undirected graphs,
                 there are several natural, nonequivalent motions of
                 acyclicity for hypergraphs (and hence for database
                 schemes). Various desirable properties of database
                 schemes are considered and it is shown that they fall
                 into several equivalence classes, each completely
                 characterized by the degree of acyclicity of the
                 scheme. The results are also of interest from a purely
                 graph-theoretic viewpoint. The original notion of
                 acyclicity has the counterintuitive property that a
                 subhypergraph of an acyclic hypergraph can be cyclic.
                 This strange behavior does not occur for the new
                 degrees of acyclicity that are considered.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database systems; database systems relational model
                 graph theory",
}

@Article{Gusfield:1983:PCC,
  author =       "Dan Gusfield",
  title =        "Parametric Combinatorial Computing and a Problem of
                 Program Module Distribution",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "551--563",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A general parameteric computing method that works well
                 for a large class of combinatorial problems is
                 presented. The method is illustrated by solving a
                 problem of distributing modules of a computer program
                 between two processors. Associated with each module are
                 processing costs on each processor, and associated with
                 each pair of modules is a communication cost incurred
                 by distributing the modules on different processors.
                 The problem is to distribute the module to mimimize the
                 total cost of comparison. Stone has solved this problem
                 for fixed costs, and for costs of one processor varying
                 as a function of a single parameter representing the
                 varying load on one processor. The general parametric
                 computing method is applied to solve the problem
                 efficiently for costs of both processors varying as a
                 function of two independent parameters.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical programming",
}

@Article{Suri:1983:RQN,
  author =       "Rajan Suri",
  title =        "Robustness of Queuing Network Formulas",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "564--594",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:54:46 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Analytic models of queueing networks have been
                 observed to give good results for systems which do not
                 conform to the assumption of classical queueing theory.
                 This has been explained to some extent by the recently
                 proposed concept of operational analysis. However, the
                 use of operational analysis for prediction of system
                 performance involves a restrictive assumption, that of
                 homogeneous service times (HST), and practical systems
                 often deviate from HST behavior. It is shown that the
                 main system performance measures are surprisingly
                 insensitive to violations of the HST assumption. This
                 further explains the robustness of analytical models
                 for predicting performance of queueing networks. Some
                 issues regarding the operational versus stochastic
                 approaches are resolved, since it is claimed that the
                 present analysis, which is carried out in the
                 operational framework, cannot be meaningfully carried
                 out in the stochastic framework.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Analytic models of queuing networks have been observed
                 to give good results for systems which do not conform
                 to the assumptions of classical queuing theory. This
                 has been explained to some extent by the recently
                 proposed concept of operational analysis. However, the
                 use of operational analysis for prediction of system
                 performance involves a restrictive assumption, that of
                 homogeneous service times (HST), and practical systems
                 often deviate from",
  classification = "922",
  descriptors =  "Closed queueing network; operational analysis;
                 modeling; prediction; stochastic analysis; analytical
                 model; performance measure; inequality; reliability;
                 sensitivity analysis",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "probability",
}

@Article{Raoult:1983:PNC,
  author =       "Jean-Claude Raoult and Ravi Sethi",
  title =        "Properties of a Notation for Combining Functions",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "595--611",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A combinator called a pipe is proposed for combining
                 functions in a linear order. Examples suggest that
                 semantic rules using pipes are easy to read and
                 understand, even for readers with little knowledge of
                 semantics. The readability is a consequence of the
                 operational intuition associated with pipes. The
                 operational view is that each function connected by a
                 pipe is handed a finite sequence of values. Each
                 function takes zero or more argument from the right end
                 of the sequence. The new idea is that a function may
                 skip over some number of values before picking up its
                 arguments. This approach is suited to expressing the
                 consumption of operations on machine states in a
                 programming language. Pipes allow continuation
                 semantics to be written with direct operator: instead
                 of the operator having to worry about its continuation,
                 the second function in a pipe is essentially a
                 continuation of the first. A connection is established
                 between functions connected by pipes and more
                 traditional continuation semantics.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages",
}

@Article{Clarke:1983:EAH,
  author =       "Edmund M. {Clarke, Jr.} and Steven M. German and
                 Joseph Y. Halpern",
  title =        "Effective Axiomatizations of {Hoare} Logics",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "612--636",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "For a wide class of programming languages P and
                 expressive interpretatIons I, it is shown that there
                 exist sound and relatively complete Hoare logics for
                 both partial-correctness and termination assertions. In
                 fact, under mild assumptions on P and I it is shown
                 that the assertions of the I ARE uniformly decidable in
                 the theory of I (Th(I)) if the halting problem for P is
                 decidable for finite interpretations. Moreover the set
                 of true termination assertions is uniformity
                 recursively enumerable in Th(I) even if the halting
                 problem for P is not decidable for finite
                 interpretations. Since total-correctness assertions
                 coincide with termination assertions for deterministic
                 programming languages, this last result unexpectedly
                 suggests that good axiom systems for total correctness
                 may exist for a wider spectrum of languages than is the
                 case for partial correctness.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming languages",
}

@Article{Gati:1983:CSP,
  author =       "Georg Gati",
  title =        "The Complexity of Solving Polynomial Equations by
                 Quadrature",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "637--640",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that for infinitely many natural numbers
                 $n$ there exist polynomials of degree $n$ with rational
                 coefficient which are irreducible over the field of
                 rational numbers and solvable by quadrature, and for
                 which $n-1$ square root extractions are required in
                 order to obtain all roots. This exponentially improves
                 the obvious bound of $\log n$ and is also a lower bound
                 for ruler-and-compass constructions. Furthermore, this
                 lower bound is sharp.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Ibarra:1983:SEP,
  author =       "Oscar H. Ibarra and Brian S. Leininger",
  title =        "On the Simplification and Equivalence Problems for
                 Straight-Line Programs",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "641--656",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Math/hilbert10.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{JaJa:1983:TST,
  author =       "Joseph Ja'Ja'",
  title =        "Time-Space Trade-Offs for Some Algebraic Problems",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "657--667",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The time-space relationship of several algebraic
                 problems is studied, using and extending previous known
                 techniques. Several results relating the algebraic
                 properties of a set of functions to the structure of
                 the graph of any straight-line program that computes
                 this set are shown. A surprising result is obtained,
                 namely, that matrix inversion is harder than matrix
                 multiplication in the sense that the time-space product
                 TS is of higher order for matrix inversion. Other
                 results are also shown.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Lamport:1983:WBG,
  author =       "L. Lamport",
  title =        "The Weak {Byzantine} Generals Problem",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "668--676",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The Byzantine Generals Problem requires processes to
                 reach agreement upon a value even though some of them
                 may fail. It is weakened by allowing them to agree upon
                 an ``incorrect'' value if a failure occurs. The
                 transaction commit problem for a distributed database
                 is a special case of the weaker problem. It is shown
                 that, like the original Byzantine Generals Problem, the
                 weak version can be solved only if fewer than one-third
                 of the processes may fail. Unlike the original problem,
                 an approximate solution exists that can tolerate
                 arbitrarily many failures.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital",
}

@Article{Xu:1983:RNR,
  author =       "Mei-Rui Xu and John E. Doner and Ronald V. Book",
  title =        "Refining Nondeterminism in Relativizations of
                 Complexity Classes",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "3",
  pages =        "677--685",
  month =        jul,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The single result is a general theorem showing the
                 existence of oracle set that allow infinite hierarchies
                 of relativized classes to exist. The classes are
                 specified by relativizations with bounds on the number
                 of oracle queries. The separation between the classes
                 in the hierarchies depends on increasing the number of
                 nondeterminstic steps allowed by the oracle machines
                 and used to specify the classes.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory",
}

@Article{Nau:1983:DQF,
  author =       "Dana S. Nau",
  title =        "Decision Quality As a Function of Search Depth on Game
                 Trees",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "687--708",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The author has developed a mathematical theory
                 modeling the effects of search depth on a game tree on
                 the probability of making a correct decision. In this
                 theory, the errors made by the evaluation function are
                 modeled as independent, identically distributed random
                 errors superimposed on the true values of the nodes
                 evaluated. This research has produced the surprising
                 result that there is an infinite class of game trees
                 for which searching deeper does not increase the
                 probability of making a correct decision, but instead
                 causes the decision to become more and more random. The
                 paper contains a mathematical proof of this statement,
                 experimental verification of it, and a discussion of
                 its significance.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "decision theory and analysis; mathematical techniques
                 --- Trees; systems science and cybernetics",
}

@Article{Hong:1983:CTO,
  author =       "Jia-Wei Hong and Kurt Mehlhorn and Arnold L.
                 Rosenberg",
  title =        "Cost Trade-offs in Graph Embeddings, with
                 Applications",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "709--728",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An embedding of the graph $G$ in the graph $H$ is a
                 one-to-one association of the vertices of $G$ with the
                 vertices of H. There are two natural measures of the
                 cost of a graph embedding, namely, the dilation-cost of
                 the embedding: the maximum distance in $H$ between the
                 images of vertices that are adjacent in G; and the
                 expansion-cost of the embedding: the ratio of the size
                 of $H$ to the size of $G$. The main result of this
                 paper illustrate three situations wherein one of these
                 cost can be minimized only at the expense of a dramatic
                 increase in the other cost.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Wigderson:1983:IPG,
  author =       "Avi Wigderson",
  title =        "Improving the Performance Guarantee for Approximate
                 Graph Coloring",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "729--735",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The performance guarantee of a graph coloring
                 algorithm is the worst case ratio between the number of
                 colors it uses on the input graph and the chromatic
                 number of this graph. The previous best known
                 polynomial-time algorithm had a performance guarantee
                 $O(n/\log n)$ for graphs on $n$ vertices. This result
                 stood unchallenged for eight years. This paper presents
                 an efficient algorithm with performance guarantee of
                 $O(n(\log \log n)^2/(\log n)^2)$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A modified successive approximation heuristic to
                 reduce the worst case behavior of the heuristic.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "mathematical techniques",
}

@Article{Ibaraki:1983:DMC,
  author =       "Toshihide Ibaraki and Hussein M. Abdel-Wahab and Tiko
                 Kameda",
  title =        "Design of Minimum-Cost Deadlock-Free Systems",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "736--751",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Consider a system consisting of a set of $n$
                 processes, $P_1$, $P_2$, \ldots{}, $P_n$, and a set of
                 serially reusable resources of $m$ different types,
                 $R_1$, $R_2$, \ldots{}, $R_m$. It is assumed that the
                 system is `claim-limited,' that is, its `claim matrix'
                 $C$, whose $(i,j)$ element $C(i,j)$ is the maximum
                 number of units of $R_j$ that may be needed by $P_i$ at
                 the same time, is known a priori. It is desired to
                 design a deadlock-free system, that is, one which never
                 deadlocks for any allocation sequence within the limits
                 given by $C$. For $j = 1, 2, \ldots{}, m$, let $a_j$
                 ($> 0$) be the cost of one unit of $R_j$. An algorithm
                 for designing a deadlock-free system with the minimum
                 resource cost is presented. Its running time bounded by
                 $O(c \alpha (m) + m \log m)$, where $c$ is the number
                 of nonzero elements in $C$ and $\alpha$, is the inverse
                 of Ackermann's function, which is very slowly
                 growing.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; database systems",
}

@Article{Ausiello:1983:GAF,
  author =       "Giorgio Ausiello and Alessandro D'Atri and Domenico
                 Sacc{\`{a}}",
  title =        "Graph Algorithms for Functional Dependency
                 Manipulation",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "752--766",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A graph-theoretic approach for the representation of
                 functional dependencies in relational databases is
                 introduced and applied in the construction of
                 algorithms for manipulating dependencies. This approach
                 allows a homogeneous treatment of several problems
                 (closure, minimization, etc.), which leads to simpler
                 proofs and, in some cases, more efficient algorithms
                 than in the current literature.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; database systems;
                 mathematical techniques --- Graph Theory",
}

@Article{Goodman:1983:SCT,
  author =       "Nathan Goodman and Oded Shmueli",
  title =        "Syntactic Characterization of Tree Database Schemas",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "767--786",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Tree schemas are database schemas with a simple,
                 treelike structure. This paper provides several
                 characterizations of tree schemas. It is proved that
                 cyclic (i.e., nontree) schemas are built from simple
                 building blocks, called Arings and Acliques; these play
                 a role in the theory analogous to the role of simple
                 cycles in graph theory. It is proved that a schema is a
                 tree schema if and only if it is a conformal hypergraph
                 and a natural graph representation (the 2-section) is
                 chordal. Indeed, conformality is equivalent to the
                 absence of Acliques, and chordality is equivalent to
                 the absence of Arings. The present characterizations
                 are also related to ones that appear elsewhere: acyclic
                 hypergraphs, Graham reductions, the running
                 intersection property, and maximal weight qual trees.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database systems",
}

@Article{Kedem:1983:LPE,
  author =       "Zvi M. Kedem and Abraham Silberschatz",
  title =        "Locking Protocols: {From} Exclusive to Shared Locks",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "787--804",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper is concerned with the problem of developing
                 a family of locking protocols which employ both SHARED
                 and EXCLUSIVE locks and which ensure the consistency of
                 database systems that are accessed concurrently by a
                 number of asynchronously running transactions. First, a
                 general result concerning extensions of all protocols
                 that employ EXCLUSIVE locks only to also employ SHARED
                 locks is presented. Then a family of protocols
                 applicable to database systems that are modeled by
                 directed acyclic graphs is presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database concurrency control; database systems",
}

@Article{Larson:1983:AUH,
  author =       "Per-{\AA}ke Larson",
  title =        "Analysis of Uniform Hashing",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "805--819",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Uniform hashing or random probing is often used as a
                 theoretical model of certain types of hashing schemes
                 based on open addressing, and, in particular, of double
                 hashing. Earlier analyses of uniform hashing are
                 extended here to multirecord buckets. Three different
                 situations are analysed: initial loading assuming
                 uniform access frequencies, frequency loading assuming
                 nonuniform access frequencies, and the dynamic behavior
                 when insertions and deletions occur. Simple `closed'
                 formulas cannot be found, but numerical results are
                 readily computed. For larger bucket sizes the retrieval
                 performance is significantly better than that of linear
                 probing and separate chaining. Hence double hashing and
                 similar techniques are competitive alternatives also
                 for organizing externally stored files.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing; performance modelling",
}

@Article{Krevner:1983:ITS,
  author =       "Yael Krevner and Amiram Yehudai",
  title =        "An Iteration Theorem for Simple Precedence Languages",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "820--833",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An iteration theorem for simple precedence languages
                 is presented. The theorem is then used to prove very
                 easily that certain languages are not simple
                 precedence. In addition, a strong characterization of
                 simple precedence languages is established. This is
                 obtained by analyzing a nontrivial family of languages
                 that includes typical languages which are not simple
                 precedence languages and some similar languages which
                 are in fact simple precedence. The iteration theorem is
                 then generalized to deal with certain families of
                 extended precedence languages. Using this theorem, it
                 is shown that none of the languages proved to be
                 nonsimple precedence is uniquely invertible (l, k)
                 precedence for any $k$ greater than equivalent to 1.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory",
}

@Article{Hajek:1983:PFT,
  author =       "Bruce Hajek",
  title =        "The Proof of a Folk Theorem on Queuing Delay with
                 Applications to Routing in Networks",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "834--851",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that among all arrival process (not
                 necessarily stationary or renewal type) for an
                 exponential server queue with specified arrival and
                 service rates, that the arrival process which minimizes
                 the average delay and related quantities is the process
                 with constant interarrival times. The proof is based on
                 a convexity property of exponential server queues which
                 is of independent interest. The folk theorem provides a
                 lower bound, which is readily computable by existing
                 methods, to the average delay in a network of queues
                 under rather general routing disciplines. A sharper
                 lower bound on average delay is provided for the
                 special case of Generalized Round Robin routing for a
                 Poisson arrival process.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "It is show that among all arrival processes (not
                 necessarily stationary or renewal type) for an
                 exponential server queue with specified arrival and
                 service rates, that the arrival process which minimizes
                 the average delay and related quantities is the process
                 with constant interarrival times. The proof is based on
                 a convexity property of exponential server queues which
                 is of independent interest. The folk theorem provides a
                 lower bound, which \ldots{}.",
  classification = "723; 922",
  descriptors =  "G/M/1; D/M/1; lower bound; time in system;
                 expectation; queueing network; routing algorithm;
                 packet switching; round robin",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks; probability",
}

@Article{Megiddo:1983:APC,
  author =       "Nimrod Megiddo",
  title =        "Applying Parallel Computation Algorithms in the Design
                 of Serial Algorithms",
  journal =      j-J-ACM,
  volume =       "30",
  number =       "4",
  pages =        "852--865",
  month =        oct,
  year =         "1983",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/83.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is shown that analyses of parallelism in
                 computational problems have practical implications even
                 when multiprocessor machines are not available. This is
                 true because, in many cases, a good parallel algorithm
                 for one problem may turn out to be useful for designing
                 an efficient serial algorithm for another problem. A
                 unified framework for cases like this is presented.
                 Particular cases provide motivation for examining
                 parallelism in sorting, selection,
                 minimum-spanning-tree, shortest route, max-flow, and
                 matrix multiplication problems, as well as in
                 scheduling and locational problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "binary search; computer programming --- Algorithms;
                 computer systems, digital; design of algorithms;
                 parallel computation",
}

@Article{Shostak:1984:DCT,
  author =       "Robert E. Shostak",
  title =        "Deciding Combinations of Theories",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "1--12",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A method is given for deciding formulas in
                 combinations of unquantified first-order theories.
                 Rather than coupling separate decision procedures for
                 the contributing theories, the method makes use of a
                 single, uniform procedure that minimizes the code
                 needed to accommodate each additional theory. It is
                 applicable to theories whose semantics can be encoded
                 within a certain class of purely equational canonical
                 form theories that is closed under combination.
                 Examples are given from the equational theories of
                 integer and real arithmetic, a subtheory of monadic set
                 theory, the theory of cons, car, and cdr, and others. A
                 discussion of the speed performance of the procedure
                 and a proof of the theorem that underlies its
                 completeness are also given. The procedure has been
                 used extensively as the deductive core of a system for
                 program specification and verification.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; computer programming --- Theory",
}

@Article{Hoover:1984:BFL,
  author =       "H. J. Hoover and M. M. Klawe and N. J. Pippenger",
  title =        "Bounding Fan-out in Logical Networks",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "13--18",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Algorithms are presented which modify logical networks
                 of bounded fan-in to obtain functionally equivalent
                 networks of bounded fan-in and fan-out, so that both
                 size and depth are not increased by more than constant
                 factors.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "logic circuits",
}

@Article{Eades:1984:SHP,
  author =       "Peter Eades and Michael Hickey and Ronald C. Read",
  title =        "Some {Hamilton} Paths and a Minimal Change Algorithm",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "19--29",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A class of graphs whose vertices represent certain
                 combinatorial configurations and whose edges represent
                 minimal changes is defined. A Hamilton path through
                 such a graph indicates the existence of a minimal
                 change algorithm for generating the configurations.
                 Necessary and sufficient conditions for the existence
                 of Hamilton paths are given for this class of graphs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; mathematical
                 techniques",
}

@Article{Beeri:1984:SAR,
  author =       "Catriel Beeri and Martin Dowd and Ronald Fagin and
                 Richard Statman",
  title =        "On the Structure of {Armstrong} Relations for
                 Functional Dependencies",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "30--46",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An Armstrong relation for a set of functional
                 dependencies (FDs) is a relation that satisfies each FD
                 implied by the set but no FD that is not implied by it.
                 The structure and size (number of tuples) of Armstrong
                 relations are investigated. Upper and lower bounds on
                 the size of minimal-sized Armstrong relations are
                 derived, and upper and lower bounds on the number of
                 distinct entries that must appear in an Armstrong
                 relation are given. It is shown that the time
                 complexity of finding an Armstrong relation, given a
                 set of functional dependencies, is precisely
                 exponential in the number of attributes. Also shown is
                 the falsity of a natural conjecture which says that
                 almost all relations obeying a given set of FDs are
                 Armstrong relations for that set of FDs. Finally,
                 Armstrong relations are used to generalize a result,
                 obtained by Demetrovics using quite complicated
                 methods, about the possible sets of keys for a
                 relation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database systems relational model",
}

@Article{Henschen:1984:CQR,
  author =       "Lawrence J. Henschen and Shamim A. Naqvi",
  title =        "On Compiling Queries in Recursive First-Order
                 Databases",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "47--85",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A first-order database is defined as a function-free,
                 first-order theory in which the ground units serve as
                 the extensional database and the proper nonlogical
                 axioms serve as the intensional database. The following
                 problem is addressed: ``Given a recursive nonlogical
                 axiom and the form of a potential query, can one
                 describe a set of database retrieval requests that
                 gives the correct answers and is guaranteed to
                 terminate.'' The solution uses resolution-proof
                 techniques over connection graphs to derive a program
                 of relational database operations that gives all the
                 answers to a query and has a well-defined termination
                 condition.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "stable linear rules permit transitive closure to be
                 compiled.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; database systems; database systems logic
                 artificial intelligence recursion; languages; logic and
                 databases; logic program compilation; recursively
                 defined relations; theory",
}

@Article{Lazar:1984:OFC,
  author =       "Aurel A. Lazar",
  title =        "Optimal Flow Control of an {M/M/m} Queue",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "86--98",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of optimal flow control of an M/M/m
                 queuing system in equilibrium is investigated. The rate
                 of the Poisson input process to the system is
                 controlled so as to maximize the throughput of the
                 queue subject to a constraint that the average time
                 delay not exceed a specified value $T$. The optimum
                 control is shown to be a window type mechanism
                 (bang-bang control). The input rate lambda and the
                 window size L, the maximum number of packets in transit
                 within the system, are determined as explicit functions
                 of the maximum tolerated time delay $T$, the maximum
                 input capacity to the queue $c$, the service rate
                 $\mu$, and the number of servers $m$. The throughput as
                 a function of the time delay for the M/M/m system is
                 then discussed. These results are relevant to operating
                 system performance.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; probability",
}

@Article{Feit:1984:FAT,
  author =       "Sidnie Dresher Feit",
  title =        "A Fast Algorithm for the Two-Variable Integer
                 Programming Problem",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "99--113",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An algorithm that solves any two-variable integer
                 programming problem is presented. A constant
                 word-length model for the data is assumed. The
                 complexity for a problem with m constraints and word
                 length of $L$ digits is bounded by the maximum of two
                 values. The first, which is $O(m\log m)$ steps, is a
                 bound on the complexity of finding the convex region
                 bounded by the constraints, each step being an
                 arithmetic operation or a compare. The second, which is
                 $O(mL)$ steps, is the complexity of solving $m$
                 greatest-common-divisor problems. The algorithm finds a
                 minimal binding set of constraints for any given
                 problem, in addition to finding the solution set. A new
                 method of solving three constraint problems is
                 introduced.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; mathematical
                 programming",
}

@Article{Megiddo:1984:LPL,
  author =       "Nimrod Megiddo",
  title =        "Linear Programming in Linear Time When the Dimension
                 Is Fixed",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "114--127",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It is demonstrated that the linear programming problem
                 in d variables and $n$ constraints can be solved in
                 $O(n)$ time when d is fixed. This bound follows from a
                 multidimensional search technique which is applicable
                 for quadratic programming as well. There is also
                 developed an algorithm that is polynomial in both $n$
                 and d provided d is bounded by a certain slowly growing
                 function of $n$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "design of algorithms; genuinely polynomial time;
                 linear programming; linear time algorithms;
                 mathematical programming, linear; multidimensional
                 search; prune-and-search; quadratic programming;
                 smallest ball problem; worst-case analysis",
}

@Article{Boxma:1984:PFS,
  author =       "O. J. Boxma and F. P. Kelly and A. G. Konheim",
  title =        "The Product Form for Sojourn Time Distributions in
                 Cyclic Exponential Queues",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "128--133",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1984.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Consider a closed cyclic queuing system consisting of
                 M exponential queues. The Laplace--Stieltjes transform
                 of the joint distribution of the consecutive sojourn
                 times of a customer at the M queues is determined and
                 shown to have a product form. The proof is based on a
                 reversibility argument. These results are relevant to
                 operating systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Consider a closed cyclic queuing system consisting of
                 $m$ exponential queues. The Laplace--Stieltjes
                 transform of the distribution of the consecutive
                 sojourn times of a customer at the $m$ queues is
                 determined and shown to have a product from. The proof
                 is based on a reversibility argument.",
  classification = "723; 922",
  descriptors =  "Queueing system; multiqueue; loop queue; time in
                 system; product form; network; reversibility",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; probability",
}

@Article{Simon:1984:PQF,
  author =       "B. Simon",
  title =        "Priority Queues with Feedback",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "134--149",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A priority queuing system in which a customer can feed
                 back and change priority after being served is
                 analyzed. More exactly, there are $c$ customer types.
                 Customer type $i$ feeds back after service $N(i) - 1$
                 times. The $k$th time a type $i$ customer is in the
                 queue it has priority level $f(i, k)$ and requires a
                 service time with arbitrary distribution $G_{i_k}$.
                 Type $i$ customers enter from outside as a Poisson
                 process with rate $\lambda_i$ and can be either
                 preemptive or nonpreemptive. A customer who has been
                 preempted must start service over from the beginning
                 with a new (independently chosen) service time. The
                 analysis gives mean waiting times for each customer
                 type at each stage in its itinerary, the mean number of
                 each customer type in the system, and other quantities
                 of interest. It is also shown that bulk arrivals and
                 branching can be included in the model without
                 substantially changing the form of the solution. These
                 results are relevant to operating systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A priority queuing system in which a customer can feed
                 back and change priority after being served is
                 analyzed. More exactly, there are $c$ customer types.
                 Customer type $i$ feeds back after service $n(i)-1$
                 times. The $k$-th time a type $i$ customer is in the
                 queue it has priority level $f(i,k)$ and requires a
                 service time with arbitrary distribution $g(i,k)$. Type
                 $i$ customer enter from outside as a Poisson process
                 with rate $\lambda(i)$ and can be either preemptive
                 \ldots{}.",
  classification = "723; 922",
  descriptors =  "Queueing system; M/G/1; priority; feedback; waiting
                 time; queue length",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; probability",
}

@Article{JaJa:1984:ITD,
  author =       "J. Ja'Ja' and V. K. {Prasanna Kumar}",
  title =        "Information Transfer in Distributed Computing with
                 Applications to {VLSI}",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "150--162",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Simple general lower bound techniques are developed
                 for measuring the amount of interprocessor
                 communication required in distributed computing.
                 Optimal bounds are shown for many problems, such as
                 integer multiplication, integer division, matrix
                 squaring, matrix inversion, solving a linear system of
                 equations, and computing square roots. Using these
                 techniques, one can unify and strengthen the area-time
                 trade-off results known in the literature. Many new
                 trade-off results are also shown in several of the
                 existing models. The relationship between information
                 transfer as defined here and the chip complexity of the
                 corresponding problem is discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "713; 714; 722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; integrated circuits, VLSI",
}

@Article{Smith:1984:RTA,
  author =       "Douglas R. Smith",
  title =        "Random Trees and the Analysis of Branch and Bound
                 Procedures",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "1",
  pages =        "163--188",
  month =        jan,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Branch and bound procedures are the most efficient
                 known means for solving many NP-hard problems. A
                 special class of branch and bound procedures called
                 relaxation-guided procedures is presented. While for
                 some branch and bound procedures a worst-case
                 complexity bound is known, the average case complexity
                 is usually unknown, despite the fact that it may give
                 more useful information about the performance of the
                 algorithm. A random process which generates labeled
                 trees is introduced as a model of the kind of trees
                 that a relaxation-guided procedure generates over
                 random instances of a problem. Results concerning the
                 expected time and space complexity of searching these
                 random trees are derived with respect to several search
                 strategies. The best-bound search strategy is shown to
                 be optimal in both time and space. These results are
                 illustrated by data from random traveling salesman
                 instances. Evidence is presented that the asymmetric
                 traveling salesman problem can be solved exactly in
                 time $O(n^3\ln(n))$ on the average.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming",
}

@Article{Gottlieb:1984:CRP,
  author =       "Allan Gottlieb and Clyde P. Kruskal",
  title =        "Complexity Results for Permuting Data and Other
                 Computations on Parallel Processors",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "193--209",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "For a wide class of problems, we obtain lower bounds
                 for algorithms executed on certain parallel processors.
                 These bounds show that for sufficiently large problems
                 many known algorithms are optimal. The central result
                 of the paper is the following sharper lower bound for
                 permutation algorithms. Any permutation algorithm for
                 $N$ data items on a $P$ processor parallel machine
                 without shared memory requires time on the order of $N$
                 $\log_k P / P$, where $K$ is the maximum number of
                 processors directly connected to a single processor. In
                 particular, a speedup on the order of $P$ is impossible
                 if $K$ is bounded.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "New York Univ, Courant Inst, New York, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; complexity; computer programming; computer
                 systems, digital --- Parallel Processing; lower bounds;
                 parallel computation; shuffle-exchange machine",
}

@Article{Hull:1984:FSI,
  author =       "Richard Hull",
  title =        "Finitely Specifiable Implicational Dependency
                 Families",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "210--226",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An implicational dependency (ID) family is a family of
                 relational database instances consisting of all
                 instances that satisfy a given set of IDs. It is known
                 that the collection of ID families is closed under
                 projection [10]. It is shown here that this collection
                 is also closed under join. An ID family is finitely
                 specifiable if it can be defined using a finite set of
                 IDs. It is shown here that the collection of finitely
                 specifiable ID families and also several natural
                 subclasses of this collection are not closed under
                 projection or join. These results suggest that the
                 direct application of IDs as an integrity-checking
                 mechanism for user views may not be appropriate.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Southern California, Henry Salvatori Computer
                 Science Cent, Los Angeles, CA, USA",
  affiliationaddress = "Univ of Southern California, Henry Salvatori
                 Computer Science Cent, Los Angeles, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "database approach, derivation of dependencies in
                 views",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database dependencies; database systems; dependency
                 families; finite specifiability; relational databases;
                 relational operators",
}

@Article{Yannakakis:1984:SL,
  author =       "Mihalis Yannakakis",
  title =        "Serializability by Locking",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "227--244",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/real.time.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The power of locking as a primitive for controlling
                 concurrency in database systems is examined. It is
                 accepted that the concurrent execution (or schedule) of
                 different transactions must be serializable; that is,
                 it must behave like a serial schedule, one in which the
                 transactions run one at a time. It is shown that
                 locking cannot achieve the full power of
                 serializability. An exact characterization of the
                 schedules that can be produced if locking is used to
                 control concurrency is given for two versions of
                 serializability. In the first one, state
                 serializability, only the effect of the schedule on the
                 database is taken into account. In the second one, view
                 serializability, the view of the data received by the
                 transactions is also taken into account. We show that
                 it is possible to determine efficiently whether the
                 transactions in a given set can be permitted to run
                 safely by themselves without the need of any control
                 while ensuring view serializability, although the
                 problem is NP-complete in the case of state
                 serializability.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; concurrency control; database systems;
                 locking; safety; serializability; theory",
}

@Article{Tarjan:1984:WCA,
  author =       "Robert E. Tarjan and Jan {van Leeuwen}",
  title =        "Worst-Case Analysis of Set Union Algorithms",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "245--281",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper analyzes the asymptotic worst-case running
                 time of a number of variants of the well-known method
                 of path compression for maintaining a collection of
                 disjoint sets under union. We show that two one-pass
                 methods proposed by van Leeuwen and van der Weide are
                 asymptotically optimal, whereas several other methods,
                 including one proposed by Rem and advocated by
                 Dijkstra, are slower than the best methods.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; computer programming; data processing ---
                 Data Structures; graph algorithms; set union
                 algorithms; worst-case analysis",
}

@Article{Culik:1984:SEP,
  author =       "Karel {Culik, II} and Tero Harju",
  title =        "The $\omega$-Sequence Equivalence Problem for {D0L}
                 Systems Is Decidable",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "282--298",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 11:32:26 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The following problem is shown to be decidable. Given
                 are homomorphisms $h_1$ and $h_2$ from $\Sigma*$ to
                 $\Sigma*$ and strings $\sigma_1$ and $\sigma_2$ over
                 $\Sigma$ such that $h_i^n(\sigma_i)$ is a proper prefix
                 of $h_i^n(\sigma_i)$ for $i = 1, 2$ and all $n \leq 0$;
                 that is, for $i = 1, 2$, $h_i$ generates from
                 $\sigma_i$ an infinite string $\alpha_i$ with prefixes
                 $h_i^n(\sigma_i)$ for all $n \geq 0$. Test whether
                 $\alpha_1 = \alpha_2$. From this result easily follows
                 the decidability of limit language equivalence
                 (omega-equivalence) for D0L systems.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Waterloo, Dep of Computer Science,
                 Waterloo, Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "$l$-systems; automata theory; D0L systems;
                 decidability; Formal Languages; morphisms; parallel
                 rewriting systems",
}

@Article{Hunt:1984:TTM,
  author =       "H. B. {Hunt III}",
  title =        "Terminating {Turing} Machine Computations and the
                 Complexity and\slash or Decidability of Correspondence
                 Problems, Grammars, and Program Schemes",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "299--318",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Three natural decision problems are presented: one for
                 correspondence problems and linear context-free
                 grammars, one for arbitrary context-free grammars, and
                 one for program schemes. Each of these three decision
                 problems, although decidable, is shown to be of
                 nonrecursive complexity. The complexities of these
                 three decision problems are shown to easily imply
                 nonrecursive lower bounds on the complexities of wide
                 classes of decision problems for their respective
                 structures. As corollaries, a number of new
                 nonrecursive lower complexity bounds, undecidability
                 results, and relative economy of description results
                 are obtained for these structures. In addition, several
                 decidable decision problems and effective procedures in
                 the literature are shown to be of nonrecursive
                 complexity.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "State Univ of New York at Albany, Computer
                 Science Dep, Albany, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory; complexity; context-free grammars;
                 decidability; program schemes; Turing Machines",
}

@Article{Clenshaw:1984:BFP,
  author =       "C. W. Clenshaw and F. W. J. Olver",
  title =        "Beyond Floating Point",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "319--328",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/62.322429",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "65G05",
  MRnumber =     "819 141",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new number system is proposed for computer
                 arithmetic based on iterated exponential functions. The
                 main advantage is to eradicate overflow and underflow,
                 but there are several other advantages and these are
                 described and discussed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Lancaster, Dep of Mathematics,
                 Lancaster, Engl",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer arithmetic; computer metatheory; error
                 analysis; mathematical techniques --- Digital
                 Arithmetic; overflow; rounding error; underflow",
}

@Article{Trojan:1984:LBF,
  author =       "George M. Trojan",
  title =        "Lower Bounds and Fast Algorithms for Sequence
                 Acceleration",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "329--335",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Tight upper and lower bounds are obtained for sequence
                 accelerating. The lower bounds follow from a powerful
                 asymptotic adversary principle. Algorithms are
                 presented and shown to be almost optimal.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Western Ontario, Dep of Physics, London,
                 Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; computer programming; lower bounds;
                 sequence acceleration; upper bounds",
}

@Article{Rock:1984:TMN,
  author =       "Hans R{\"{o}}ck",
  title =        "The Three-Machine No-Wait Flow Shop Is {NP}-Complete",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "336--345",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The three-machine, minimum makespan, permutation flow
                 shop with no wait in process is shown to be NP-hard in
                 the strong sense. This settles a well-known open
                 question in scheduling theory.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technische Univ Berlin, Fachbereich Informatik,
                 Berlin, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "912; 913",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "np-completeness; operations research; scheduling ---
                 Theory; three-machine no-wait flow shop",
}

@Article{McKenna:1984:AEI,
  author =       "J. McKenna and Debasis Mitra",
  title =        "Asymptotic Expansions and Integral Representations of
                 Moments of Queue Lengths in Closed {Markovian}
                 Networks",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "346--360",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1984.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A method for calculating the first and higher order
                 moments of the queue lengths for each customer class at
                 each node in a closed Markovian queuing network is
                 presented. The method is based on asymptotic expansions
                 in powers of $N^{-1}$ for the moments of interest. $N$
                 is a parameter that reflects the size of the network.
                 The derivation of the asymptotic expansions presented
                 here is based on the techniques developed by us earlier
                 to get asymptotic expansions in powers of $N^{-1}$ of
                 the mean utilization of each processor by each class of
                 customers. These expansions are valid in the `normal
                 usage' case in which none of the processors are too
                 heavily utilized. These expansions are particularly
                 useful in the case of large networks with many classes
                 of customers, each class having many customers. With
                 these expansions, we are able to analyze very large
                 networks that earlier were computationally
                 intractable.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "In this paper a method for calculating the first and
                 higher order moments of the queue lengths for each
                 customer class at each node in a closed Markovian
                 queuing network is presented. The method is based on
                 asymptotic expansions in powers of $n-1$ for the
                 moments of interest. $n$ is a parameter that reflects
                 the size of the network\ldots{}",
  classification = "922",
  descriptors =  "Time sharing; closed queueing network; exponential
                 queueing network; Markov process; bibliography; product
                 form; normalization constant; partition function",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "asymptotic expansions; closed Markovian networks;
                 integral representations; moment of queue lengths;
                 probability; Queueing Theory",
}

@Article{Adachi:1984:SCG,
  author =       "Akeo Adachi and Shigeki Iwata and Takumi Kasai",
  title =        "Some Combinatorial Game Problems Require
                 ${\Omega}(n^k)$ Time",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "361--376",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The first `natural' languages are established as
                 solvable in deterministic polynomial time, for the
                 recognition of which polynomial-time lower bounds can
                 be shown. The $k$-pebble game problem is to determine
                 whether the first player has a forced win in the pebble
                 game using only $k$ pebbles. The main results of this
                 paper is that the $k$-pebble game problem requires
                 $\Omega(n^{(k - 1)^4} - \epsilon)$ time for its
                 recognition on multitape Turing machines for any
                 epsilon greater than $0$. The problem is solvable in
                 deterministic polynomial time. Then we consider other
                 combinatorial game problems that also have nontrivial
                 polynomial deterministic lower time bounds.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IBM Japan Ltd, Science Inst, Toky, Jpn",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "$k$-pebble game problem; automata theory;
                 combinatorial game problems; computational complexity;
                 mathematical techniques --- Combinatorial Mathematics;
                 polynomial-time lower bounds; Turing Machines",
}

@Article{JaJa:1984:VCS,
  author =       "Joseph Ja'Ja'",
  title =        "The {VLSI} Complexity of Selected Graph Problems",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "377--391",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "General lower bound techniques are developed to
                 determine the VLSI complexity of graph problems with
                 some surprising results that show a striking difference
                 between this class of problems and the other classes
                 studied in the literature. The results show that the
                 VLSI complexity of graph problems depends crucially on
                 several parameters such as the I/O formats, the
                 locations of the I/O ports, and the timing of the I/O
                 bits. Almost all of our lower bounds can be matched
                 with existing upper bounds or bounds obtained by some
                 minor modifications of existing algorithms.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Pennsylvania State Univ, University Park, PA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "714; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Graph Theory; integrated circuits, VLSI; mathematical
                 techniques; VLSI complexity",
}

@Article{Papadimitriou:1984:CUS,
  author =       "Christos H. Papadimitriou",
  title =        "On the Complexity of Unique Solutions",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "392--400",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We show that the problem of deciding whether an
                 instance of the traveling salesman problem has a
                 uniquely optimal solution is complete for
                 $\Delta_2^p$.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford Univ, Dep of Computer Science,
                 Stanford, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "complexity; mathematical programming; operations
                 research; traveling salesman problem",
}

@Article{Reif:1984:SC,
  author =       "John H. Reif",
  title =        "Symmetric Complementation",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "401--421",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper introduces a new class of games called
                 symmetric complementing games. These games are
                 interesting since their related complexity classes
                 include many well-nown graph problems: Finding minimum
                 spanning forests; $k$-connectivity and $k$-blocks; and
                 recognition of chordal graphs, comparability graphs,
                 interval graphs, split graphs, permutation graphs, and
                 constant valence planar graphs. For these problems
                 probabilistic sequential algorithms requiring
                 simultaneously logarithmic space and polynomial time
                 are given. Furthermore, probabilistic parallelism
                 algorithms requiring simultaneously logarithmic time
                 and a polynomial number of processors are also given.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Harvard Univ, Aiken Computation Lab, Cambridge,
                 MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; Graph Theory;
                 mathematical techniques; probabilistic algorithms;
                 symmetric complementation",
}

@Article{Savage:1984:STT,
  author =       "John E. Savage",
  title =        "Space-Time Trade-Offs for Banded Matrix Problems",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "2",
  pages =        "422--437",
  month =        apr,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Trade-offs between space and time provide important
                 information on the simultaneous use of these resources.
                 They have been studied most successfully using
                 Grigoryev method, which leads to lower bounds on the
                 space-time product for certain models of computation.
                 In this paper, we generalize the model to which the
                 Grigoryev method applies and derive space-time lower
                 bounds for banded matrix multiplication and inversion,
                 and for the solution of a set of banded equations. We
                 also investigate full matrix inversion and several
                 other problems. The new computational model consists of
                 algorithms on finite-state machine with the proviso
                 that input and output are done at times that are data
                 independent. Space is measured by the logarithm of the
                 number of states in the machine, and time is measured
                 by the number of cycles in which input and\slash or
                 output is done. We show that standard algorithms for
                 the multiplication of $p \times p$ matrices of
                 bandwidth $b$, and for the inversion of such matrices
                 when b equals 106 (p) are optimal to within
                 multiplicative factors. Good algorithms are also
                 presented for the solution of a set of banded equations
                 and for banded matrix inversion.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Brown Univ, Dep of Computer Science, Providence,
                 RI, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; banded matrix problems; computer
                 programming; mathematical techniques --- Matrix
                 Algebra; space-time trade-offs",
}

@Article{Boyer:1984:MPU,
  author =       "Robert S. Boyer and J. Strother Moore",
  title =        "A Mechanical Proof of the Unsolvability of the Halting
                 Problem",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "441--458",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A proof by a computer program of the unsolvability of
                 the halting problem is described. The halting problem
                 is posed in a constructive, formal language. The
                 computational paradigm formalized is Pure LISP, not
                 Turing machines. The machine was led to the proof by
                 the authors, who suggested certain function definitions
                 and stated certain intermediate lemmas. The machine
                 checked to ascertain that every suggested definition
                 was admissible and the machine proved the main theorem
                 and every lemma. It is believed this is the first
                 instance of a machine checking that a given problem is
                 not solvable by machine.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Texas at Austin, Inst for Computing Science \&
                 Computer Applications, Austin, TX, USA",
  affiliationaddress = "Univ of Texas at Austin, Inst for Computing
                 Science \& Computer Applications, Austin, TX, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory --- Formal Languages; automatic
                 theorem proving; computer metatheory; computer
                 programming languages --- lisp; halting problem;
                 program verification; Programming Theory",
}

@Article{Gurevich:1984:SNH,
  author =       "Yuri Gurevich and Larry Stockmeyer and Uzi Vishkin",
  title =        "Solving {NP}-Hard Problems on Graphs That Are Almost
                 Trees and an Application to Facility Location
                 Problems",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "459--473",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A general technique is described for solving certain
                 NP-hard graph problems in time that is exponential in a
                 parameter $k$ defined as the maximum, over all
                 nonseparable components C of the graph, of the number
                 of edges that must be added to a tree to produce C; for
                 a connected graph, $k$ is no more than the number of
                 edges of the graph minus the number of vertices plus
                 one. The technique is illustrated in detail for the
                 following facility location problem: Given a connected
                 graph G$(V, E)$ such that each edge has an associated
                 positive integer length and given a positive integer
                 $r$, place the minimum number of centers on points of
                 the graph such that every point of the graph is within
                 distance r from some center (a `point' is either a
                 vertex or a point on some edge). An algorithm is given.
                 A parallel implementation of the algorithm, with
                 optimal speedup over the sequential version for a
                 fairly wide range for the number of processors, is
                 presented.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Michigan, Dep of Computer \& Communication
                 Sciences, Ann Arbor, MI, USA",
  affiliationaddress = "Univ of Michigan, Dep of Computer \&
                 Communication Sciences, Ann Arbor, MI, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 912; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; computer systems,
                 digital --- Parallel Processing; facility location
                 problems; Graph Theory; mathematical techniques;
                 np-hard problems; operations research; parallel
                 algorithms",
}

@Article{Baccelli:1984:EEA,
  author =       "Fran{\c{c}}ois Baccelli and Erol Gelenbe and Brigitte
                 Plateau",
  title =        "An End-to-End Approach to the Resequencing Problem",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "474--485",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1984.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The resequencing or serialization problem is of basic
                 interest in distributed systems and computer
                 communication systems. This is because a flow of
                 packets, messages, or updates entering a communication
                 system in chronological order from the same port or
                 from different ports may be disordered. The receiving
                 port must then ensure that these objects are
                 resequenced in the appropriate order before they are
                 fed to the output of the system. In this paper we
                 analyze the end-to-end delay incurred by objects
                 traversing such a system, including the disordering
                 delay, the delay introduced by the resequencing
                 algorithm, and the delay due to the output server at
                 the receiving port. The analysis is carried out via
                 factorization methods.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Inst Natl de Recherche en Informatique et en
                 Automatique, Le Chesnay, Fr",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The resequencing or serialization problem is of basic
                 interest in distributed systems and computer
                 communication systems. This is because a flow of
                 packets, messages, or updates entering a communication
                 system in chronological order from the same port or
                 from different ports may be disordered. The receiving
                 port must then ensure that these objects are
                 resequenced in the appropriate order before they are
                 fed to the output of the system. \ldots{}.",
  classification = "722; 723; 922",
  descriptors =  "Packet switching; performance evaluation; analytical
                 model; consistency control; serialization;
                 resequencing",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks; computer systems, digital;
                 consistency control; database systems --- Distributed;
                 Distributed; packet-switching networks; performance
                 analysis; probability --- Queueing Theory; resequencing
                 problem; serialization",
}

@Article{Datta:1984:SCD,
  author =       "Ajoy Datta and S. Ghosh",
  title =        "Synthesis of a Class of Deadlock-Free {Petri} Nets",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "486--506",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new class of Petri nets called regular nets is
                 described. The structure of these nets guarantees
                 liveness once the invariants are marked with tokens.
                 Some graphical properties of invariants and variants
                 are discussed. The concept of net labeling is
                 introduced and a systematic method of synthesizing
                 regular nets is presented. It is shown how the safety
                 of such nets can be trivially assured, thus producing
                 live and safe control structures.",
  acknowledgement = ack-nhfb,
  affiliation =  "Ohio State Univ, Dep of Computer \& Information
                 Sciences, Columbus, OH, USA",
  affiliationaddress = "Ohio State Univ, Dep of Computer \& Information
                 Sciences, Columbus, OH, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks; computer systems, digital;
                 deadlock-free Petri nets; Distributed",
}

@Article{Upfal:1984:ESP,
  author =       "Eli Upfal",
  title =        "Efficient Schemes for Parallel Communication",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "507--517",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A family of balanced communication schemes for
                 connecting $N$ processors with only a constant number
                 of lines entering or leaving each processor is defined.
                 It is proved that this network topology enables a fully
                 distributed probabilistic algorithm to execute a
                 variety of communication requests efficiently. In
                 particular it enables implementation of an arbitrary
                 permutation, that is, a set of $N$ packets initially
                 located in distinct processors and destined for
                 distinct destinations in $O(\log_2 N)$ steps. Similar
                 results are proved for randomly generated communication
                 requests. These results suggest an efficient solution
                 to a fundamental problem in the design of parallel
                 computers.",
  acknowledgement = ack-nhfb,
  affiliation =  "Hebrew Univ of Jerusalem, Inst of Mathematics \&
                 Computer Science, Jerusalem, Isr",
  affiliationaddress = "Hebrew Univ of Jerusalem, Inst of Mathematics \&
                 Computer Science, Jerusalem, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; computer systems,
                 digital; concurrency; network routing; parallel
                 communication; Parallel Processing; probabilistic
                 algorithm",
}

@Article{Hull:1984:FMT,
  author =       "Richard Hull and Chee K. Yap",
  title =        "The Format Model: a Theory of Database Organization",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "518--537",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Also published in/as: ACM SIGACT-SIGMOD Symp. on
                 Principles of Database Systems, 1982, pp.205--211.",
  abstract =     "A mathematical theory for the study of data
                 representation in databases is introduced and
                 developed. The theory focuses on three data constructs
                 (collection, composition, and classification).
                 `Formats' with semantically rich yet tractable
                 structure are built recursively using these constructs.
                 Using formats, we obtain several nontrivial results
                 concerning notions of relative information capacity and
                 restructuring of data sets. As such, the format model
                 provides a new approach for the formal study of the
                 construction of `user views' and other data
                 manipulations in databases.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Southern California, Dep of Computer Science,
                 Los Angeles, CA, USA",
  affiliationaddress = "Univ of Southern California, Dep of Computer
                 Science, Los Angeles, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "objects as formats, in recursive hierarchies. No
                 transforms or constants.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data processing --- Data Structures; database
                 organization; database systems; format model; relative
                 information capacity; semantic database models;
                 Theory",
}

@Article{Fredman:1984:SST,
  author =       "Michael L. Fredman and J{\'{a}}nos Koml{\'o}s and
                 Endre Szemer{\'e}di",
  title =        "Storing a Sparse Table with ${O(1)}$ Worst Case Access
                 Time",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "538--544",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:55:08 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Extends the work of Tarjan and Yao
                 \cite{Tarjan:1979:SST}, using a two-level data
                 structure, the first containing pointers to the second,
                 and the second containing blocks accessible by a
                 perfect hashing function.",
  abstract =     "A data structure for representing a set of $n$ items
                 from a universe of $m$ items, which uses space $n +
                 o(n)$ and accommodates membership queries in constant
                 time, is described. Both the data structure and the
                 query algorithm are easy to implement.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, San Diego, Dep of Electrical
                 Engineering \& Computer Science, La Jolla, CA, USA",
  affiliationaddress = "Univ of California, San Diego, Dep of Electrical
                 Engineering \& Computer Science, La Jolla, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "access time; computer programming --- Algorithms; data
                 processing; Data Structures; hashing; query algorithms;
                 sparse tables",
}

@Article{Traub:1984:OSL,
  author =       "J. F. Traub and H. Wo{\'{z}}niakowski",
  title =        "On the Optimal Solution of Large Linear Systems",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "545--559",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The information-based study of the optimal solution of
                 large linear systems is initiated by studying the case
                 of Krylov information. Among the algorithms that use
                 Krylov information are minimal residual, conjugate
                 gradient, Chebyshev, and successive approximation
                 algorithms. A `sharp' lower bound on the number of
                 matrix-vector multiplications required to compute an
                 $\epsilon$-approximation is obtained for any
                 orthogonally invariant class of matrices. It is shown
                 that the minimal residual algorithm is within at most
                 one matrix-vector multiplication of the lower bound. A
                 similar result is obtained for the generalized minimal
                 residual algorithm. The lower bound is computed for
                 certain classes of orthogonally invariant matrices. How
                 the lack of certain properties (symmetry, positive
                 definiteness) increases the lower bound is shown. A
                 conjecture and a number of open problems are stated.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Columbia Univ, Dep of Computer Science, New
                 York, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; conjugate
                 gradient algorithm; Krylov information; large linear
                 systems; lower bounds; mathematical techniques; Matrix
                 Algebra; optimal algorithms",
}

@Article{Brookes:1984:TCS,
  author =       "S. D. Brookes and C. A. R. Hoare and A. W. Roscoe",
  title =        "A Theory of Communicating Sequential Processes",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "560--599",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/dbase.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A mathematical model for communicating sequential
                 processes is given, and a number of its interesting and
                 useful properties are stated and proved. The
                 possibilities of nondeterminism are fully taken into
                 account.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Carnegie-Mellon Univ, Dep of Computer Science,
                 Pittsburgh, PA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "asynchrony; communicating sequential processes;
                 computer metatheory; computer programming languages;
                 deadlock; liveness; mathematical models;
                 nondeterminism; parallelism; pcalc equivalence binder
                 (csp); safety; synchrony; Theory; theory",
}

@Article{McLean:1984:FMA,
  author =       "John McLean",
  title =        "A Formal Method for the Abstract Specification of
                 Software",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "600--627",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/softeng.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An intuitive presentation of the trace method for the
                 abstract specification of software contains sample
                 specifications, syntactic and semantic definitions of
                 consistency and totalness, methods for proving
                 specifications consistent and total, and a comparison
                 of the method with the algebraic approach to
                 specification. This intuitive presentation is
                 underpinned by a formal syntax, semantics, and
                 derivation system for the method. Completeness and
                 soundness theorems establish the correctness of the
                 derivation system with respect to the semantics, the
                 coextensiveness of the syntactic definitions of
                 consistency and totalness with their semantic
                 counterparts, and the correctness of the proof methods
                 presented. Areas for future research are discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "US Naval Research Lab, Computer Science \& Systems
                 Branch, Washington, DC, USA",
  affiliationaddress = "US Naval Research Lab, Computer Science \&
                 Systems Branch, Washington, DC, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "abstract specification; computer software; formal
                 specification; software specification; trace
                 specification",
}

@Article{Hofri:1984:AIS,
  author =       "Micha Hofri",
  title =        "Analysis of Interleaved Storage via a Constant-Service
                 Queuing System with {Markov}-Chain-Driven Input",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "628--648",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1984.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A popular means of increasing the effective rate of
                 main storage accesses in a large computer is a
                 multiplicity of memory modules accessible in parallel.
                 Although such an organization usually achieves a net
                 gain in access rate, it also creates new modes of
                 congestion at the storage controller. This paper
                 analyzes the variables that describe such a congestion:
                 queue lengths and delays. A controller that maintains
                 separate register sets to accommodate the request queue
                 of each module is considered. The various processors
                 attached to the storage are assumed to generate, in
                 each memory cycle, a number of access requests with the
                 same given distribution. The addresses specified by
                 these requests (reduced to the module index) are
                 further assumed to follow the states of a first-order
                 Markov chain. The analysis then becomes one of a
                 single-server queueing system with constant service
                 time and indexed batch arrival process. Results are
                 derived for several descriptors of the congestion and
                 thus of the quality of service offered by such an
                 organization. The aim throughout is to embody the
                 results in a form readily suitable for numerical
                 evaluation.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technion-Israel Inst of Technology, Dep of
                 Computer Science, Haifa, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A popular means of increasing the effective rate of
                 main storage accesses in a large computer is a
                 multiplicity of memory accessible in parallel. Although
                 such an organization usually achieves a net gain in
                 access rate, it also creates new modes of congestion at
                 the storage controller. This paper analyzes the
                 variables that describe such a congestion: queue
                 lengths and delays \ldots{}.",
  classification = "723; 922",
  descriptors =  "Memory organization; performance evaluation;
                 analytical model; GB/D/1; waiting time; interleaved
                 memory",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "constant-service queueing system; data storage,
                 digital; interleaved storage; probability --- Queueing
                 Theory",
}

@Article{Atallah:1984:GPM,
  author =       "Mikhail J. Atallah and S. Rao Kosaraju",
  title =        "Graph Problems on a Mesh-Connected Processor Array",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "649--667",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/partition.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Algorithms that run in $O(n)$ steps are given for
                 solving a number of graph problems on an $n \times n$
                 array of processors. The problems considered include:
                 finding the bridges and articulation points of an
                 undirected graph, finding the length of a shortest
                 cycle, finding a minimum spanning tree, and a number of
                 other problems.",
  acknowledgement = ack-nhfb,
  affiliation =  "Johns Hopkins Univ, Dep of Electrical Engineering \&
                 Computer Science, Baltimore, MD, USA",
  affiliationaddress = "Johns Hopkins Univ, Dep of Electrical
                 Engineering \& Computer Science, Baltimore, MD, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; computer systems,
                 digital --- Parallel Processing; graph algorithms;
                 Graph Theory; Information processing; mathematical
                 techniques; mesh-connected processor array; time",
}

@Article{MeyeraufderHeide:1984:PLS,
  author =       "Friedhelm {Meyer auf der Heide}",
  title =        "A Polynomial Linear Search Algorithm for the
                 $n$-Dimensional Knapsack Problem",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "3",
  pages =        "668--676",
  month =        jul,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A linear search algorithm that recognizes the
                 $n$-dimensional knapsack problem in $2 n^4 \log n +
                 O(n^3)$ steps is presented. This algorithm works for
                 inputs consisting of $n$ numbers for some arbitrary but
                 fixed integer $n$. This result solves an open problem
                 posed by Dobkin\slash Lipton and A. C. C. Yao, among
                 others, and it destroys the hope of proving
                 nonpolynomial lower bounds for this NP-complete problem
                 in the model of linear search algorithms.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ Frankfurt, Fachbereich Informatik,
                 Frankfurt am Main, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "$n$-dimensional knapsack problem; Algorithms; computer
                 programming; np-completeness; polynomial linear search
                 algorithm",
}

@Article{Williamson:1984:DFS,
  author =       "S. G. Williamson",
  title =        "Depth-First Search and {Kuratowski} Subgraphs",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "681--693",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $G$ equals $(V, E)$ be a nonplanar graph. The
                 method of using depth-first techniques to extract a
                 Kuratowski subgraph in time $O(|V|)$ is shown.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California, San Diego, Dep of
                 Mathematics, La Jolla, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; computer programming; depth-first search;
                 graph algorithms; Kuratowski subgraphs; mathematical
                 techniques --- Graph Theory",
}

@Article{Greene:1984:CVA,
  author =       "Jonathan W. Greene and Abbas {El Gamal}",
  title =        "Configuration of {VLSI} Arrays in the Presence of
                 Defects",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "694--717",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The penalties for configuring VLSI arrays for yield
                 enhancement are assessed. Each element of the
                 fabricated array is assumed to be defective with
                 independent probability $p$. A fixed fraction $R$ of
                 the elements are to be connected into a prespecified
                 defect-free configuration by means of switched
                 interconnections. The probability that this can be
                 done, known as the yield, must be bounded away from
                 zero. The additional interconnections required increase
                 the integrated circuit's area by the area overhead
                 ratio AOR. Propagation delay is determined by the
                 maximum connection length $d$. A number of results are
                 shown.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford Univ, Information Systems Lab,
                 Stanford, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "714",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "integrated circuit manufacture; integrated circuits,
                 VLSI; propagation delay; VLSI; yield enhancement",
}

@Article{Beeri:1984:PPD,
  author =       "Catriel Beeri and Moshe Y. Vardi",
  title =        "A Proof Procedure for Data Dependencies",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "718--741",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A class of dependencies, tuple and equality generating
                 dependencies, is defined, and the chase process is
                 generalized to deal with these dependencies. For total
                 dependencies the chase is an exponential time decision
                 procedure for the implication problem, and in some
                 restricted cases it can be modified to run in
                 polynomial time. For nontotal dependencies the chase is
                 only a proof procedure. However, several cases for
                 which it is a decision procedure are shown. It is also
                 shown that equality is redundant for deciding
                 implication of tuple-generating dependencies, and is
                 `almost redundant' for deciding implication of
                 equality-generating dependencies.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Hebrew Univ of Jerusalem, Jerusalem, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data dependencies; database systems; proof procedure;
                 relational databases; Theory",
}

@Article{Cosmadakis:1984:URV,
  author =       "Stavros S. Cosmadakis and Christos H. Papadimitriou",
  title =        "Updates of Relational Views",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "742--760",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The problem of translating updates of database views
                 is studied. View updates are disambiguated by requiring
                 that a specified view complement (i.e., a second view
                 that contains all the information omitted from the
                 given view) remain constant during the translation.
                 Some of the computational problems related to the
                 application of this general methodology in the context
                 of relational databases are studied. Projective views
                 of databases that consist of a single relation and
                 satisfy functional dependencies are emphasized. After
                 characterizing complementary views, the authors show
                 that finding a minimum complement of a given view is
                 NP-complete. The problem of translating the insertion
                 of a tuple into a view is then studied in detail, and
                 the results are extended to the cases of deletion and
                 replacement of a tuple. Finally, the explicit
                 functional dependencies, a new kind of dependency that
                 intuitively states that some part of the database
                 information can be computed from the rest, are defined
                 and studied.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "MIT, Lab for Computer Science, Cambridge, MA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "based on constant complement criterium.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database systems; functional dependencies; join
                 dependencies; relational database theory; relational
                 databases; relational views; Theory; updates",
}

@Article{Imielinski:1984:IIR,
  author =       "Tomasz Imieli{\'n}ski and Witold {Lipski, Jr.}",
  title =        "Incomplete Information in Relational Databases",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "761--791",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper concerns the semantics of Codd's relational
                 model of data. Formulated are precise conditions that
                 should be satisfied in a semantically meaningful
                 extension of the usual relational operators, such as
                 projection, selection, union, and join, from operators
                 on tables with ``null values'' of various kinds
                 allowed. These conditions require that the system be
                 safe in the sense that no incorrect conclusion is
                 derivable by using a specified subset $\Omega$ of the
                 relational operators; and that it be complete in the
                 sense that all conclusions expressible by relational
                 expressions using operators in $\Omega$ are in fact
                 derivable in this system. Two such systems of practical
                 interest are shown. The first, based on the usual
                 Codd's null values, supports projection and selection.
                 The second, based on many different (``marked'') null
                 values or variables allowed to appear in a table, is
                 shown to correctly support projection, positive
                 selection (with no negation occurring in the selection
                 condition), union, and renaming of attributes, which
                 allows for processing arbitrary conjunctive queries. A
                 very desirable property enjoyed by this system is that
                 all relational operators on tables are performed in
                 exactly the same way as in the case of the usual
                 relations. A third system, mainly of theoretical
                 interest, supporting projection, selection, union,
                 join, and renaming, is also discussed. Under a
                 so-called closed world assumption, it can also handle
                 the operator of difference. It is based on a device
                 called a conditional table and is crucial to the proof
                 of the correctness of the second system. All systems
                 considered allow for relational expressions containing
                 arbitrarily many different relation symbols, and no
                 form of the universal relation assumption is
                 required.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Polish Acad of Sciences, Warsaw, Pol",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database systems; incomplete information; marked
                 nulls; model null values; null values; query language
                 semantics; query processing; relational algebra;
                 Relational database; relational databases; Theory",
}

@Article{Bojanczyk:1984:OAN,
  author =       "A. Boja{\'{n}}czyk",
  title =        "Optimal Asynchronous {Newton} Method for the Solution
                 of Nonlinear Equations",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "792--803",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A modification of Newton's method for the solution of
                 the equation F(x) equals 0 on a multiprocessor computer
                 is studied. A class of asynchronous Newton methods is
                 introduced and an optimal method in this class, as well
                 as its optimal parallel implementation, is shown. Then
                 the optimal asynchronous parallel method is compared
                 with the optimal asynchronous sequential method. It
                 turns out that no matter how many processes are used, a
                 Newton process (in the class of asynchronous Newton
                 methods) can be speeded up by at most a factor of 4.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Warsaw, Warsaw, Pol",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "asynchronous algorithms; asynchronous newton method;
                 computer programming --- Algorithms; computer systems,
                 digital --- Multiprocessing; mathematical techniques;
                 nonlinear equations; parallel algorithms",
}

@Article{Courtois:1984:BPE,
  author =       "P.-J. Courtois and P. Semal",
  title =        "Bounds for the Positive Eigenvectors of Nonnegative
                 Matrices and for Their Approximations by
                 Decomposition",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "804--825",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper deals with the positive eigenvectors of
                 nonnegative irreducible matrices that are merely
                 characterized by a given upper bound lambda on their
                 spectral radius and by a given matrix $L$ of lower
                 bounds for their elements. For any such matrix, the
                 normalized positive left (right) eigenvector is shown
                 to belong to the polyhedron the vertices of which are
                 given by the normalized rows (columns) of the matrix
                 $(\lambda I - L)^{-1}$. This polyhedron is proved to be
                 also the smallest closed convex set that is guaranteed
                 to contain the positive left (right) normalized
                 eigenvector; its vertices are therefore the best bounds
                 one can obtain. These results are then used to obtain
                 componentwise upper and lower bounds on the error that
                 is made when the positive eigenvectors of a large
                 nonnegative irreducible matrix have to be approximated
                 by a block decomposition and aggregation technique. The
                 computation of these bounds can itself be regarded as a
                 new approximation technique, called here bounded
                 aggregation. Finally, the particular case of stochastic
                 matrices is analyzed and a numerical example is
                 given.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Philips Research Lab, Brussels, Belg",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; decomposition;
                 mathematical techniques; Matrix Algebra; nonnegative
                 matrices; positive eigenvectors",
}

@Article{Calderbank:1984:OHS,
  author =       "A. R. Calderbank and E. G. {Coffman, Jr.} and L.
                 Flatto",
  title =        "Optimum Head Separation in a Disk System with Two
                 Read\slash Write Heads",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "826--838",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A mathematical model of computer disk storage devices
                 having two movable read\slash write heads is studied.
                 Storage addresses are approximated by points in the
                 continuous interval $[0,1]$, and requests for
                 information on the disk are processed
                 first-come-first-served. We assume that the disk heads
                 are maintained a fixed distance d apart; that is, in
                 processing a request, both heads are moved the same
                 distance in the same direction. Assuming that
                 successive requested locations are independently and
                 uniformly distributed over $[0,1]$, we calculate the
                 invariant measure of a Markov chain representing
                 successive head positions under the nearer-server rule:
                 Requests in $[0,d]$ are processed by the left head,
                 those in $[1 - d, 1]$ by the right head, and those in
                 $[d, 1 - d]$ by the nearer of the two heads. Our major
                 objective is the equilibrium expected distance $E(d)$
                 that the heads are moved in processing a request. For
                 the problem of designing the separation distance $d$,
                 we show that $E(0.44657) = 0.16059 = \min_d E(d)$.
                 Thus, a basic insight of the analysis is that a system
                 with two heads performs more than twice as well as a
                 system with a single head.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems --- Storage Allocation;
                 data storage units; disk system; optimum head
                 separation; read/write heads",
}

@Article{Melamed:1984:NCS,
  author =       "Benjamin Melamed and Micha Yadin",
  title =        "Numerical Computation of Sojourn-Time Distributions in
                 Queuing Networks",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "839--854",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:55:26 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1984.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Sojourn time distributions in queueing networks seldom
                 possess closed-form analytical solutions. When
                 overtaking is permitted, the sojourn times at
                 individual anodes are usually dependent, in which case
                 the attendant distribution is mathematically
                 intractable. In a previous paper the authors proposed a
                 methodology utilizing randomization procedures to
                 approximate sojourn time distributions in arbitrary
                 discrete-state Markovian queueing networks. This paper
                 addresses the computational aspects of the methodology
                 pertaining to implementation. Ways of improving the
                 accuracy of the approximated distribution functions are
                 also discussed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Holmdel, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "\ldots{} In a previous paper the authors proposed a
                 methodology utilizing randomization procedures to
                 approximate sojourn time distributions in arbitrary
                 discrete-state Markovian queuing networks. This paper
                 addresses the computational aspects of the methodology
                 pertaining to implementation. Ways of improving the
                 accuracy of the approximated distribution functions are
                 also discussed.",
  classification = "723; 921; 922",
  descriptors =  "Exponential queueing network; queueing approximation;
                 time in system",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; mathematical techniques
                 --- Numerical Analysis; Performance; probability ---
                 Queueing Theory; sojourn-time distributions",
}

@Article{Mitra:1984:PMD,
  author =       "Debasis Mitra and P. J. Weinberger",
  title =        "Probabilistic Models of Database Locking: {Solutions},
                 Computational Algorithms, and Asymptotics",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "855--878",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The difficult feature in locking is the interference
                 phenomenon, by which we mean that if a particular item
                 in the database is locked, which is true in our model
                 for all constituent items of all transactions
                 undergoing processing, then all arriving transactions
                 requiring this particular item are blocked. The
                 interference phenomenon is exactly modeled, and exact
                 formulas for equilibrium database performance, such as
                 mean concurrency and throughput, and efficient
                 algorithms for their computation, are obtained.
                 Formulas for large databases are derived and proved to
                 be asymptotic; this formula is insightful and found to
                 fit well to exact solutions. The probabilistic model is
                 a Markov process with combinatorial quantities as
                 transition rates. This model is tractable because of
                 the time reversibility of the equilibrium Markov
                 process.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; concurrency;
                 database locking; database systems; probability;
                 serializability; Theory",
}

@Article{Bloniarz:1984:ASH,
  author =       "P. A. Bloniarz and H. B. {Hunt, III} and D. J.
                 Rosenkrantz",
  title =        "Algebraic Structures with Hard Equivalence and
                 Minimization Problems",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "879--904",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The relationship between the setting in which an
                 algebraic problem is posed and the complexity of
                 solving the problem is considered. The problems studied
                 are equivalence, minimization, and approximate
                 minimization problems for formulas involving variables,
                 parentheses, operators, and (optionally) constants.
                 General sufficient conditions on an algebraic structure
                 for these problems to be NP-or coNP-hard are presented.
                 Applications are given to a number of specific
                 algebraic structures of independent interest including
                 lattices, semirings, regular algebras, finite fields,
                 rings $Z_k$, and Boolean rings. Applications are also
                 given to systems of rewrite rules and to several simple
                 programming languages.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "State Univ of New York at Albany, Computer
                 Science Dep, Albany, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algebraic structures; computer metatheory; computer
                 programming languages --- Theory; hard equivalence;
                 rewrite rules",
}

@Article{Pachl:1984:LBD,
  author =       "J. Pachl and E. Korach and D. Rotem",
  title =        "Lower Bounds for Distributed Maximum-Finding
                 Algorithms",
  journal =      j-J-ACM,
  volume =       "31",
  number =       "4",
  pages =        "905--918",
  month =        oct,
  year =         "1984",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This paper establishes several lower bounds for the
                 form $\Omega(n \log n)$ for the number of messages
                 needed to find the maximum label in a circular
                 configuration of $n$ labeled processes with no central
                 controller.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Waterloo, Dep of Computer Science,
                 Waterloo, Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer programming ---
                 Algorithms; distributed maximum-finding algorithms;
                 lower bounds",
}

@Article{Bagchi:1985:TAH,
  author =       "A. Bagchi and A. Mahanti",
  title =        "Three Approaches to Heuristic Search in Networks",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "1--27",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2458.html",
  abstract =     "Three different approaches to heuristic search in
                 networks are analyzed. In the first approach, the basic
                 idea is to choose for expansion that node for which the
                 evaluation function has a minimum value. In the second
                 approach, a node that is expanded once is not expanded
                 again; instead, a `propagation' of values takes place.
                 The third approach is an adaptation for networks of an
                 AND\slash OR graph `marking' algorithm. Five algorithms
                 are presented. The performances of these algorithms are
                 compared for both admissible and inadmissible
                 heuristics.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Indian Inst of Management Calcutta, Calcutta,
                 India",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 731; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "admissible/inadmissible heuristics; algorithms; arc
                 marking; computer networks --- Protocols; computer
                 programming --- Algorithms; control systems ---
                 Analysis; Heuristic Programming; heuristic search
                 algorithms; mathematical techniques --- Graph Theory;
                 measurement; performance; search graph; systems science
                 and cybernetics; theory",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search.",
}

@Article{Mahanti:1985:GHS,
  author =       "A. Mahanti and A. Bagchi",
  title =        "{AND\slash OR} Graph Heuristic Search Methods",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "28--51",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2459.html",
  abstract =     "Two new marking algorithms for AND\slash OR graphs
                 called CF and CS are presented. For admissible
                 heuristics CS is not needed, and CF is shown to be
                 preferable to the marking algorithms of Martelli and
                 Montanari. When the heuristic is not admissible, the
                 analysis is carried out with the help of the notion of
                 the first and second discriminants of an AND\slash OR
                 graph. It is proved that in this case CF can be
                 followed by CS to get optimal solutions, provided the
                 sumcost criterion is used and the first discriminant
                 equals the second. Estimates of time and storage
                 requirements are given. Other cost measures, such as
                 maxcost, are also considered, and a number of
                 interesting open problems are enumerated.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Indian Inst of Management Calcutta, Calcutta,
                 India",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 731; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer networks --- Protocols; computer
                 programming --- Algorithms; control systems ---
                 Analysis; discriminant; Heuristic Programming;
                 heuristic search methods; mathematical techniques ---
                 Graph Theory; maxcost; potential solution graph;
                 sumcost; systems science and cybernetics; theory;
                 verification",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Graph and tree search strategies. {\bf I.2.8}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Problem Solving, Control Methods, and Search, Heuristic
                 methods. {\bf F.2.2}: Theory of Computation, ANALYSIS
                 OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms.",
}

@Article{Lamport:1985:SCP,
  author =       "Leslie Lamport and P. M. Melliar-Smith",
  title =        "Synchronizing Clocks in the Presence of Faults",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "52--78",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2457.html",
  abstract =     "Algorithms are described for maintaining clock
                 synchrony in a distributed multiprocess system where
                 each process has its own clock. These algorithms work
                 in the presence of arbitrary clock or process failures,
                 including ``two-faced clocks'' that present different
                 values to different processes. Two of the algorithms
                 require that fewer than one-third of the processes be
                 faulty. A third algorithm works if fewer than half the
                 processes are faulty, but requires digital
                 signatures.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "SRI Int, Menlo Park, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "705; 722; 723; 943",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Byzantine failures; clocks, electric ---
                 Synchronization; computer programming --- Algorithms;
                 computer systems programming --- Multiprocessing
                 Programs; computer systems, digital; Fault Tolerant
                 Capability; interactive convergence algorithm;
                 reliability; theory; verification; Zeitliche Ordnung",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Synchronization. {\bf D.4.5}: Software,
                 OPERATING SYSTEMS, Reliability, Fault-tolerance. {\bf
                 D.4.7}: Software, OPERATING SYSTEMS, Organization and
                 Design, Real-time and embedded systems.",
}

@Article{Abiteboul:1985:DD,
  author =       "Serge Abiteboul",
  title =        "Disaggregations in Databases",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "79--101",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:55:43 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2463.html",
  abstract =     "An algebraic foundation of database schema design is
                 presented. A new database operator, namely,
                 disaggregation, is introduced. Beginning with `free'
                 families, repeated applications of disaggregation and
                 three other operators (matching function, Cartesian
                 product, and selection) yield families of increasingly
                 elaborate structure. In particular, families defined by
                 one join dependency and several `embedded' functional
                 dependencies can be obtained in this manner.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Southern California, Los Angeles, CA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 901; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Cartesian product; computer programming
                 --- Theory; computer systems programming --- Design;
                 data storage, digital --- Associative; database
                 systems; dependency families; Design; design;
                 disaggregation; functional dependencies; information
                 retrieval systems; matching functions; mathematical
                 techniques --- Algebra; theory; verification",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Schema and subschema. {\bf H.2.1}:
                 Information Systems, DATABASE MANAGEMENT, Logical
                 Design, Data models.",
}

@Article{Fuchs:1985:MCT,
  author =       "Ken Fuchs and Dennis Kafura",
  title =        "Memory-Constrained Task Scheduling on a Network of
                 Dual Processors",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "102--129",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2456.html",
  abstract =     "One aspect of network design is the extent to which
                 memory is shared among the processing elements. In this
                 paper a model with limited sharing (only two processors
                 connected to each memory) is analyzed and its
                 performance compared with the performance of two other
                 models that have appeared in the literature. One of
                 these is a model of multiple processors sharing a
                 single memory; the other model considers a
                 multiprocessor configuration in which each processor
                 has its own dedicated memory. The tasks processed by
                 these networks are described by both time and memory
                 requirements. The largest-memory-first (LMF) scheduling
                 algorithm is employed and its performance with respect
                 to an enumerative optimal scheduling algorithm is
                 bounded. On the basis of this measure it is concluded
                 that memory sharing is only desirable on very small
                 networks and is disadvantageous on networks of larger
                 size.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Iowa State Univ, Ames, IA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks --- Protocols; computer operating
                 systems --- Storage Allocation; computer systems
                 programming --- Time Sharing Programs; computer
                 systems, digital; computers --- Operating Procedures;
                 computers, digital --- Circuits; design; deterministic
                 scheduling; distributed memories; dual processing;
                 measurement; memory management; performance;
                 Scheduling; scheduling algorithms; theory",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Scheduling. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Modeling
                 techniques. {\bf D.4.2}: Software, OPERATING SYSTEMS,
                 Storage Management, Distributed memories. {\bf C.2.4}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Distributed Systems, Network operating
                 systems.",
}

@Article{Hochbaum:1985:ASC,
  author =       "Dorit S. Hochbaum and Wolfgang Maass",
  title =        "Approximation Schemes for Covering and Packing
                 Problems in Image Processing and {VLSI}",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "130--136",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Graphics/rosenfeld/1985.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214106.html",
  abstract =     "A unified and powerful approach is presented for
                 devising polynomial approximation schemes for many
                 strongly NP-complete problems. The unified technique
                 that is introduced here, referred to as the shifting
                 strategy, is applicable to numerous geometric covering
                 and packing problems. The method of using the technique
                 and how it varies with problem parameters are
                 illustrated. A similar technique, independently devised
                 by B. S. Baker, was shown to be applicable for covering
                 and packing problems on planar graphs.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California, Berkeley, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 covering; data storage, magnetic --- Storage Devices;
                 geometrical problems; image part pattern; image
                 processing; integrated circuits, VLSI; mathematical
                 programming; mathematical techniques --- Polynomials;
                 nonnumerical algorithms; polynomial approximation
                 scheme; shifting strategy; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations.",
}

@Article{Hennessy:1985:ALN,
  author =       "Matthew Hennessy and Robin Milner",
  title =        "Algebraic Laws for Nondeterminism and Concurrency",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "137--161",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2460.html",
  abstract =     "Since a nondeterministic and concurrent program may,
                 in general, communicate repeatedly with its
                 environment, its meaning cannot be presented naturally
                 as an input\slash output function (as is often done in
                 the denotational approach to semantics). In this paper,
                 an alternative is put forth. First, a definition is
                 given of what it is for two programs or program parts
                 to be equivalent for all observers; then two program
                 parts are said to be observation congruent if they are,
                 in all program contexts, equivalent. The behavior of a
                 program part, that is, its meaning, is defined to be
                 its observation congruence class. The paper
                 demonstrates, for a sequence of simple languages
                 expressing finite (terminating) behaviors, that in each
                 case observation congruence can be axiomatized
                 algebraically. Moreover, with the addition of recursion
                 and another simple extension, the algebraic language
                 described here becomes a calculus for writing and
                 specifying concurrent programs and for proving their
                 properties.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Edinburgh, Edinburgh, Scotl",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "communicating process; computer metatheory; computer
                 programming languages; languages; logic design ---
                 Computer Applications; mathematical techniques ---
                 Algebra; nondeterministic programs; observation
                 congruent; observational equivalence; pcalc equivalence
                 ccs binder(ccs); semantics; Theory; theory;
                 verification",
  subject =      "{\bf F.3.2}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages. {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming. {\bf D.3.1}:
                 Software, PROGRAMMING LANGUAGES, Formal Definitions and
                 Theory, Semantics. {\bf D.3.2}: Software, PROGRAMMING
                 LANGUAGES, Language Classifications, CSP. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications.",
}

@Article{Vantilborgh:1985:AE,
  author =       "Hendrik Vantilborgh",
  title =        "Aggregation with an Error of ${O}(\epsilon^2)$",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "162--190",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214107.html",
  abstract =     "An aggregative technique to obtain an improved
                 approximation of the equilibrium vector of a Markov
                 chain with a nearly completely decomposable transition
                 matrix is presented. The technique is demonstrated on a
                 model of a multiprogrammed computer system.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Commission of the European Communities,
                 Brussels, Belg",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "aggregative techniques; computer systems programming;
                 computers --- Operating Procedures; Markov chains;
                 mathematical techniques --- Linear Algebra;
                 Multiprogramming; near-complete decomposability;
                 performance; probability --- Queueing Theory; queueing
                 networks; systems performance; theory",
  subject =      "{\bf G.1.3}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Numerical Linear Algebra. {\bf C.4}: Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS, Modeling
                 techniques. {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance. {\bf G.m}: Mathematics of Computing,
                 MISCELLANEOUS, Queueing theory.",
}

@Article{Dolev:1985:BIE,
  author =       "Danny Dolev and R{\"u}diger Reischuk",
  title =        "Bounds on Information Exchange for {Byzantine}
                 Agreement",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "191--204",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214112.html",
  abstract =     "Byzantine Agreement has become increasingly important
                 in establishing distributed properties when errors may
                 exist in the system. Recent polynomial algorithms for
                 reaching Byzantine Agreement provide one with feasible
                 solutions for obtaining coordination and
                 synchronization in distributed systems. In this paper
                 the amount of information exchange necessary to ensure
                 Byzantine Agreement is studied. First it is shown that
                 $\Omega(n t)$ is a lower bound for the number of
                 signatures for any algorithm using authentication,
                 where $n$ denotes the number of processors and t the
                 upper bound on the number of faults the algorithm is
                 supposed to handle. If $n$ is large compared to $t$,
                 these bounds match the upper bounds from previously
                 known algorithms. For the number of messages in the
                 authenticated case the authors prove the lower bound
                 $\Omega(n + t^2)$. Finally algorithms that achieve this
                 bound are presented.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IBM, Research Lab, San Jose, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Byzantine agreement; computer networks ---
                 Measurements; computer operating systems; computer
                 programming --- Algorithms; computer systems, digital
                 --- Distributed; mathematical techniques ---
                 Polynomials; polynomial algorithms; reliability;
                 reliability verification; Theory; theory",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Network operating systems. {\bf D.4.5}: Software,
                 OPERATING SYSTEMS, Reliability, Verification.",
}

@Article{Even:1985:HCT,
  author =       "Shimon Even and Alan L. Selman and Yacov Yacobi",
  title =        "Hard-Core Theorems for Complexity Classes",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "205--217",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214111.html",
  abstract =     "It has been proved that if a decision problem A is not
                 solvable in polynomial time, then there exists an
                 infinite recursive subset $X$ of its domain on which
                 the decision is almost everywhere complex. In this
                 paper, general theorems of this kind that can be
                 applied to several well-known automata-based complexity
                 classes, including a common class of randomized
                 algorithms, are proved.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technion, Haifa, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "alternation and nondeterminism; automata theory;
                 complexity classes; computation theory; computer
                 metatheory --- Probabilistic Logics; computer
                 programming --- Algorithms; mathematical techniques ---
                 Applications; probabilistic computation; randomized
                 algorithms; systems science and cybernetics ---
                 Hierarchical Systems; Theorem Proving; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Complexity
                 hierarchies. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Probabilistic computation. {\bf F.1.3}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity
                 classes.",
}

@Article{Klawe:1985:TBB,
  author =       "Maria M. Klawe",
  title =        "A Tight Bound for Black and White Pebbles on the
                 Pyramid",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "218--228",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214115.html",
  abstract =     "T. Lenguer and R. Tarjan proved that the number of
                 black and white pebbles needed to pebble the root of a
                 tree is at least half the number of black pebbles
                 needed to pebble the root. This result is extended to a
                 larger class of acyclic directed graphs including
                 pyramid graphs.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IBM, Research Lab, San Jose, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory --- Computability and Decidability;
                 computer programming --- Algorithms; computers, digital
                 --- General Purpose Application; Coue generation; Graph
                 Theory; mathematical techniques; nondeterminism;
                 nonnumerical algorithms; pebbling; pyramid; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism.",
}

@Article{Lagarias:1985:SLD,
  author =       "J. C. Lagarias and A. M. Odlyzko",
  title =        "Solving Low-Density Subset Sum Problems",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "229--246",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2461.html",
  abstract =     "The subset sum problem is to decide whether or not a
                 $0$--$1$ integer programming problem which is
                 NP-complete, has a solution. The difficulty of solving
                 it is the basis of public-key cryptosystems of knapsack
                 type. An algorithm is proposed that searches for a
                 solution when given an instance of the subset sum
                 problem. This algorithm always halts in polynomial time
                 but does not always find a solution when one exists. It
                 converts the problem to one of finding a particular
                 short vector in a lattice, and then uses a lattice
                 basis reduction algorithm to attempt to find this short
                 vector. The performance of the proposed algorithm is
                 analyzed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; automata theory --- Theorem
                 Proving; computer programming; computers, digital ---
                 Special Purpose Application; cryptography ---
                 Applications; data encryption; discrete mathematics;
                 integer lattice; measurement; public-key cryptosystems;
                 security; subset sum problems; theory; verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Number-theoretic computations. {\bf E.3}:
                 Data, DATA ENCRYPTION. {\bf G.1.6}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Optimization, Integer
                 programming. {\bf G.2.m}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Miscellaneous.",
}

@Article{Bauer:1985:SCS,
  author =       "M. A. Bauer",
  title =        "Soundness and Completeness of a Synthesis Algorithm
                 Based on Example Computations",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "249--279",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3150.html",
  abstract =     "The problem of synthesizing a procedure from example
                 computations is examined. An algorithm for this task is
                 presented, and its success is considered. To do this, a
                 model of procedures and example computations is
                 introduced, and the class of acceptable examples is
                 defined. The synthesis algorithm is shown to be
                 successful, with respect to the model of procedures and
                 examples, from two perspectives. First, it is shown to
                 be sound, that is, that the procedure synthesized from
                 a set of examples produces the same result as the
                 intended one on the inputs used to generate that set of
                 examples. Second, it is shown to be complete, that is,
                 that for any procedure in the class of procedures,
                 there exists a finite set of examples such that the
                 procedure synthesized behaves as the intended one on
                 all inputs for which the intended one halts.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Western Ontario, London, Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; automatic programming;
                 computer metatheory --- Programming Theory; computer
                 programming; synthesis algorithm; theory;
                 verification",
  subject =      "{\bf I.2.2}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Automatic Programming, Program synthesis.
                 {\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Induction. {\bf F.3.3}: Theory
                 of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Studies of Program Constructs.",
}

%% Page 196 is notice page
@Article{Gottlob:1985:ESA,
  author =       "G. Gottlob and A. Leitsch",
  title =        "On the Efficiency of Subsumption Algorithms",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "280--295",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214118.html",
  abstract =     "The costs of subsumption algorithms are analyzed by an
                 estimation of the maximal number of unification
                 attempts (worst-case unification complexity) made for
                 deciding whether a clause C subsumes a clause D. First,
                 two well-known algorithms are investigated. Both
                 algorithms are shown to have a very high worst-case
                 time complexity. Then, a new subsumption algorithm is
                 defined, which is based on an analysis of the
                 connection between variables and predicates in C. An
                 upper bound for the worst-case unification complexity
                 of this algorithm, which is much lower than the lower
                 bounds for the two other algorithms, is derived.
                 Examples in which exponential costs are reduced to
                 polynomial costs are discussed. Finally, the asymptotic
                 growth of the worst-case complexity for all discussed
                 algorithms is shown in a table (for several
                 combinations of the parameters).",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technische Univ Wien, Vienna, Aust",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "unification, prolog",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; computer metatheory ---
                 Programming Theory; computer programming; performance;
                 subsumption algorithms; theorem-proving programs;
                 theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Complexity of proof
                 procedures. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Mechanical theorem proving. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Resolution.",
}

@Article{Wang:1985:FVS,
  author =       "Ching-Chy Wang and Errol L. Lloyd and Mary Lou Soffa",
  title =        "Feedback Vertex Sets and Cyclically Reducible Graphs",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "296--313",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3159.html",
  abstract =     "The problem of finding a minimum cardinality feedback
                 vertex set of a directed graph is considered. The main
                 result is a new class of graphs --- the cyclically
                 reducible graphs --- for which minimum feedback vertex
                 sets can be found in polynomial time. This class is not
                 restricted to flow graphs, and most small graphs (10 or
                 fewer nodes) fall into this class. The identification
                 of this class is particularly important since there do
                 not exist approximation algorithms for this problem
                 having a provably good worst case performance. Along
                 with a simple polynomial-time algorithm for finding
                 minimum feedback vertex sets of graphs in the class, it
                 is shown that there is no `forbidden subgraph'
                 characterization of the class and that there is no
                 particular inclusion relationship between this class
                 and the reducible flow graphs.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IBM, Thomas J. Watson Research Cent, Yorktown
                 Heights, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer metatheory; cyclically reducible
                 graphs; feedback vertex sets; Graph Theory;
                 mathematical techniques; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf D.4.1}: Software, OPERATING SYSTEMS,
                 Process Management, Concurrency. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Deadlocks. {\bf
                 D.4.5}: Software, OPERATING SYSTEMS, Reliability,
                 Backup procedures. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Path and
                 circuit problems.",
}

@Article{Buckley:1985:BTP,
  author =       "G. N. Buckley and A. Silberschatz",
  title =        "Beyond Two-Phase Locking",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "314--326",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3151.html",
  abstract =     "Many database systems maintain the consistency of the
                 data by using a locking protocol to restrict access of
                 data items. It has been previously shown that if no
                 information is known about the method of accessing
                 items in the database, then the two-phase protocol is
                 optimal. However, the use of structural information
                 about the database allows development of non-two-phase
                 protocols, called graph protocols, that can potentially
                 increase efficiency. Yannakakis developed a general
                 class of protocols that included many of the graph
                 protocols. Graph protocols either are only usable in
                 certain types of databases or can incur the performance
                 liability of cascading rollback. In this paper, it is
                 demonstrated that if the system has a priori
                 information as to which data items will be locked first
                 by various transactions, a new graph protocol that is
                 outside the previous classes of graph protocols and is
                 applicable to arbitrarily structured databases can be
                 constructed. This new protocol avoids cascading
                 rollback and its accompanying performance degradation,
                 and extends the class of serializable sequences allowed
                 by non-two-phase protocols. This is the first protocol
                 shown to be always as effective as the two-phase
                 protocol, and it can be more effective for certain
                 types of database systems.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Texas at Austin, Austin, TX, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "graph protocols with a-priori knowledge outperform 2PL
                 without deadlock.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 concurrency; database concurrency control; database
                 systems; locking protocols; serializability; theory",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Transaction processing.",
}

@Article{Baker:1985:ARC,
  author =       "Brenda S. Baker and Edward G. {Coffman, Jr.} and Dan
                 E. Willard",
  title =        "Algorithms for Resolving Conflicts in Dynamic Storage
                 Allocation",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "327--343",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In dynamic storage allocation, successive allocation
                 and freeing of blocks normally leads to fragmentation
                 of storage. When a new block is to be allocated,
                 fragmentation may prevent any single region of
                 available storage from being large enough for the new
                 block, even though the total amount of available space
                 is sufficient. When such a conflict arises, dynamic
                 storage allocation systems typically require
                 time-consuming garbage collection or they simply break
                 down. This paper investigates strategies for
                 maintaining storage that allow allocation of blocks to
                 proceed in spite of fragmentation conflicts, as the
                 cost of moving some blocks already allocated are
                 investigated.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer programming ---
                 Algorithms; conflict resolution; dynamic storage
                 allocation; Storage Allocation",
}

@Article{GonzalezSmith:1985:PAD,
  author =       "M. E. {Gonzalez Smith} and J. A. Storer",
  title =        "Parallel Algorithms for Data Compression",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "344--373",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3152.html",
  abstract =     "Parallel algorithms for data compression by textual
                 substitution that are suitable for VLSI implementation
                 are studied. Both `static' and `dynamic' dictionary
                 schemes are considered.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Brandeis Univ, Waltham, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; computer programming; computer
                 systems, digital --- Parallel Processing; data
                 compression; image information; parallel algorithms;
                 statistics; theory; verification; VLSI",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY, Data
                 compaction and compression. {\bf B.7.1}: Hardware,
                 INTEGRATED CIRCUITS, Types and Design Styles, VLSI
                 (very large scale integration). {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems. {\bf
                 G.1.0}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 General, Parallel algorithms. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Pattern matching. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Routing and layout.",
}

@Article{Fischer:1985:IDC,
  author =       "Michael J. Fischer and Nancy A. Lynch and Michael S.
                 Paterson",
  title =        "Impossibility of Distributed Consensus with One Faulty
                 Process",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "374--382",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "This paper proves that every completely asynchronous,
                 deterministic algorithm for Byzantine agreement has the
                 possibility of nontermination, even with only one
                 faulty processor. This impossibility result does not
                 hold in the synchronous case. For completely
                 asynchronous {\em probabilistic\/} algorithms, the
                 problem is avoided since termination is only required
                 with probability 1. See Section xxx for an example of
                 such a probabilistic algorithm for asynchronous
                 Byzantine agreement.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214121.html",
  abstract =     "The consensus problem involves an asynchronous system
                 of processes, some of which may be unreliable. The
                 problem is for the reliable processes to agree on a
                 binary value. In this paper, it is shown that every
                 protocol for this problem has the possibility of a
                 nontermination, even with only one faulty process. By
                 way of contrast, solutions are known for the
                 synchronous case, the `Byzantine Generals' problem.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Yale Univ, New Haven, CT, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Byzantine generals problem; computer
                 metatheory; computer systems, digital; database
                 operating system commit processing; Distributed;
                 distributed consensus; fault tolerance; reliability;
                 theory",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Network operating systems. {\bf C.2.2}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Network Protocols, Protocol architecture. {\bf C.2.4}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Distributed Systems, Distributed
                 applications. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed databases. {\bf C.4}:
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS.
                 {\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf H.2.4}: Information Systems, DATABASE
                 MANAGEMENT, Systems, Distributed systems.",
}

@Article{Cornuejols:1985:TSP,
  author =       "G. Cornu{\'e}jols and D. Naddef and W. Pulleyblank",
  title =        "The Traveling Salesman Problem in Graphs with $3$-Edge
                 Cutsets",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "383--410",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 01 16:58:05 2002",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3154.html",
  abstract =     "This paper analyzes decomposition of a graph that,
                 when they occur, permit a polynomial solution of the
                 traveling salesman problem and a description of the
                 traveling salesman polytope by a system of linear
                 equalities and inequalities. The central notion is that
                 of a 3-edge cutset, namely, a set of 3 edges that, when
                 removed, disconnects the graph. Conversely, our
                 approach can be used to construct classes of graphs for
                 which there exists a polynomial algorithm for the
                 traveling salesman problem. The approach is illustrated
                 on two examples, Halin graphs and prismatic graphs.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Carnegie-Mellon Univ, Pittsburgh, PA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms; graph
                 algorithms; graph decompositions; Graph Theory;
                 mathematical programming, linear; mathematical
                 techniques; optimization; polynomial algorithms;
                 traveling salesman problem",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms.",
}

@Article{Staples:1985:FSN,
  author =       "John Staples and V. L. Nguyen",
  title =        "A Fixpoint Semantics for Nondeterministic Data Flow",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "411--444",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3155.html",
  abstract =     "Criteria for adequacy of a data flow semantics are
                 discussed and G. Kahn's successful semantics for
                 functional (deterministic) data flow is reviewed.
                 Problems arising from nondeterminism are introduced and
                 the paper's approach to overcoming them is introduced.
                 The approach is based on generalizing the notion of
                 input-output relation, essentially to a partially
                 ordered multiset of input-output histories. The
                 Brock-Ackerman anomalies concerning the input-output
                 relation model of nondeterministic data flow are
                 reviewed, and it is indicated how the proposed approach
                 avoids them. A new anomaly is introduced to motivate
                 the use of multisets. A formal theory of asynchronous
                 processes is then developed. The main result is that
                 the operation of forming a process from a network of
                 component processes is associative. This result shows
                 that the approach is not subject to anomalies such as
                 that of Brock and Ackerman.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Queensland, St. Lucia, Aust",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; computer programming languages;
                 fixpoint semantics; languages; nondeterministic data
                 flow; Theory; theory; verification",
  subject =      "{\bf F.3.2}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages, Denotational semantics. {\bf F.1.2}: Theory
                 of Computation, COMPUTATION BY ABSTRACT DEVICES, Modes
                 of Computation, Alternation and nondeterminism.",
}

@Article{Tantawi:1985:OSL,
  author =       "Asser N. Tantawi and Don Towsley",
  title =        "Optimal Static Load Balancing In Distributed Computer
                 Systems",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "445--465",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3156.html",
  abstract =     "A distributed computer system that consists of a set
                 of heterogeneous host computers connected in an
                 arbitrary fashion by a communications network is
                 considered. A general model is developed for such a
                 distributed computer system, in which the host
                 computers and the communications network are
                 represented by product-form queueing networks. Two
                 efficient algorithms that determine the optimal load on
                 each host computer are presented. The first, called the
                 parametric-study algorithm, generates the optimal
                 solution as a function of the communication time and is
                 suited for the study of the effect of the speed of the
                 communications network on the optimal solution. The
                 second is a single-point algorithm; it yields the
                 optimal solution for given system parameters. Queueing
                 models of host computers, communications networks, and
                 a numerical example are illustrated.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IBM, Thomas J. Watson Research Cent, Yorktown
                 Heights, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 computer systems, digital; design; Distributed; load
                 balancing; load sharing; optimal static load balancing;
                 parametric-study algorithm; performance; reliability;
                 routing; single-point algorithm; theory",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Modeling techniques. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Modeling and
                 prediction. {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance, Queueing theory. {\bf G.1.6}: Mathematics
                 of Computing, NUMERICAL ANALYSIS, Optimization,
                 Nonlinear programming. {\bf K.6.4}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, System
                 Management, Centralization/decentralization.",
}

@Article{Gurari:1985:DPP,
  author =       "Eitan M. Gurari",
  title =        "Decidable Problems for Powerful Programs",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "466--483",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Math/hilbert10.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3157.html",
  abstract =     "Two of the most powerful classes of programs for which
                 interesting decision problems are known to be solvable
                 are the class of finite-memory programs and the class
                 of programs that characterize the Presburger, or
                 semilinear, sets. In this paper, a new class of
                 programs that present solvable decision problems
                 similar to the other two classes of programs is
                 introduced. However, the programs in the new class are
                 shown to be computationally more powerful (i.e.,
                 capable of defining larger sets of input-output
                 relations).",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Ohio State Univ, Columbus, OH, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory --- Programming Theory; computer
                 programming; decidable problems; languages;
                 pspace-completeness; Theory; theory",
  subject =      "{\bf F.3.3}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Studies of Program Constructs,
                 Control primitives. {\bf D.3.2}: Software, PROGRAMMING
                 LANGUAGES, Language Classifications. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features, Control structures. {\bf F.1.1}: Theory
                 of Computation, COMPUTATION BY ABSTRACT DEVICES, Models
                 of Computation, Automata. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems. {\bf
                 F.3.3}: Theory of Computation, LOGICS AND MEANINGS OF
                 PROGRAMS, Studies of Program Constructs, Control
                 primitives.",
}

@Article{Skyum:1985:CTB,
  author =       "S. Skyum and L. G. Valiant",
  title =        "A Complexity Theory Based on {Boolean} Algebra",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "2",
  pages =        "484--502",
  month =        apr,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3158.html",
  abstract =     "A projection of a Boolean function is a function
                 obtained by substituting for each of its variables a
                 variable, the negation of a variable, or a constant.
                 Reducibilities among computational problems under this
                 relation of projection are considered. It is shown that
                 much of what is of everyday relevance in
                 Turing-machine-based complexity theory can be
                 replicated easily and naturally in this elementary
                 framework. Finer distinctions about the computational
                 relationships among natural problems can be made than
                 in previous formulations and some negative results are
                 proved.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Edinburgh, Edinburgh, Scotl",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Boolean algebra; complexity theory;
                 computer metatheory; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Reducibility and
                 completeness. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Unbounded-action devices. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Relations among modes.",
}

@Article{Dechter:1985:GBF,
  author =       "Rina Dechter and Judea Pearl",
  title =        "Generalized Best-First Search Strategies and the
                 Optimality of {A*}",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "505--536",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3830.html",
  abstract =     "This paper reports several properties of heuristic
                 best-first search strategies whose scoring functions
                 $f$ depend on all the information available from each
                 candidate path, not merely on the current cost $g$ and
                 the estimated completion cost $h$. It is shown that
                 several known properties of A* retain their form (with
                 the minmax of $f$ playing the role of the optimal
                 cost), which helps establish general tests of
                 admissibility and general conditions for node expansion
                 for these strategies. On the basis of this framework
                 the computational optimality of A*, in the sense of
                 never expanding a node that can be skipped by some
                 other algorithm having access to the same heuristic
                 information that A* uses, is examined. A hierarchy of
                 four optimality types is defined, and three classes of
                 algorithms and four domains of problem instances are
                 considered. Computational performances relative to
                 these algorithms and domains are appraised.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, Los Angeles, Cognitive Systems
                 Lab, Los Angeles, CA, USA",
  affiliationaddress = "Univ of California, Los Angeles, Cognitive
                 Systems Lab, Los Angeles, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Artificial Intelligence; best-first search strategies;
                 computer programming --- Algorithms; heuristic search;
                 measurement; performance; shortest path algorithms;
                 systems science and cybernetics; theory",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Graph and tree search strategies.",
}

@Article{Bender:1985:ESF,
  author =       "Edward A. Bender and Jon T. Butler",
  title =        "Enumeration of Structured Flowcharts",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "537--548",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3832.html",
  abstract =     "An analysis of structured flowcharts is presented,
                 where size is measured by the number, $n$, of decision
                 nodes (IF-THEN-ELSE and DO-WHILE nodes). For all
                 classes of structured flowcharts considered, the number
                 of charts is approximately $c n^{-3/2} \gamma^n$ for
                 large $n$, where $c$ and $\gamma$ are parameters that
                 depend on the class. It is also shown that most large
                 flowcharts consist of a short sequence of basic charts
                 (IF-THEN-ELSE and DO-WHILE charts). The average length
                 of such sequences is 2.5.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California, San Diego, Dep of
                 Mathematics, La Jolla, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "BJ-charts; computer programming; D-charts; flowchart
                 enumeration; structured flowcharts; Structured
                 Programming; theory",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, Flow charts. {\bf D.2.2}: Software,
                 SOFTWARE ENGINEERING, Tools and Techniques, Top-down
                 programming. {\bf D.2.2}: Software, SOFTWARE
                 ENGINEERING, Tools and Techniques, Structured
                 programming. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Generating
                 functions. {\bf D.3.3}: Software, PROGRAMMING
                 LANGUAGES, Language Constructs and Features, Control
                 structures.",
}

@Article{Cunningham:1985:OAR,
  author =       "William H. Cunningham",
  title =        "Optimal Attack and Reinforcement of a Network",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "549--561",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3829.html",
  abstract =     "In a nonnegative edge-weighted network, the weight of
                 an edge represents the effort required by an attacker
                 to destroy the edge, and the attacker derives a benefit
                 for each new component created by destroying edges. The
                 attacker may want to minimize over subsets of edges the
                 difference between (or the ratio of) the effort
                 incurred and the benefit received. This ideal leads to
                 the definition of the `strength' of the network, a
                 measure of the resistance of the network to such
                 attacks. Efficient algorithms for the optimal attack
                 problem, the problem of computing the strength, and the
                 problem of finding a minimum cost `reinforcement' to
                 achieve a desired strength are given. These problems
                 are also solved for a different model, in which the
                 attacker wants to separate vertices from a fixed
                 central vertex.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Carleton Univ, Dep of Mathematics \& Statistics,
                 Ottawa, Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms; Graph
                 Theory; greedy algorithm; mathematical techniques;
                 networks; optimal attack and reinforcement;
                 performance; polymatroids; strongly polynomial
                 algorithms; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures.",
}

@Article{Lee:1985:SLP,
  author =       "C. C. Lee and D. T. Lee",
  title =        "A Simple On-Line Bin-Packing Algorithm",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "562--572",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/bin-packing.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3833.html",
  abstract =     "The one-dimensional on-line bin-packing problem is
                 considered. A simple $O(1)$-space and $O(n)$-time
                 algorithm, called HARMONIC$_M$, is presented. It is
                 shown that this algorithm can achieve a worst-case
                 performance ratio of less than 1.692, which is better
                 than that of the $O(n)$-space and $O(n \log n)$-time
                 algorithm FIRST FIT. Also shown is that 1.691\ldots{}
                 is a lower bound for all $O(1)$-space on-line
                 bin-packing algorithms. Finally a revised version of
                 HARMONIC$_M$, an $O(n)$-space and $O(n)$-time
                 algorithm, is presented and is shown to have a
                 worst-case performance ratio of less than 1.636.",
  acknowledgement = ack-nhfb,
  affiliation =  "Northwestern Univ, Dep of Electrical Engineering \&
                 Computer Science, Evanston, IL, USA",
  affiliationaddress = "Northwestern Univ, Dep of Electrical Engineering
                 \& Computer Science, Evanston, IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; bin-packing algorithm;
                 computer programming; image part pattern; performance;
                 suboptimal algorithms; theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sequencing and scheduling.",
}

@Article{Chazelle:1985:MCV,
  author =       "Bernard Chazelle and Louis Monier",
  title =        "A Model of Computation for {VLSI} with Related
                 Complexity Results",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "573--588",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3834.html",
  abstract =     "A new model of computation for VLSI, based on the
                 assumption that time for propagating information is at
                 least linear in the distance, is proposed. While
                 accommodating for basic laws of physics, the model is
                 designed to be general and technology independent.
                 Thus, from a complexity viewpoint, it is especially
                 suited for deriving lower bounds and trade-offs. New
                 results for a number of problems, including fan-in,
                 transitive functions, matrix multiplication, and
                 sorting are presented. As regards upper bounds, it must
                 be noted that because of communication costs, the model
                 clearly favors regular and pipelined architecture
                 (e.g., systolic arrays).",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Carnegie-Mellon Univ, Pittsburgh, PA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "714; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; chip complexity; fan-in; integrated
                 circuits, VLSI; lower bounds; Mathematical Models;
                 sorting; theory; transitive functions",
  subject =      "{\bf B.7.1}: Hardware, INTEGRATED CIRCUITS, Types and
                 Design Styles, VLSI (very large scale integration).",
}

@Article{Greenberg:1985:LBT,
  author =       "Albert G. Greenberg and Shmuel Winograd",
  title =        "A Lower Bound on the Time Needed in the Worst Case to
                 Resolve Conflicts Deterministically in Multiple Access
                 Channels",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "589--596",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214125.html",
  abstract =     "A problem related to the decentralized control of a
                 multiple access channel is considered: Suppose $k$
                 stations from an ensemble of $n$ simultaneously
                 transmit to a multiple access channel that provides the
                 feedback $0$, $1$, or $2+$, denoting $k$ equals $0$,
                 $k$ equals $1$, or $k \geq 2$, respectively. If $k$
                 equals $1$, then the transmission succeeds. But if $k
                 \geq 2$, as a result of the conflict, none of the
                 transmissions succeed. An algorithm to resolve a
                 conflict determines how to schedule retransmissions so
                 that each of the conflicting stations eventually
                 transmits singly to the channel. In this paper, a
                 general model of deterministic algorithms to resolve
                 conflicts is introduced, and it is established that,
                 for all $k$ and $n$ $(2 \leq k \leq n)$, $\Omega(k(\log
                 n)/(\log k))$ time must elapse in the worst case before
                 all $k$ transmissions succeed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer networks; computer programming
                 --- Algorithms; conflict resolution; decentralized
                 control; deterministic algorithms; multiple access
                 channels; performance; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sequencing and scheduling.
                 {\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf C.2.5}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Local Networks, Access schemes. {\bf C.4}: Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS, Modeling
                 techniques.",
}

@Article{Willard:1985:ARR,
  author =       "Dan E. Willard and George S. Lueker",
  title =        "Adding Range Restriction Capability to Dynamic Data
                 Structures",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "597--617",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3839.html",
  abstract =     "A database is said to allow range restrictions if one
                 may request that only records with some specified field
                 in a specified range be considered when answering a
                 given query. A transformation is presented that enables
                 range restrictions to be added to an arbitrary dynamic
                 data structure on $n$ elements, provided that the
                 problem satisfies a certain decomposability condition
                 and that one is willing to allow increases by a factor
                 of $O(\log n)$ in the worst-case time for an operation
                 and in the space used. This is a generalization of a
                 known transformation that works for static structures.
                 This transformation is then used to produce a data
                 structure for range queries in $k$ dimensions with
                 worst-case times of $O(\log^kn)$ for each insertion,
                 deletion, or query operation.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Harvard Univ, Cambridge, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; data processing; Data Structures; database
                 systems; dynamic data structures; measurement;
                 performance; range restriction; theory; verification",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf E.2}:
                 Data, DATA STORAGE REPRESENTATIONS, Composite
                 structures. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Sorting and
                 searching. {\bf H.2.1}: Information Systems, DATABASE
                 MANAGEMENT, Logical Design, Data models. {\bf H.3.2}:
                 Information Systems, INFORMATION STORAGE AND RETRIEVAL,
                 Information Storage, File organization. {\bf H.3.3}:
                 Information Systems, INFORMATION STORAGE AND RETRIEVAL,
                 Information Search and Retrieval, Search process. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Geometrical problems and computations.",
}

@Article{Tay:1985:MVP,
  author =       "Y. C. Tay and Rajan Suri and Nathan Goodman",
  title =        "A Mean Value Performance Model for Locking in
                 Databases: {The} No-Waiting Case",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "618--651",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3831.html",
  abstract =     "A new performance model for dynamic locking is
                 proposed. It is based on a flow diagram and uses only
                 the steady state average values of the variables. It is
                 general enough to handle nonuniform access, shared
                 locks, static locking, multiple transaction classes,
                 and transactions of indeterminate length. The analysis
                 is restricted to the case in which all conflicts are
                 resolved by restarts. The model shows that data
                 contention can cause the throughput to thrash, and
                 gives a limit on the workload that will prevent this.
                 It also shows that systems with a particular kind of
                 nonuniform access and systems in which transactions
                 share locks are equivalent to systems in which there is
                 uniform access and only exclusive locking. Replacing
                 updates by queries in a multiprogramming mix may
                 degrade performance if the queries are longer than the
                 updates.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Natl Univ of Singapore, Dep of Mathematics,
                 Singapore, Singapore",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; concurrency control; data contention;
                 database locking; database systems; dynamic locking;
                 mathematical models; measurement; Performance;
                 performance; resource contention; theory;
                 verification",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Transaction processing. {\bf C.4}: Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS, Modeling
                 techniques.",
}

@Article{Sleator:1985:SAB,
  author =       "Daniel Dominic Sleator and Robert Endre Tarjan",
  title =        "Self-Adjusting Binary Search Trees",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "652--686",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3835.html",
  abstract =     "The splay tree, a self-adjusting form of binary search
                 tree, is developed and analyzed. The binary search tree
                 is a data structure for representing tables and lists
                 so that accessing, inserting, and deleting items is
                 easy. On an $n$-node splay tree, all the standard
                 search tree operations have an amortized time bound of
                 $O(\log n)$ per operation, where by `amortized time' is
                 meant the time per operation averaged over a worst-case
                 sequence of operations. Thus splay trees are as
                 efficient as balanced trees when total running time is
                 the measure of interest. In addition, for sufficiently
                 long access sequences, splay trees are as efficient, to
                 within a constant factor, as static optimum search
                 trees. The efficiency of splay trees comes not from an
                 explicit structural constraint, as with balanced trees,
                 but from applying a simple restructuring heuristic,
                 called splaying, whenever the tree is accessed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms; data
                 processing; Data Structures; mathematical techniques
                 --- Trees; multidimensional searching; performance;
                 self-adjusting binary search trees; self-organizing
                 data structures; splay trees; theory",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sorting and searching.",
}

@Article{Yao:1985:UHO,
  author =       "Andrew C. Yao",
  title =        "Uniform Hashing is Optimal",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "687--693",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/3828.3836",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Feb 14 10:47:04 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Also published in/as: Stanford Un., CSD,
                 TR-CS-85-1038, Jan. 1985.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3836.html",
  abstract =     "It was conjectured by J. Ullman that uniform hashing
                 is optimal in its expected retrieval cost among all
                 open-address hashing schemes. In this paper, it is
                 shown that, for any open-address hashing scheme, the
                 expected cost of retrieving a record from a large table
                 that is $\alpha$-fraction full is at least $(1 /
                 \alpha) \log(1 / (1 - \alpha)) + o(1)$. This proves
                 Ullman's conjecture to be true in the asymptotic
                 sense.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford Univ, Computer Science Dep, Stanford,
                 CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms; data
                 processing; Data Structures; open-address hashing;
                 performance; retrieval cost; theory; uniform hashing;
                 verification",
  remark =       "The key of a record maps to a sequence that is a
                 random permutation of all the locations of a hash
                 table.",
  review =       "ACM CR 8512-1135",
  subject =      "{\bf E.2}: Data, DATA STORAGE REPRESENTATIONS,
                 Hash-table representations. {\bf E.1}: Data, DATA
                 STRUCTURES, Arrays. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Sorting and
                 searching. {\bf E.1}: Data, DATA STRUCTURES, Tables.",
}

@Article{Zerling:1985:GBT,
  author =       "David Zerling",
  title =        "Generating Binary Trees Using Rotations",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "694--701",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214141.html",
  abstract =     "A new algorithm that, for the first time, exploits the
                 rotational geometry of binary trees is developed in
                 order to allow for the lexicographic generation of
                 computer representations of these trees in average time
                 $O(1)$ per tree. `Rotation' codewords for these trees
                 (in average time $O(1)$ per tree) are also generated.
                 It is shown how these codewords relate to lattice
                 paths, and, using this relationship, that $n(n 1)/(n +
                 2)$ is the average number of rotations needed to
                 generate a binary tree on $n$ nodes. Finally, a
                 necessary and sufficient condition that a codeword
                 represent a full binary tree (each node has 0 or 2
                 sons) on $n = 2 m + 1$ nodes is given and how to
                 contract this codeword to obtain the codeword for the
                 binary tree on m nodes for which this full tree is the
                 extended binary tree is shown.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Philadelphia Coll of Textiles \& Science,
                 Philadelphia, PA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; backtracking; binary trees; computer
                 programming --- Algorithms; data processing; Data
                 Structures; mathematical techniques --- Trees;
                 rotational geometry",
  subject =      "{\bf G.2.1}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Combinatorics, Combinatorial algorithms.
                 {\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures.",
}

@Article{Cao:1985:IAD,
  author =       "Wei-Lu Cao and William J. Stewart",
  title =        "Iterative Aggregation\slash Disaggregation Techniques
                 for Nearly Uncoupled {Markov} Chains",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "702--719",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1985.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214137.html",
  abstract =     "Iterative aggregation\slash disaggregation methods
                 provide an efficient approach for computing the
                 stationary probability vector of nearly uncoupled (also
                 known as nearly completely decomposable) Markov chains.
                 Three such methods that have appeared in the literature
                 recently are considered and their similarities and
                 differences are outlined. For each of these methods, a
                 lemma is established, which shows that the unique fixed
                 point of the iterative scheme is the left eigenvector
                 corresponding to the dominant unit eigenvalue of the
                 stochastic transition probability matrix. In addition,
                 conditions are established for the convergence of two
                 of these methods; convergence conditions for the third
                 having already been established. All three methods are
                 shown to have the same asymptotic rate of
                 convergence.",
  acknowledgement = ack-nhfb,
  affiliation =  "North Carolina State Univ at Raleigh, Dep of Computer
                 Science, Raleigh, NC, USA",
  affiliationaddress = "North Carolina State Univ at Raleigh, Dep of
                 Computer Science, Raleigh, NC, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "912; 921; 922",
  descriptors =  "Aggregation; decomposition; Markov chain",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "aggregation; algorithms; iter; iterative
                 aggregation/disaggregation techniques; la; Markov
                 chain; Mathematical Models; mathematical techniques ---
                 Iterative Methods; nearly uncoupled Markov chains; nla;
                 performance; probability --- Random Processes; systems
                 science and cybernetics; theory",
  subject =      "{\bf G.1.3}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Numerical Linear Algebra, Eigenvalues. {\bf
                 D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Stochastic analysis.",
}

@Article{Manber:1985:CPP,
  author =       "Udi Manber and Martin Tompa",
  title =        "Complexity of Problems on Probabilistic,
                 Nondeterministic, and Alternating Decision Trees",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "720--732",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/85.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "This paper compares lower bounds on the running times
                 of algorithms that allow probabilistic,
                 non-deterministic and alternating control on decision
                 trees. Decision trees that allow internal randomization
                 at the expense of a small probability of error are
                 shown to run no faster asymptotically than ordinary
                 decision trees for a collection of problems. An earlier
                 version of this publication appeared in {\em Proc. 14th
                 Ann. ACM Symp. on Theory of Computing}, 1982, pp.
                 234--244.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3838.html",
  abstract =     "This work generalizes decision trees in order to study
                 lower bounds on the running times of algorithms that
                 allow probabilistic, nondeterministic, or alternating
                 control. It is shown that decision trees that are
                 allowed internal randomization (at the expense of
                 introducing a small probability of error) run no faster
                 asymptotically than ordinary decision trees for a
                 collection of natural problems. Two geometric
                 techniques from the literature for proving lower bounds
                 on the time required by ordinary decision trees are
                 shown to be special cases of one unified technique
                 that, in fact, applies to nondeterministic decision
                 trees as well. Finally, it is shown that any lower
                 bound on alternating decision tree time also applies to
                 alternating Turing machine time.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Washington, Seattle, WA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computational complexity; computer
                 programming --- Algorithms; decision theory and
                 analysis; decision trees; lower bounds; mathematical
                 statistics --- Monte Carlo Methods; mathematical
                 techniques --- Trees; Monte Carlo algorithms;
                 performance; theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Alternation and
                 nondeterminism. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Probabilistic computation. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures.",
}

@Article{Sistla:1985:CPL,
  author =       "A. P. Sistla and E. M. Clarke",
  title =        "The Complexity of Propositional Linear Temporal
                 Logics",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "733--749",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/3837.html",
  abstract =     "The complexity of satisfiability and determination of
                 truth in a particular finite structure are considered
                 for different propositional liner temporal logics. It
                 is shown that these problems are NP-complete for the
                 logic with $F$ and are PSPACE-complete for the logics
                 with $F$, $X$, with $U$, with $U$, $S$, $X$ operators
                 and for the extended logic with regular operators given
                 by P. Wolper.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Massachusetts at Amherst, Dep of Electrical \&
                 Computer Engineering, Amherst, MA, USA",
  affiliationaddress = "Univ of Massachusetts at Amherst, Dep of
                 Electrical \& Computer Engineering, Amherst, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; complexity; computer metatheory; Formal
                 Logic; np-completeness; propositional linear temporal
                 logics; pspace-completeness; theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Complexity of proof
                 procedures. {\bf F.3.1}: Theory of Computation, LOGICS
                 AND MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Logics of programs. {\bf
                 I.2.2}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Automatic Programming, Program
                 verification. {\bf D.2.4}: Software, SOFTWARE
                 ENGINEERING, Program Verification. {\bf F.4.1}: Theory
                 of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic, Mechanical theorem
                 proving.",
}

@Article{Papadimitriou:1985:CTD,
  author =       "Christos H. Papadimitriou",
  title =        "Correction to ``{A} Theorem in Database Concurrency
                 Control''",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "3",
  pages =        "750--750",
  month =        jul,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 01 10:04:29 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Papadimitriou:1982:TDC}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Freuder:1985:SCB,
  author =       "Eugene C. Freuder",
  title =        "A Sufficient Condition for Backtrack-Bounded Search",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "755--761",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4225.html",
  abstract =     "Backtrack search is often used to solve constraint
                 satisfaction problems. A relationship involving the
                 structure of the constraints is described that provides
                 a bound on the backtracking required to advance deeper
                 into the backtrack tree. This analysis leads to upper
                 bounds on the effort required for solution of a class
                 of constraint satisfaction problems. The solutions
                 involve a combination of relaxation preprocessing and
                 backtrack search. The bounds are expressed in terms of
                 the structure of the constraint connections.
                 Specifically, the effort is shown to have a bound
                 exponential in the size of the largest biconnected
                 component of the constraint graph, as opposed to the
                 size of the graph as a whole.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of New Hampshire, Dep of Computer Science,
                 Durham, NH, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; backtrack-bounded search;
                 combinatorial algorithms; computer programming;
                 constraint consistency; constraint satisfaction;
                 theory",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Backtracking. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sorting and searching. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics,
                 Combinatorial algorithms.",
}

@Article{Karp:1985:FPA,
  author =       "Richard M. Karp and Avi Wigderson",
  title =        "A Fast Parallel Algorithm for the Maximal Independent
                 Set Problem",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "762--773",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "This important paper showed that the maximal
                 independent set problem for graphs can be solved in
                 polylogarithmic time using a polynomial number of
                 processes on a PRAM in which concurrent reads and
                 writes are disallowed. They derive their algorithm from
                 a randomized one using a technique that has become
                 known as derandomization via $k$-wise independence.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4226.html",
  abstract =     "A parallel algorithm is presented that accepts as
                 input a graph $G$ and produces a maximal independent
                 set of vertices in $G$. On a P-RAM without the
                 concurrent write or concurrent read features, the
                 algorithm executes in $O((\log n)^4)$ time and uses
                 $O((n/(\log n))^3)$ processors, where $n$ is the number
                 of vertices in $G$. The algorithm has several novel
                 features that may find other applications. These
                 include the use of balanced incomplete block designs to
                 replace random sampling by deterministic sampling, and
                 the use of a `dynamic pigeonhole principle' that
                 generalizes the conventional pigeonhole principle.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California at Berkeley, Computer Science
                 Div, Berkeley, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; computer programming; computer
                 systems, digital --- Parallel Processing; fast parallel
                 algorithm; maximal independent set problem;
                 performance; theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Graph algorithms.",
}

@Article{Sacca:1985:CDH,
  author =       "Domenico Sacc{\`{a}}",
  title =        "Closures of Database Hypergraphs",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "774--803",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4997.html",
  abstract =     "A hypergraph formalism is introduced to represent
                 database schemata. In particular, a database schema B,
                 described by one full join dependency and a set of
                 functional dependencies, is represented by a (database)
                 hypergraph H, containing both undirected and directed
                 hyperedges. The closure of a database hypergraph is
                 defined as the extension of the transitive closure of a
                 graph. By using a lower bound and an upper bound of the
                 hypergraph closure (called L-closure and U-closure,
                 respectively), it is proved that two e-acyclic
                 (e-independent) hypergraphs are equivalent if and only
                 if they have the same closure. Moreover, a hypergraph
                 is e-acyclic (e-independent) if and only if its closure
                 is acyclic (independent) and, in most cases, such a
                 recognition can be done in polynomial time. Finally, it
                 is shown how to use the database hypergraph closure to
                 solve some database design problems.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "CRAI, Rende, Italy",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; closures; database hypergraphs; database
                 systems; design; mathematical techniques --- Graph
                 Theory; Theory; theory",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Schema and subschema. {\bf H.2.1}:
                 Information Systems, DATABASE MANAGEMENT, Logical
                 Design, Normal forms. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms.",
}

@Article{Awerbuch:1985:CNS,
  author =       "Baruch Awerbuch",
  title =        "Complexity of Network Synchronization",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "804--823",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4227.html",
  abstract =     "The problem of simulating a synchronous network by an
                 asynchronous network is investigated. A new simulation
                 technique, referred to as a synchronizer, which is a
                 new, simple methodology for designing efficient
                 distributed algorithms in asynchronous networks, is
                 proposed. The synchronizer exhibits a trade-off between
                 its communication and time complexities, which is
                 proved to be within a constant factor of the lower
                 bound.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "MIT, Lab for Computer Science, Cambridge, MA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; complexity; computer networks; computer
                 programming --- Algorithms; Computer Simulation;
                 network synchronization; performance; theory",
  subject =      "{\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf C.2.1}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Network Architecture and Design, Store and forward
                 networks. {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Performance attributes. {\bf F.1.1}: Theory
                 of Computation, COMPUTATION BY ABSTRACT DEVICES, Models
                 of Computation, Relations among models. {\bf F.2.3}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Tradeoffs among Complexity
                 Measures.",
}

@Article{Bracha:1985:ACB,
  author =       "Gabriel Bracha and Sam Toueg",
  title =        "Asynchronous Consensus and Broadcast Protocols",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "824--840",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214134.html",
  abstract =     "A consensus protocol enables a system of $n$
                 asynchronous processes, some of which are faulty, to
                 reach agreement. There are two kinds of faulty
                 processes: fail-stop processes that can only die and
                 malicious processes that can also send false messages.
                 The class of asynchronous systems with fair schedulers
                 is defined, and consensus protocols that terminate with
                 probability 1 for these systems are investigated. With
                 fail-stop processes, it is shown that (n + 1)/2 correct
                 processes are necessary and sufficient to reach
                 agreement. In the malicious case, it is shown that (2n
                 + 1)/3 correct processes are necessary and sufficient
                 to reach agreement. This is contrasted with an earlier
                 result, stating that there is no consensus protocol for
                 the fail-stop case that always terminates within a
                 bounded number of steps, even if only one process can
                 fail. The possibility of reliable broadcast (Byzantine
                 Agreement) in asynchronous systems is also
                 investigated. Asynchronous Byzantine Agreement is
                 defined, and it is shown that (2n+1)/3 correct
                 processes are necessary and sufficient to achieve it.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cornell Univ, Dep of Computer Science, Ithaca,
                 NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; asynchronous processes; broadcast
                 protocols; Byzantine agreement; computer networks;
                 computer systems, digital --- Distributed; consensus
                 protocols; Protocols; reliability; theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf C.2.2}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Protocols, Protocol architecture. {\bf C.2.4}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed applications. {\bf
                 C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed databases. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Network operating systems. {\bf
                 C.4}: Computer Systems Organization, PERFORMANCE OF
                 SYSTEMS, Reliability, availability, and serviceability.
                 {\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Distributed systems. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Transaction
                 processing.",
}

@Article{Garcia-Molina:1985:HAV,
  author =       "Hector Garcia-Molina and Daniel Barbara",
  title =        "How to Assign Votes in a Distributed System",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "841--860",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4223.html",
  abstract =     "In a distributed system, one strategy for achieving
                 mutual exclusion of groups of nodes without
                 communication is to assign to each node a number of
                 votes. Only a group with a majority of votes can
                 execute the critical operations, and mutual exclusion
                 is achieved because at any given time there is at most
                 one such group. A second strategy, which appears to be
                 similar to votes, is to define a priori a set of groups
                 that intersect each other. Any group of nodes that
                 finds itself in this set can perform the restricted
                 operations. In this paper, both of these strategies are
                 studied in detail and it is shown that they are not
                 equivalent in general (although they are in some
                 cases). In doing so, a number of other interesting
                 properties are proved. These properties will be of use
                 to a system designer who is selecting a vote assignment
                 or a set of groups for a specific application.",
  acknowledgement = ack-nhfb,
  affiliation =  "Princeton Univ, Dep of Electrical Engineering \&
                 Computer Science, Princeton, NJ, USA",
  affiliationaddress = "Princeton Univ, Dep of Electrical Engineering \&
                 Computer Science, Princeton, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer systems, digital; database
                 systems --- Distributed; Distributed; mutual exclusion;
                 partitions; theory",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed databases. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Distributed
                 systems.",
}

@Article{Faigle:1985:OLO,
  author =       "Ulrich Faigle",
  title =        "On Ordered Languages and the Optimization of Linear
                 Functions by Greedy Algorithms",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "861--870",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4998.html",
  abstract =     "The optimization problem for linear functions on
                 finite languages is studied, and an (almost) complete
                 characterization of those functions for which a primal
                 and a dual greedy algorithm work well with respect to a
                 canonically associated linear programming problem is
                 given. The discussion in this paper is within the
                 framework of ordered languages, and the
                 characterization uses the notion of rank feasibility of
                 a weighting with respect to an ordered language. This
                 yields a common generalization of a sufficient
                 condition, for greedoids and a greedy algorithm for
                 ordered sets. Ordered greedoids are considered the
                 appropriate generalization of greedoids, and the
                 connection is established between ordered languages,
                 polygreedoids, and Coxeteroids. The author shows in
                 particular that a polygreedoid is a Coxeteroid if and
                 only if it is derived from an integral polymatroid.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ Bonn, Inst fuer Oekonometrie und Operation
                 Research, Bonn, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; automata theory --- Formal Languages;
                 combinatorial optimization; computer programming ---
                 Algorithms; greedy algorithms; languages; linear
                 functions; mathematical techniques --- Combinatorial
                 Mathematics; optimization; ordered languages",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics.",
}

@Article{Adler:1985:SAW,
  author =       "Ilan Adler and Nimrod Megiddo",
  title =        "A Simplex Algorithm Whose Average Number of Steps Is
                 Bounded between Two Quadratic Functions of the Smaller
                 Dimension",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "871--895",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4222.html",
  abstract =     "The average number of steps performed by a simplex
                 algorithm, the so-called self-dual method, is analyzed.
                 The algorithm is not started at the traditional point
                 $(1, \ldots{}, 1)^T$, but points of the form $(1,
                 \epsilon, \epsilon^2,\ldots{})^T$, with $\epsilon$
                 sufficiently small, are used. The result is better than
                 those of the previous analyses.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, Dep of Industrial Engineering \&
                 Operations Research, Berkeley, CA, USA",
  affiliationaddress = "Univ of California, Dep of Industrial
                 Engineering \& Operations Research, Berkeley, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; average-case analysis; computer
                 programming --- Algorithms; lexicographic pivoting;
                 linear programming; mathematical programming;
                 probabilistic analysis of algorithms; quadratic
                 functions; simplex algorithm; simplex algorithms;
                 theory",
  subject =      "{\bf G.1.6}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Optimization, Linear programming. {\bf
                 F.2.1}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Numerical Algorithms and
                 Problems, Computations on matrices.",
}

@Article{Hennessy:1985:AT,
  author =       "M. Hennessy",
  title =        "Acceptance Trees",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "896--928",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4249.html",
  abstract =     "A simple model, $AT$, for nondeterministic machines is
                 presented which is based on certain types of trees. A
                 set of operations, $\Sigma$, is defined over $AT$ and
                 it is shown to be completely characterized by a set of
                 inequations over $\Sigma$. $AT$ is used to define the
                 denotational semantics of a language for defining
                 nondeterministic machines. The significance of the
                 model is demonstrated by showing that this semantics
                 reflects an intuitive operational semantics of machines
                 based on the idea that machines should only be
                 differentiated if there is some experiment that
                 differentiates between them.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Edinburgh, Dep of Computer Science,
                 Edinburgh, Scotl",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "acceptance trees; automata theory; Formal Languages;
                 languages; mathematical techniques --- Trees;
                 nondeterministic machines; pcalc equivalence ccs
                 binder(ccs); theory",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation. {\bf F.1.1}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Models of Computation, Automata. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Logics of programs. {\bf F.3.2}: Theory of Computation,
                 LOGICS AND MEANINGS OF PROGRAMS, Semantics of
                 Programming Languages, Algebraic approaches to
                 semantics. {\bf F.3.2}: Theory of Computation, LOGICS
                 AND MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages, Denotational semantics.",
}

@Article{MeyerAufDerHeide:1985:LBS,
  author =       "Friedhelm {Meyer Auf Der Heide}",
  title =        "Lower Bounds for Solving Linear {Diophantine}
                 Equations on Random Access Machines",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "929--937",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4250.html",
  abstract =     "The author proves lower bounds for the time complexity
                 of deciding the solvability of Diophantine linear
                 equations with $n$ variables; that is, of deciding
                 whether a given linear equation has a solution with
                 nonnegative integer coefficients.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Johann Wolfgang Goethe-Univ, Frankfurt, West
                 Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer metatheory; computer programming
                 --- Algorithms; linear Diophantine equations; lower
                 bounds; performance; random access machines; theory;
                 verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems. {\bf G.2.0}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, General.",
}

@Article{Moran:1985:ART,
  author =       "Shlomo Moran and Marc Snir and Udi Manber",
  title =        "Applications of {Ramsey}'s Theorem to Decision Tree
                 Complexity",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "938--949",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4259.html",
  abstract =     "Combinatorial techniques for extending lower bound
                 results for decision trees to general types of queries
                 are presented. Problems that are defined by simple
                 inequalities between inputs, called order invariant
                 problems, are considered. A decision tree is called
                 $k$-bounded if each query depends on at most $k$
                 variables. No further assumptions on the type of
                 queries are made. It is proved that one can replace the
                 queries of any $k$-bounded decision tree that solves an
                 order-invariant problem over a large enough input
                 domain with $k$-bounded queries whose outcome depends
                 only on the relative order of the inputs. As a
                 consequence, all existing lower bounds for
                 comparison-based algorithms are valid for general
                 $k$-bounded decision trees, where $k$ is a constant. An
                 $\Omega(n \log n)$ lower bound for the element
                 uniqueness problem and several other problems for any
                 $k$-bounded decision tree, such that $k = O(n^c)$ and
                 $c < 1/2$ is proved.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technion, Dep of Computer Science, Haifa, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Combinatorial Mathematics; decision theory
                 and analysis; decision tree complexity; mathematical
                 techniques; performance; Ramsey's theorem; theory;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Combinatorial
                 algorithms. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Sorting and
                 searching.",
}

@Article{Yannakakis:1985:PAM,
  author =       "Mihalis Yannakakis",
  title =        "A Polynomial Algorithm for the Min-Cut Linear
                 Arrangement of Trees",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "4",
  pages =        "950--988",
  month =        oct,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4228.html",
  abstract =     "An algorithm is presented that finds a min-cut linear
                 arrangement of a tree in $O(n \log n)$ time. An
                 extension of the algorithm determines the number of
                 pebbles needed to play the black and white pebble game
                 on a tree.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 mathematical techniques; min-cut linear arrangement;
                 pebbling; polynomial algorithm; theory; Trees",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Routing and layout. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.2.2}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Graph algorithms. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Trees.",
}

@Article{Manna:1986:SRA,
  author =       "Zohar Manna and Richard Waldinger",
  title =        "Special Relations in Automated Deduction",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "1",
  pages =        "1--59",
  month =        jan,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/symbolic.math.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4905.html",
  abstract =     "Two deduction rules are introduced to give streamlined
                 treatment to relations of special importance in an
                 automated theorem-proving system. These rules, the
                 relation replacement and relation matching rules,
                 generalize to an arbitrary binary relation the
                 paramodulation and E-resolution rules, respectively,
                 for equality, and may operate within a nonclausal or
                 clausal system. The new rules depend on an extension of
                 the notion of polarity to apply to subterms as well as
                 to subsentences, with respect to a given binary
                 relation. The rules allow us to eliminate troublesome
                 axioms, such as transitivity and monotonicity, from the
                 system; proofs are shorter and more comprehensible, and
                 the search space is correspondingly deflated.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford Univ, Dep of Computer Science,
                 Stanford, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; artificial intelligence; automated
                 deduction; computer metatheory; theorem proving;
                 theory; verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf I.2.2}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Automatic Programming, Program
                 synthesis. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Deduction. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Resolution.",
}

@Article{Mehlhorn:1986:RTR,
  author =       "K. Mehlhorn and F. P. Preparata",
  title =        "Routing through a Rectangle",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "1",
  pages =        "60--85",
  month =        jan,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/86.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4994.html",
  abstract =     "An $O(N \log N)$ algorithm for routing through a
                 rectangle is presented. Consider an $n$-by-$m$
                 rectangular grid and a set of $N$ two-terminal nets. A
                 net is a pair of points on the boundary of the
                 rectangle. A layout is a set of edge-disjoint paths,
                 one for each net. Our algorithm constructs a layout, if
                 there is one, in $O(N \log N)$ time; this contrasts
                 favorably with the area of the layout that might be as
                 large as $n^2$. The layout constructed can be wired
                 using four layers of interconnect with only $O(N)$
                 contact cuts. A partial extension to multiterminal nets
                 is also discussed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ des Saarlandes, Saarbruecken, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "714; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; automated layout; Computer Aided Design;
                 computer programming --- Algorithms; design; integrated
                 circuits; routing; theory; verification",
  subject =      "{\bf B.7.1}: Hardware, INTEGRATED CIRCUITS, Types and
                 Design Styles, VLSI (very large scale integration).
                 {\bf B.7.2}: Hardware, INTEGRATED CIRCUITS, Design
                 Aids, Placement and routing. {\bf E.1}: Data, DATA
                 STRUCTURES, Arrays. {\bf E.1}: Data, DATA STRUCTURES,
                 Trees. {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Routing and layout. {\bf
                 G.2.2}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Graph algorithms.",
}

@Article{Chor:1986:ANT,
  author =       "Benny Chor and Charles E. Leiserson and Ronald L.
                 Rivest and James B. Shearer",
  title =        "An Application of Number Theory to the Organization of
                 Raster-Graphics Memory",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "1",
  pages =        "86--104",
  month =        jan,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Graphics/rosenfeld/1986.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4800.html",
  abstract =     "A high-resolution raster-graphics display is usually
                 combined with processing power and a memory
                 organization that facilitates basic graphics
                 operations. For many applications, including
                 interactive text processing, the ability to quickly
                 move or copy small rectangles of pixels is essential.
                 This paper proposes a novel organization of
                 raster-graphics memory that permits all small
                 rectangles to be moved efficiently. The memory
                 organization is based on a doubly periodic assignment
                 of pixels to M memory chips according to a `Fibonacci'
                 lattice. The memory organization guarantees that, if a
                 rectilinearly oriented rectangle contains fewer than M/
                 ROOT 5 pixels, then all pixels will reside in different
                 memory chips and thus can be accessed simultaneously.
                 Moreover, any M consecutive pixels, arranged either
                 horizontally or vertically, can be accessed
                 simultaneously.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "MIT, Lab for Computer Science, Cambridge, MA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "data storage units; design; display devices; Fibonacci
                 lattices; image part pattern; interleaving;
                 mathematical techniques --- Number Theory; memory
                 organization; raster-graphics memory; theory",
  subject =      "{\bf I.3.1}: Computing Methodologies, COMPUTER
                 GRAPHICS, Hardware architecture, Raster display
                 devices. {\bf B.3.2}: Hardware, MEMORY STRUCTURES,
                 Design Styles, Interleaved memories. {\bf B.4.2}:
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Input/Output Devices, Image display.",
}

@Article{Graham:1986:NDS,
  author =       "Marc H. Graham and Alberto O. Mendelzon and Moshe Y.
                 Vardi",
  title =        "Notions of Dependency Satisfaction",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "1",
  pages =        "105--129",
  month =        jan,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Also published in/as: Stanford Un., 1984.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4798.html",
  abstract =     "Two notions of dependency satisfaction, consistency
                 and completeness, are introduced. Consistency is the
                 natural generalization of weak-instance satisfaction
                 and seems appropriate when only equality-generating
                 dependencies are given, but disagrees with the standard
                 notion in the presence of tuple-generating
                 dependencies. Completeness is based on the intuitive
                 semantics of tuple-generating dependencies but differs
                 from the standard notion for equality-generating
                 dependencies. It is argued that neither approach is the
                 correct one, but rather that they correspond to
                 different policies on constraint enforcement, and each
                 one is appropriate in different circumstances.
                 Consistency and completeness of a state are
                 characterized in terms of the tableau associated with
                 the state and in terms of logical properties of a set
                 of first-order sentences associated with the state. A
                 close relation between the problems of testing for
                 consistency and completeness and of testing implication
                 of dependencies is established, leading to lower and
                 upper bounds for the complexity of consistency and
                 completeness. The possibility of formalizing dependency
                 satisfaction without using a universal relation scheme
                 is examined.",
  acknowledgement = ack-nhfb,
  affiliation =  "Georgia Inst of Technology, Sch of Information \&
                 Computer Science, Atlanta, GA, USA",
  affiliationaddress = "Georgia Inst of Technology, Sch of Information
                 \& Computer Science, Atlanta, GA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; completeness; consistency; database
                 systems; dependency satisfaction; design; Relational;
                 theory; verification",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Normal forms. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Data
                 models. {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Complexity of proof
                 procedures.",
}

%% Page 408 is blank
@Article{Lubachevsky:1986:CAA,
  author =       "Boris Lubachevsky and Debasis Mitra",
  title =        "A Chaotic Asynchronous Algorithm for Computing the
                 Fixed Point of a Nonnegative Matrix of Unit Spectral
                 Radius",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "1",
  pages =        "130--150",
  month =        jan,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/ovr.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4801.html",
  abstract =     "Given a nonnegative, irreducible matrix P of spectral
                 radius unity, there exist a positive vector pi such
                 that pi equals pi P. If P also happens to be
                 stochastic, then pi gives the stationary distribution
                 of the Markov chain that has state-transition
                 probabilities given by the elements of P. This paper
                 gives an algorithm for computing pi that is
                 particularly well suited for parallel processing. The
                 main attraction of our algorithm is that the timing and
                 sequencing restrictions on individual processors are
                 almost entirely eliminated and, consequently, the
                 necessary coordination between processors is negligible
                 and the enforced idle time is also negligible.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; asynchronous algorithm;
                 chaotic algorithm; computer programming; computer
                 systems, digital --- Parallel Processing; Markov
                 chains; probability --- Random Processes; theory",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations on matrices. {\bf G.1.0}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, General,
                 Parallel algorithms. {\bf C.1.2}: Computer Systems
                 Organization, PROCESSOR ARCHITECTURES, Multiple Data
                 Stream Architectures (Multiprocessors), Parallel
                 processors. {\bf G.1.3}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, Numerical Linear Algebra.",
}

@Article{Emerson:1986:SNR,
  author =       "E. Allen Emerson and Joseph Y. Halpern",
  title =        "``Sometimes'' and ``Not Never'' Revisited: {On}
                 Branching versus Linear Time Temporal Logic",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "1",
  pages =        "151--178",
  month =        jan,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4999.html",
  abstract =     "The differences between and appropriateness of
                 branching versus linear time temporal logic for
                 reasoning about concurrent programs are studied. These
                 issues have been previously considered by L. Lamport.
                 To facilitate a careful examination of these issues, a
                 language, CTL*, in which a universal or existential
                 path quantifier can prefix an arbitrary linear time
                 assertion, is defined. The expressive power of a number
                 of sublanguages is then compared. CTL* is also related
                 to the logics MPL of Abrahamson and PL of Harel, Kozen,
                 and Parikh. The paper concludes with a comparison of
                 the utility of branching and linear time temporal
                 logics.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Texas, Computer Science Dep, Austin, TX,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer metatheory --- Programming
                 Theory; computer programming; computer programming
                 languages; concurrent programs; design; languages;
                 temporal logic; theory; Theory; verification",
  subject =      "{\bf F.3.1}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Logics of programs. {\bf
                 F.3.1}: Theory of Computation, LOGICS AND MEANINGS OF
                 PROGRAMS, Specifying and Verifying and Reasoning about
                 Programs, Assertions. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Specification techniques. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms. {\bf D.2.1}: Software, SOFTWARE
                 ENGINEERING, Requirements/Specifications, Languages.",
}

@Article{Eager:1986:BHM,
  author =       "Derek L. Eager and Kenneth C. Sevcik",
  title =        "Bound Hierarchies for Multiple-Class Queuing
                 Networks",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "1",
  pages =        "179--206",
  month =        jan,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:56:00 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4992.html",
  abstract =     "An algorithm for computing bounds on the performance
                 measures of multiple-class, product-form queuing
                 networks is presented. The algorithm offers the user a
                 hierarchy of bounds with differing accuracy levels and
                 computational cost requirements. Unlike previously
                 proposed bounding algorithms, the algorithm is
                 applicable to all of the types of product-form queueing
                 networks that are commonly used in computer system and
                 computer-communication network applications.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Toronto, Toronto, Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; bound hierarchies; bounding algorithms;
                 computer networks --- Performance; computer programming
                 --- Algorithms; computer systems, digital ---
                 Performance; mean value analysis; multiple-class
                 queueing networks; performance; probability;
                 product-form queueing networks; Queueing Theory;
                 theory",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Modeling and prediction. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Operational analysis.
                 {\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Stochastic analysis.",
}

@Article{vandeLiefvoort:1986:MAS,
  author =       "Appie van de Liefvoort and Lester Lipsky",
  title =        "A Matrix-Algebraic Solution to Two ${K}_m$ Servers in
                 a Loop",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "1",
  pages =        "207--223",
  month =        jan,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5391.html",
  abstract =     "An explicit steady-state solution is given for any
                 queuing loop made up of two general servers, whose
                 distribution functions have rational Laplace
                 transforms. The solution is in matrix geometric form
                 over a vector space that is itself a direct or
                 Kronecker product of the internal state spaces of the
                 two servers. The algebraic properties of relevant
                 entities in this space are given in an appendix. The
                 closed-form solution yields simple recursive relations
                 that in turn lead to an efficient algorithm for
                 calculating various performance measures such as queue
                 length and throughput. A computational-complexity
                 analysis shows that the algorithm requires at least an
                 order of magnitude less computational effort than any
                 previously reported algorithm.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Kansas, Dep of Computer Science,
                 Lawrence, KS, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer systems, digital; finite
                 population; mathematical techniques --- Matrix Algebra;
                 mathematical transformations --- Laplace Transforms;
                 matrix-geometric solution; Performance; performance;
                 probability --- Queueing Theory; queue length; theory",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory. {\bf G.m}: Mathematics of Computing,
                 MISCELLANEOUS, Queueing theory. {\bf F.2.1}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Numerical Algorithms and Problems,
                 Computations on matrices.",
}

@Article{Harel:1986:ETI,
  author =       "David Harel",
  title =        "Effective Transformations on Infinite Trees, with
                 Applications to High Undecidability, Dominoes, and
                 Fairness",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "1",
  pages =        "224--248",
  month =        jan,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/4993.html",
  abstract =     "Elementary translation between various kinds of
                 recursive trees are presented. It is shown that trees
                 of either finite or countably infinite branching can be
                 effectively put into one-one correspondence with
                 infinitely branching trees in such a way that the
                 infinite paths of the latter correspond to the
                 `phi-abiding' infinite paths of the former. Here phi
                 can be any member of a very wide class of properties of
                 infinite paths. For many properties phi, the converse
                 holds too. Two of the applications involve (a) the
                 formulation of large classes of highly undecidable
                 variants of classical computational problems, and in
                 particular, easily describable domino problems that are
                 NP-complete, and (b) the existence of a general method
                 for proving termination of nondeterministic or
                 concurrent programs under any reasonable notion of
                 fairness.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Weizmann Inst of Science, Dep of Applied
                 Mathematics, Rehovot, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; domino problems; fairness; high
                 undecidability; infinite trees; languages; mathematical
                 techniques --- Trees; recursive trees; theory;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.3.1}: Theory of Computation, LOGICS
                 AND MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Logics of programs. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Computability
                 theory. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Recursive function theory. {\bf F.4.3}: Theory
                 of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Formal Languages, Decision problems.",
}

@Article{Digricoli:1986:EBB,
  author =       "Vincent J. Digricoli and Malcolm C. Harrison",
  title =        "Equality-Based Binary Resolution",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "2",
  pages =        "253--289",
  month =        apr,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5389.html",
  abstract =     "A major event in automated reasoning was the
                 introduction by J. A. Robinson of resolution as an
                 inference principle that is complete for the
                 first-order predicate calculus. Here the theory of
                 binary resolution, based strictly on unification, is
                 recast to incorporate the axioms of equality.
                 Equality-based binary resolution is complete without
                 making use of paramodulation and leads to refutations
                 that are less than half as long as standard refutations
                 with the equality axioms. A detailed discussion is
                 given of the first major use of a theorem prover based
                 on this new method.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Fordham Univ, Bronx, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; artificial intelligence; completeness;
                 computer metatheory --- Formal Logic; equality-based
                 binary resolution; experimentation; mechanical theorem
                 proving; performance; theory; verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving.",
}

@Article{Asano:1986:PPR,
  author =       "Takao Asano and Tetsuo Asano and Hiroshi Imai",
  title =        "Partitioning a Polygonal Region into Trapezoids",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "2",
  pages =        "290--312",
  month =        apr,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/86.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5387.html",
  abstract =     "The problem of partitioning a polygonal region into a
                 minimum number of trapezoids with two horizontal sides
                 is discussed. A triangle with a horizontal side is
                 considered to be a trapezoid with two horizontal sides
                 one of which is degenerate. First, a method of
                 achieving a minimum partition is presented. Next, this
                 problem is shown to be polynomially equivalent to the
                 problem of finding a maximum independent set of a
                 straight-lines-in-the-plane graph, and consequently, it
                 is shown to be NP-complete. However, for a polygonal
                 region without windows, an $O(n^2)$-time algorithm for
                 partitioning it into a minimum number of trapezoids is
                 presented. Finally, an $O(n \log n)$-time approximation
                 algorithm with the performance bound 3 is presented.
                 The results are relevant to VLSI design.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Tokyo, Tokyo, Jpn",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "714; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "approximation; computational complexity; computational
                 geometry; computer metatheory; computer programming ---
                 Algorithms; decomposition; dynamic programming; image
                 part form; integrated circuits, VLSI --- Computer Aided
                 Design; mathematical techniques --- Graph Theory;
                 np-completeness; partitioning; polygon triangulation;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Computations on
                 discrete structures. {\bf I.4.6}: Computing
                 Methodologies, IMAGE PROCESSING, Segmentation, Region
                 growing, partitioning. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms. {\bf I.3.5}: Computing Methodologies,
                 COMPUTER GRAPHICS, Computational Geometry and Object
                 Modeling, Geometric algorithms, languages, and systems.
                 {\bf J.6}: Computer Applications, COMPUTER-AIDED
                 ENGINEERING, Computer-aided design (CAD).",
}

@Article{Lamport:1986:MEPa,
  author =       "Leslie Lamport",
  title =        "The Mutual Exclusion Problem: {Part I} --- The Theory
                 of Interprocess Communication",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "2",
  pages =        "313--326",
  month =        apr,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5384.html",
  abstract =     "A novel formal theory of concurrent systems that does
                 not assume any atomic operations is introduced. The
                 execution of a concurrent program is modeled as an
                 abstract set of operation executions with two temporal
                 ordering relations: ``precedence'' and ``can causally
                 affect''. A primitive interprocess communication
                 mechanism is then defined. In Part II, the mutual
                 exclusion is expressed precisely in terms of this
                 model, and solutions using the communication mechanisms
                 are given.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Digital Equipment Corp, Palo Alto, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming; computer systems, digital;
                 concurrent systems; Distributed; interprocess
                 communication; mutual exclusion problem; theory",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Mutual exclusion. {\bf H.1.1}: Information
                 Systems, MODELS AND PRINCIPLES, Systems and Information
                 Theory, Information theory. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Concurrency.
                 {\bf F.3.m}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Miscellaneous.",
}

@Article{Lamport:1986:MEPb,
  author =       "Leslie Lamport",
  title =        "The Mutual Exclusion Problem: {Part II} --- Statement
                 and Solutions",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "2",
  pages =        "327--348",
  month =        apr,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5385.html",
  abstract =     "The theory developed in Part I is used to state the
                 mutual exclusion problem and several additional
                 fairness and failure-tolerance requirements. Four
                 ``distributed'' $N$-process solutions are given,
                 ranging from a solution requiring only one
                 communication bit per process that permits individual
                 starvation, to one requiring about $N!$ communication
                 bits per process that satisfies every reasonable
                 fairness and failure-tolerance requirement that we can
                 conceive of.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Digital Equipment Corp, Palo Alto, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer operating systems; computer
                 systems, digital; Distributed; fault-tolerance; mutual
                 exclusion problem; reliability; synchronization;
                 theory",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Mutual exclusion. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Concurrency.
                 {\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Multiprocessing/multiprogramming. {\bf
                 D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Synchronization. {\bf D.4.5}: Software,
                 OPERATING SYSTEMS, Reliability.",
}

@Article{Reiter:1986:SSC,
  author =       "Raymond Reiter",
  title =        "A Sound and Sometimes Complete Query Evaluation
                 Algorithm for Relational Databases with Null Values",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "2",
  pages =        "349--370",
  month =        apr,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5388.html",
  abstract =     "A sound and, in certain cases, complete method is
                 described for evaluating queries in relational
                 databases with null values where these nulls represent
                 existing but unknown individuals. The soundness and
                 completeness results are proved relative to a
                 formalization of such databases as suitable theories of
                 first-order logic. Because the algorithm conforms to
                 the relational algebra, it may easily be incorporated
                 into existing relational systems.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of British Columbia, Vancouver, BC, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "nulls are unique",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; completeness; completeness proofs;
                 computer programming --- Algorithms; database systems;
                 design; first-order logic; integrity constraints;
                 languages; null values; query evaluation; query
                 evaluation algorithm; Relational; relational algebra;
                 relational databases; soundness; soundness proofs;
                 theory; verification",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Data
                 models. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Computational logic.",
}

@Article{Flajolet:1986:PMR,
  author =       "Philippe Flajolet and Claude Puech",
  title =        "Partial Match Retrieval of Multidimensional Data",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "2",
  pages =        "371--407",
  month =        apr,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5453.html",
  abstract =     "A precise analysis of partial match retrieval of
                 multidimensional data is presented. The structures
                 considered here are multidimensional search trees
                 (k-d-trees) and digital tries (k-d-tries), as well as
                 structures designed for efficient retrieval of
                 information stored on external devices. The methods
                 used include a detailed study of a differential system
                 around a regular singular point in conjunction with
                 suitable contour integration techniques for the
                 analysis of $k$-d-trees, and properties of the Mellin
                 integral transform for $k$-d-tries and extendible cell
                 algorithms.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "INRIA, Rocquencourt, Fr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms; data
                 processing; Data Structures; database indexing; K-D
                 trees; K-D tries; mathematical techniques --- Trees;
                 multidimensional data; partial match retrieval;
                 performance; theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Counting problems. {\bf E.1}: Data, DATA
                 STRUCTURES, Trees. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics,
                 Generating functions.",
}

@Article{Abiteboul:1986:TSL,
  author =       "Serge Abiteboul and Seymour Ginsburg",
  title =        "Tuple Sequences and Lexicographic Indexes",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "409--422",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5926.html",
  abstract =     "The concept of a tuple sequence is introduced in order
                 to investigate structure connected with relational
                 model implementation. Analogs are presented for the
                 relational operations of projection, join, and
                 selection, and the decomposition problems for tuple
                 sequences is considered. The lexicographical ordering
                 of tuple sequences is studied via the notion of
                 (lexicographic) index. A sound and complete set of
                 inference rules for indexes is exhibited, and two
                 algorithmic questions related to indexes examined.
                 Finally, indexes and functional dependencies in
                 combination are studied.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Southern California, Los Angeles, CA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 database systems; dependencies inference rules; design;
                 inference rules; lexicographic indexes; management;
                 Relational; structure connected with relational
                 implementation; theory; tuple sequences; verification",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.3.1}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Content
                 Analysis and Indexing.",
}

@Article{Beeri:1986:EIA,
  author =       "Catriel Beeri and Michael Kifer",
  title =        "Elimination of Intersection Anomalies from Database
                 Schemes",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "423--450",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5927.html",
  abstract =     "The desirability of acyclic (conflict-free) schemes
                 has been well argued. When a scheme is described by
                 multivalued dependencies, acyclicity means that the
                 dependencies do not split each other's left-hand side
                 and do not form intersection anomalies. It is shown
                 that if the second condition fails to hold, the scheme
                 can be amended so that it does hold. The basic step is
                 to add one attribute and some dependencies to resolve
                 one intersection anomaly. This step generates an
                 extension of the given scheme in which the anomaly does
                 not exist. Also, the iterative use of the basic step is
                 analyzed and it is proved that the transformation so
                 defined terminates and removes all intersection
                 anomalies.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Hebrew Univ of Jerusalem, Jerusalem, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "remove cyclic dependencies.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "acyclic schemes; algorithms; database systems; design;
                 mathematical techniques --- Graph Theory; multivalued
                 dependencies; Relational; theory; verification",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Schema and subschema. {\bf H.2.1}:
                 Information Systems, DATABASE MANAGEMENT, Logical
                 Design, Normal forms. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms.",
}

@Article{Chin:1986:SPI,
  author =       "Francis Chin",
  title =        "Security Problems on Inference Control for {SUM},
                 {MAX}, and {MIN} queries",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "451--464",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5928.html",
  abstract =     "The basic inference problem is defined as follows: For
                 a finite set $X$ equals $\{x_1, \ldots{}, x_n\}$, we
                 wish to infer properties of elements of $X$ on the
                 basis of sets of `queries' regarding subsets of $X$. By
                 restricting these queries to statistical queries, the
                 statistical database (SDB) security problem is
                 obtained. The security problem for the SDB is to limit
                 the use of the SDB so that only statistical information
                 is available and no sequence of queries is sufficient
                 to infer protected information about any individual.
                 When such information is obtained the SDB is said to be
                 compromised. In this paper, two applications concerning
                 the security of the SDB are considered: (1) On-line
                 application. The queries are answered one by one in
                 sequence and it is necessary to determine whether the
                 SDB is compromised if a new query is answered. (2)
                 Off-line application. All queries are available at the
                 same time and it is necessary to determine the maximum
                 subset of queries to be answered without compromising
                 the SDB.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Hong Kong, Hong Kong",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; data processing --- Security of Data;
                 database systems; inference control; max/min queries;
                 security; security problems; statistical databases; sum
                 query; theory; verification",
  subject =      "{\bf H.2.0}: Information Systems, DATABASE MANAGEMENT,
                 General, Security, integrity, and protection. {\bf
                 D.4.6}: Software, OPERATING SYSTEMS, Security and
                 Protection. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving.
                 {\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Query processing.",
}

@Article{Ginsburg:1986:SSR,
  author =       "Seymour Ginsburg and Richard Hull",
  title =        "Sort Sets in the Relational Model",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "465--488",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5929.html",
  abstract =     "The notion of {\em sort set\/} is introduced here to
                 formalize the fact that certain database relations can
                 be sorted so that two or more columns are
                 simultaneously listed in order. This notion is shown to
                 be applicable in several ways to enhance the efficiency
                 of an implemented database. A characterization of when
                 order dependency implies the existence of sort sets in
                 a database is presented, along with several corollaries
                 concerning complexity, Armstrong directions, and
                 cliques of certain graphs. Sort-set dependencies are
                 then introduced. A (finite) sound and complete set of
                 inference rules for sort-set dependencies is presented,
                 as well as a proof that there is no such set for
                 functional and sort-set dependencies taken together.
                 Deciding logical implication for sort-set dependencies
                 is proved to be polynomial, but if functional
                 dependencies are included the problem is
                 co-NP-complete. Each set of sort-set and functional
                 dependencies is shown to have an Armstrong relation. A
                 natural generalization of Armstrong relation, here
                 called separator, is given and then used to study the
                 relationship between order and sort-set dependencies.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Southern California, Los Angeles, CA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "ordered relations and theorems about them.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database systems; dependencies; design; logical
                 implication; management; ordered domains; performance;
                 Relational; sort sets; theory; verification",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Normal
                 forms.",
}

@Article{Devroye:1986:NHB,
  author =       "Luc Devroye",
  title =        "A Note on the Height of Binary Search Trees",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "489--498",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/5925.5930",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Apr 22 07:19:01 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5930.html",
  abstract =     "Let $H_n$ be the height of a binary search tree with
                 $n$ nodes constructed by standard insertions from a
                 random permutation of $1, \ldots{}, n$. It is shown
                 that $H_n / \log n \to c = 4.31107\ldots{}$ in
                 probability as $n \to \infty$, where $c$ is the unique
                 solution of $(c \log(2e)/c) = 1$, $c \geq 2$. Also, for
                 all $p > 0$, $\lim_{n \to \infty} E(H^p_n) / \log^p n =
                 c^p$. Finally, it is proved that $S_n /\log n \to c* =
                 0.3733\ldots{}$, in probability, where $c*$ is defined
                 by $c \log((2e)/c) = 1$, $c \leq 1$, and $S_n$ is the
                 saturation level of the same tree, that is, the number
                 of full levels in the tree.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "McGill Univ, Montreal, Que, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; binary search trees; computer programming
                 --- Algorithms; data processing; Data Structures;
                 mathematical techniques --- Trees; probability ---
                 Random Processes; theory; verification",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sorting and searching.",
}

@Article{Dolev:1986:RAA,
  author =       "Danny Dolev and Nancy A. Lynch and Shlomit S. Pinter
                 and Eugene W. Stark and William E. Weihl",
  title =        "Reaching Approximate Agreement in the Presence of
                 Faults",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "499--516",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:56:44 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5931.html",
  abstract =     "This paper considers a variant of the Byzantine
                 Generals problem, in which processes start with
                 arbitrary real values rather than Boolean values or
                 values from some bounded range, and in which
                 approximate, rather than exact, agreement is the
                 desired goal. Algorithms are presented to reach
                 approximate agreement in asynchronous, as well as
                 synchronous systems. The asynchronous agreement
                 algorithm is an interesting contrast to a result of M.
                 Fischer et al, who show that exact agreement with
                 guaranteed termination is not attainable in an
                 asynchronous system with as few as one faulty process.
                 The algorithms work by successive approximation, with a
                 provable convergence rate that depends on the ratio
                 between the number of faulty processes and the total
                 number of processes. Lower bounds on the convergence
                 rate for algorithms of this form are proved, and the
                 algorithms presented are shown to be optimal.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Hebrew Univ, Jerusalem, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "agreement in presence of faults; algorithms; Byzantine
                 generals problem; computer networks; computer
                 programming --- Algorithms; computer systems, digital;
                 Distributed; reliability; theory; verification",
  subject =      "{\bf D.4.5}: Software, OPERATING SYSTEMS, Reliability,
                 Fault-tolerance. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed applications. {\bf
                 C.4}: Computer Systems Organization, PERFORMANCE OF
                 SYSTEMS, Reliability, availability, and serviceability.
                 {\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf H.2.4}: Information Systems, DATABASE
                 MANAGEMENT, Systems, Distributed systems.",
}

@Article{Coleman:1986:PFS,
  author =       "Thomas F. Coleman and Anders Edenbrandt and John R.
                 Gilbert",
  title =        "Predicting Fill for Sparse Orthogonal Factorization",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "517--532",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Cited in {\AA ke Bj\"orck's} bibliography on least
                 squares, which is available by anonymous ftp from {\tt
                 math.liu.se} in {\tt pub/references}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5932.html",
  abstract =     "In solving large sparse linear least squares problems
                 Ax approximately equals $b$, several different numeric
                 methods involve computing the same upper triangular
                 factor $R$ of $A$. It is of interest to be able to
                 compute the nonzero structure of R, given only the
                 structure of $A$. The solution to this problem comes
                 from the theory of matchings in bipartite graphs. The
                 structure of $A$ is modeled with a bipartite graph, and
                 it is shown how the rows and columns of $A$ can be
                 rearranged into a structure from which the structure of
                 its upper triangular factor can be correctly computed.
                 Also, a new method for solving sparse least squares
                 problems, called block back-substitution, is presented.
                 This method assures that no unnecessary space is
                 allocated for fill, and that no unnecessary space is
                 needed for intermediate fill.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cornell Univ, Ithaca, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; bipartite graphs; computer programming ---
                 Algorithms; least-squares problems; mathematical
                 techniques; Matrix Algebra; nla; qrd; sparse; sparse
                 matrices; sparse orthogonal factorization; theory;
                 verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations on matrices. {\bf G.1.2}:
                 Mathematics of Computing, NUMERICAL ANALYSIS,
                 Approximation, Least squares approximation. {\bf
                 G.1.3}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 Numerical Linear Algebra, Linear systems (direct and
                 iterative methods). {\bf G.1.3}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Numerical Linear
                 Algebra, Sparse and very large systems. {\bf G.1.6}:
                 Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization, Least squares methods. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures.",
}

@Article{Hochbaum:1986:UAA,
  author =       "Dorit S. Hochbaum and David B. Shmoys",
  title =        "A Unified Approach to Approximation Algorithms for
                 Bottleneck Problems",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "533--550",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5933.html",
  abstract =     "In this paper a powerful, and yet simple, technique
                 for devising approximation algorithms for a wide
                 variety of NP-complete problems in routing, location,
                 and communication network design is investigated. Each
                 of the algorithms presented here delivers an
                 approximate solution guaranteed to be within a constant
                 factor of the optimal solution. In addition, for
                 several of these problems we can show that unless P
                 equals NP, there does not exist a polynomial-time
                 algorithm that has a better performance guarantee.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California, Berkeley, Berkeley, CA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "718; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; approximation algorithms;
                 bottleneck problems; computer programming;
                 np-completeness; telecommunication systems --- Design;
                 theory; verification; worst-case analysis",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory.",
}

@Article{Singh:1986:IMS,
  author =       "Samar Singh",
  title =        "Improved Methods for Storing and Updating Information
                 in the Out-of-Kilter Algorithm",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "551--567",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5934.html",
  abstract =     "Currently, network codes based on the primal simplex
                 algorithm are believed to be computationally superior
                 to those based on other methods. Some modifications of
                 the out-of-kilter algorithm of Ford and Fulkerson are
                 given, together with proofs of their correctness and
                 computer implementations using appropriate data
                 structures. The computational tests in this paper
                 indicate that the final code based on these
                 modifications is superior to any previously implemented
                 version of this algorithm. Although this code is not
                 competitive with state-of-the-art primal simplex codes,
                 its performance is encouraging, especially in the case
                 of assignment problems.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Bharat Heavy Electricals Ltd, New Delhi, India",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 mathematical programming; minimum-cost network flow;
                 out-of-kilter algorithm; performance; primal simplex
                 algorithm; theory; verification",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems.",
}

@Article{Mitra:1986:AEC,
  author =       "Debasis S. Mitra and J. McKenna",
  title =        "Asymptotic Expansions for Closed {Markovian} Networks
                 with State-Dependent Service Rates",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "568--592",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1986.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5935.html",
  abstract =     "A method is presented for calculating the partition
                 function, and from it, performance measures, for closed
                 Markovian stochastic networks with queuing centers in
                 which the service or processing rate depends on the
                 center's state or load. The analysis on which this
                 method is based is new and a major extension of our
                 earlier work on load-independent queuing networks. The
                 method gives asymptotic expansions for the partition
                 function in powers of 1/N, where $N$ is a parameter
                 that reflects the size of the network. The expansions
                 are particularly useful for large networks with many
                 classes, each class having many customers. The end
                 result is a decomposition by which expansion
                 coefficients are obtained exactly by linear
                 combinations of partition function values of small
                 network constructs called pseudonetworks. Effectively
                 computable bounds are given for errors arising from the
                 use of a finite number of expansion terms.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A method is presented for calculating the partition
                 function, and from it, performance measures, for closed
                 Markovian stochastic networks with queuing centers in
                 which the service or processing rate depends on the
                 center's state or load. The analysis on which this
                 method is based is new and a major extension of our
                 earlier work on load-independent queuing networks. The
                 method gives asymptotic expansions for the partition
                 function in powers of $1/n$.",
  classification = "722; 723; 922",
  descriptors =  "Method; closed queueing network; decomposition; state
                 dependent service; performance evaluation",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; closed Markovian stochastic networks;
                 computer systems, digital --- Performance; partition
                 function; performance; performance measures;
                 probability; Queueing Theory; theory; verification",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory. {\bf G.m}: Mathematics of Computing,
                 MISCELLANEOUS, Queueing theory. {\bf C.4}: Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS, Modeling
                 techniques.",
}

@Article{Tsitsiklis:1986:PPB,
  author =       "John N. Tsitsiklis and Christos H. Papadimitriou and
                 Pierre Humblet",
  title =        "The Performance of a Precedence-Based Queueing
                 Discipline",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "593--602",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5936.html",
  abstract =     "A queuing system with infinitely many servers, and
                 with the following queuing discipline is considered:
                 For any two jobs $i$ and $j$ in the system, such that
                 $i$ arrived later than $j$, there is a fixed
                 probability $p$ that $i$ will have to wait for j's
                 execution to terminate before $i$ starts executing.
                 This queuing system is a very simple model for database
                 concurrency control via `static' locking, as well as of
                 parallel execution of programs consisting of several
                 interdependent processes. Results suggest that the
                 degree of multiprogramming of multiuser databases, or
                 the level of parallelism of concurrent programs, is
                 inversely proportional to the probability of conflict,
                 and that the constant is small and known within a
                 factor of 2. The technique used involves the
                 computation of certain asymptotic parameters of a
                 random infinite directed a cyclic graph (dag) that seem
                 of interest by themselves.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford Univ, Stanford, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 921; 922",
  descriptors =  "Performance evaluation; queueing system; physical
                 design; verification",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming --- Multiprogramming;
                 computer systems, digital --- Parallel Processing;
                 database concurrency control; database systems; design;
                 mathematical techniques --- Graph Theory; performance;
                 probability; Queueing Theory; random directed acyclic
                 graphs; theory",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Design studies.
                 {\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Scheduling. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Concurrency.",
}

@Article{Balcazar:1986:PTH,
  author =       "Jose L. Balc{\'{a}}zar and Ronald V. Book and Uwe
                 Sch{\"{o}}ning",
  title =        "The Polynomial-Time Hierarchy and Sparse Oracles",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "603--617",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5937.html",
  abstract =     "Questions about the polynomial-time hierarchy are
                 studied. In particular, the questions, `Does the
                 polynomial-time hierarchy collapse? ' and `Is the union
                 of the hierarchy equal to PSPACE? ' are considered,
                 along with others comparing the union of the hierarchy
                 with certain probabilistic classes. In each case it is
                 shown that the answer is `yes' if and only if for every
                 sparse set S, the answer is `yes' when the classes are
                 relativized to $S$ if and only if there exists a sparse
                 set $S$ such that the answer is `yes' when the classes
                 are relativized to S. Thus, in each case the question
                 is answered if it is answered for any arbitrary sparse
                 oracle set.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ Politecnica de Barcelona, Barcelona,
                 Spain",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "complexity classes; computer metatheory;
                 polynomial-time hierarchy; probability; sparse oracles;
                 theory; verification",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Relations among
                 complexity classes. {\bf F.1.3}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Classes,
                 Complexity hierarchies. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Relativized computation.",
}

@Article{Long:1986:RCC,
  author =       "Timothy J. Long and Alan L. Selman",
  title =        "Relativizing Complexity Classes with Sparse Oracles",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "3",
  pages =        "618--627",
  month =        jul,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/5938.html",
  abstract =     "T. Baker et al. constructed sparse sets A and B such
                 that P(A) does not equal NP(A) and NP(B) does not equal
                 co-NP(B). In contrast to their results, we prove that P
                 equals NP if and only if for every tally language T,
                 P(T) equals NP(T), and that NP equals co-NP if and only
                 if for every tally language T, NP(T) equals co-NP(T).
                 We show that the polynomial hierarchy collapses if and
                 only if there is a sparse set $S$ such that the
                 polynomial hierarchy relative to $S$ collapses. Similar
                 results are obtained for several other complexity
                 classes.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Ohio State Univ, Columbus, OH, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; complexity classes; computer metatheory;
                 polynomial hierarchy; sparse oracles; tally languages;
                 theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Alternation and
                 nondeterminism. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Relativized computation. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity
                 classes.",
}

@Article{deChampeaux:1986:SFI,
  author =       "Dennis {de Champeaux}",
  title =        "Subproblem Finder and Instance Checker, Two
                 Cooperating Modules for Theorem Provers",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "633--657",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6491.html",
  abstract =     "Properties are proved about INSTANCE, a theorem prover
                 module that recognizes that a formula is a special case
                 and\slash or an alphabetic variant of another formula,
                 and about INSURER, another theorem prover module that
                 decomposes a problem, represented by a formula, into
                 independent subproblems, using a conjunction. The main
                 result of INSTANCE is soundness; the main result of
                 INSURER is a maximum decomposition into subproblems
                 (with some provisos). Experimental results show that a
                 connection graph theorem prover extended with these
                 modules is more effective than the resolution-based
                 connection graph theorem prover alone.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Amsterdam, Neth",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; artificial intelligence; computer
                 programming --- Algorithms; experimentation; instance
                 checker; subproblem finder; theorem provers; theory;
                 verification",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving. {\bf
                 I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Deduction.",
}

@Article{Grimson:1986:CLC,
  author =       "W. Eric L. Grimson",
  title =        "The Combinatorics of Local Constraints in Model-Based
                 Recognition and Localization from Sparse Data",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "658--686",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/Reverse.eng.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6492.html",
  abstract =     "The problem of recognizing what objects are where in
                 the workspace of a robot can be cast as one of
                 searching for a consistent matching between sensory
                 data elements and equivalent model elements. In
                 principle, this search space is enormous, and to
                 control the potential combinatorial explosion,
                 constraints between the data and model elements are
                 needed. A set of constraints for sparse sensory data
                 that are applicable to a wide variety of sensors are
                 derived, and their characteristics are examined. Known
                 bounds on the complexity of constraint satisfaction
                 problems are used, together with explicit estimates of
                 the effectiveness of the constraints derived for the
                 case of sparse, noisy, three-dimensional sensory data,
                 to obtain general theoretical bounds on the number of
                 interpretations expected to be consistent with the
                 data. It is shown that these bounds are consistent with
                 empirical results reported previously.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "MIT, Cambridge, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "artificial intelligence; constrained search; image
                 part form; large dimensionality; local constraints;
                 object recognition; pattern recognition; robotics;
                 theory",
  subject =      "{\bf I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding.",
}

@Article{Ramachandran:1986:DML,
  author =       "Vijaya Ramachandran",
  title =        "On Driving Many Long Wires in a {VLSI} Layout",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "687--701",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6784.html",
  abstract =     "It is assumed that long wires represent large
                 capacitive loads, and the effect on the area of a VLSI
                 layout when drivers are introduced along many long
                 wires in the layout is investigated. A layout is
                 presented for which the introduction of standard
                 drivers along long wires squares the area of the
                 layout; it is shown, however, that the increase in area
                 is never greater than the layout's area squared if the
                 driver can be laid out in a square region. This paper
                 also shows an area-time trade-off for the driver of a
                 single long wire of length l by which the area of the
                 driver from $\Theta(l)$, to $\Theta(l^q)$, $q < 1$, can
                 be reduced if a delay of $\Theta(l^{1 - q})$ rather
                 than $\Theta(\log l)$ can be tolerated. Tight bounds
                 are also obtained on the worst-case area increase in
                 general layouts having these drivers.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Illinois at Urbana-Champaign, Urbana,
                 IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "714; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Computer Aided Design; computer programming ---
                 Algorithms; design; drivers and area bounds; integrated
                 circuits, VLSI; performance; theory; verification; VLSI
                 layout",
  subject =      "{\bf B.7.1}: Hardware, INTEGRATED CIRCUITS, Types and
                 Design Styles, VLSI (very large scale integration).
                 {\bf B.7.2}: Hardware, INTEGRATED CIRCUITS, Design
                 Aids.",
}

@Article{Chaudhuri:1986:AGP,
  author =       "R. Chaudhuri and A. N. V. Rao",
  title =        "Approximating Grammar Probabilities: {Solution} of a
                 Conjecture",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "702--705",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214099.html",
  abstract =     "It is proved that the production probabilities of a
                 probabilistic context-free grammar may be obtained as
                 the limit of the estimates inferred from an increasing
                 sequence of randomly drawn samples from the language
                 generated by the grammar.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Eastern Michigan Univ, Ypsilanti, MI, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "approximation; automata theory; Context Free Grammars;
                 estimation; languages; probabilistic grammars;
                 probability; theory; verification",
  subject =      "{\bf F.4.2}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Grammars and Other Rewriting
                 Systems, Grammar types.",
}

@Article{Collings:1986:IGF,
  author =       "Bruce Jay Collings and G. Barry Hembree",
  title =        "Initializing Generalized Feedback Shift Register
                 Pseudorandom Number Generators",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "706--711",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/6490.6493",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1986.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "See also \cite{Collings:1988:AIG}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6493.html",
  abstract =     "The generalized feedback shift register pseudorandom
                 number generators proposed by T. G. Lewis and W. H.
                 Payne provide a very attractive method of random number
                 generation. Unfortunately, the published initialization
                 procedure can be extremely time consuming. This paper
                 considers an alternative method of initialization based
                 on a natural polynomial representation for the terms of
                 a feedback shift register sequence that results in
                 substantial improvements in the initialization
                 process.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Montana State Univ, Bozeman, MT, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  descriptors =  "Shift register sequences",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computers, digital --- Shift Registers;
                 generalized feedback shift register; mathematical
                 statistics; measurement; performance; pseudorandom
                 number generators; Random Number Generation",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation.",
}

@Article{Cosnard:1986:CPQ,
  author =       "M. Cosnard and Y. Robert",
  title =        "Complexity of Parallel {QR} Factorization",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "712--723",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/OVR.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214102.html",
  abstract =     "An optimal algorithm to perform the parallel QR
                 decomposition of a dense matrix of size $N$ is
                 proposed. It is deduced that the complexity of such a
                 decomposition is asymptotically 2N, when an unlimited
                 number of processors is available.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ de Grenoble, Fr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 givens triangularization; mathematical techniques;
                 Matrix Algebra; parallel qr factorization; theory;
                 verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations on matrices. {\bf G.1.0}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, General,
                 Parallel algorithms. {\bf G.1.3}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Numerical Linear
                 Algebra, Linear systems (direct and iterative
                 methods).",
}

@Article{Apt:1986:CNR,
  author =       "K. R. Apt and G. D. Plotkin",
  title =        "Countable Nondeterminism and Random Assignment",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "724--767",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/dbase.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6494.html",
  abstract =     "Four semantics for a small programming language
                 involving unbounded (but countable) nondeterminism are
                 provided. These comprise an operational semantics, two
                 state transformation semantics based on the Egli-Milner
                 and Smyth orders, respectively, and a weakest
                 precondition semantics. Their equivalence is proved. A
                 Hoare-like proof system for total correctness is also
                 introduced and its soundness and completeness in an
                 appropriate sense are shown. Finally, the recursion
                 theoretic complexity of the notions introduced is
                 studied.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ Paris 7, Paris, Fr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; computer programming languages;
                 countable nondeterminism; languages; random assignment;
                 semantics; Theory; theory; verification",
  subject =      "{\bf D.2.4}: Software, SOFTWARE ENGINEERING, Program
                 Verification, Correctness proofs. {\bf D.3.1}:
                 Software, PROGRAMMING LANGUAGES, Formal Definitions and
                 Theory, Semantics. {\bf F.3.1}: Theory of Computation,
                 LOGICS AND MEANINGS OF PROGRAMS, Specifying and
                 Verifying and Reasoning about Programs. {\bf F.3.2}:
                 Theory of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Semantics of Programming Languages. {\bf F.3.3}: Theory
                 of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Studies of Program Constructs, Control primitives.",
}

@Article{Conway:1986:RNE,
  author =       "A. E. Conway and N. D. Georganas",
  title =        "{RECAL}--{A} New Efficient Algorithm for the Exact
                 Analysis of Multiple-Chain Queuing Networks",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "768--791",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1986.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6495.html",
  abstract =     "RECAL, a Recursion by Chain Algorithm for computing
                 the mean performance measures of product-form
                 multiple-chain closed queuing networks, is presented.
                 It is based on a new recursive expression that relates
                 the normalization constant of a network with r closed
                 routing chains to those of a set of networks having (r
                 minus 1) chains. It relies on the artifice of breaking
                 down each chain into constituent subchains that each
                 have a population of one. The time and space
                 requirements of the algorithm are shown to be
                 polynomial in the number of chains. When the network
                 contains many routing chains, the proposed algorithm is
                 substantially more efficient than the convolution or
                 mean value analysis algorithms. The algorithm,
                 therefore, extends the range of queuing networks that
                 can be analyzed efficiently by exact means.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Ottawa, Ottawa, Ont Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  descriptors =  "Queueing system; MVA",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 multiple-chain closed queuing networks; performance;
                 probability; Queueing Theory; recursion by chain
                 algorithm; theory; verification",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Network operating systems. {\bf D.4.4}: Software,
                 OPERATING SYSTEMS, Communications Management, Network
                 communication. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, RECAL. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Modeling and
                 prediction. {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance, Stochastic analysis. {\bf D.4.8}:
                 Software, OPERATING SYSTEMS, Performance, Queueing
                 theory.",
}

@Article{Goldreich:1986:HCR,
  author =       "Oded Goldreich and Shafi Goldwasser and Silvio
                 Micali",
  title =        "How to Construct Random Functions",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "792--807",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/6490.6503",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "A computational complexity measure of the randomness
                 of functions is introduced, and, assuming the existence
                 of one-way functions, a pseudo-random function
                 generator is presented.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6503.html",
  abstract =     "A constructive theory of randomness for functions,
                 based on computational complexity, is developed, and a
                 pseudorandom function generator is presented. The
                 generator is a deterministic polynomial-time algorithm
                 that transforms pairs $(g, r)$, where $g$ is any
                 one-way function and $r$ is a random $k$-bit string, to
                 polynomial-time computable functions that cannot be
                 distinguished from random functions by any
                 probabilistic polynomial-time algorithm that asks and
                 receives the value of a function at arguments of its
                 choice. The result has applications in cryptography,
                 random constructions, and complexity theory.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "MIT, Cambridge, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computational complexity; computer
                 metatheory; computer programming --- Algorithms;
                 cryptography; probability; pseudorandom function
                 generator; random functions; Random Processes;
                 security; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes. {\bf F.1.1}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Models of Computation. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Probabilistic computation. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Probabilistic algorithms (including Monte Carlo). {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation.",
}

@Article{Kannan:1986:PTA,
  author =       "R. Kannan and R. J. Lipton",
  title =        "Polynomial-Time Algorithm for the Orbit Problem",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "808--821",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6496.html",
  abstract =     "The accessibility problem for linear sequential
                 machines is the problem of deciding whether there is an
                 input $x$ such that on x the machine starting in a
                 given state $q_1$ goes to a given state $q_2$. It has
                 been shown that this problem is reducible to the
                 following simply stated linear algebra problem, which
                 we call the `orbit problem': Given $(n, A, x, y)$,
                 where $n$ is a natural number and $A$, $x$, and $y$ are
                 $n \times n$, $n \times 1$, and $n \times 1$ matrices
                 of rationals, respectively, decide whether there is a
                 natural number $i$ such that $A^i x = y$. This paper
                 shows that the orbit problem for general $n$ is
                 decidable and in polynomial time.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California, Berkeley, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computational complexity; computer
                 metatheory; computer programming --- Algorithms;
                 languages; orbit problem; polynomial-time algorithm;
                 theory",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations on matrices. {\bf F.2.1}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Numerical Algorithms and Problems,
                 Number-theoretic computations. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Automata. {\bf G.2.0}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, General.",
}

@Article{Rowland:1986:SSA,
  author =       "John H. Rowland and John R. Cowles",
  title =        "Small Sample Algorithms for the Identification of
                 Polynomials",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "822--829",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $P_n$ be the class of polynomials of degree less
                 than equivalent to $n$. It is well known that the
                 coefficients of any polynomial p belonging to $P_n$ can
                 be recovered by sampling p at $n$ + 1 distinct points.
                 In this paper a sample is considered to be small if it
                 can be used to recover the coefficients of polynomials
                 having arbitrarily large degree. It is shown that small
                 samples do exist for the class P(M) of polynomials with
                 integer coefficients bounded in magnitude by M.
                 Algorithms, based on the Chinese Remainder Theorem and
                 the theory of generalized Vandermonde determinants, are
                 developed that recover the coefficients of polynomials
                 from the class P(M) using small samples.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Wyoming, Laramie, WY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Chinese remainder theorem; computer programming ---
                 Algorithms; identification of polynomials; mathematical
                 techniques; Polynomials; small sample algorithms;
                 Vandermonde determinants",
}

@Article{Chazelle:1987:ICO,
  author =       "B. Chazelle and D. P. Dobkin",
  title =        "Intersection of Convex Objects in Two and Three
                 Dimensions",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "1--27",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/87.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/24036.html",
  abstract =     "One of the basic geometric operations involves
                 determining whether a pair of convex objects intersect.
                 This problem is well understood in a model of
                 computation in which the objects are given as input and
                 their intersection is returned as output. For many
                 applications, however, it may be assumed that the
                 objects already exist within the computer and that the
                 only output desired is a single piece of data giving a
                 common point if the objects intersect or reporting no
                 intersection if they are disjoint. For this problem,
                 none of the previous lower bounds are valid and
                 algorithms are proposed requiring sublinear time for
                 their solution in two and three dimensions.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Yale Univ, New Haven, CT, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; computer programming; convex
                 sets; Fibonacci search; image part form; intersection
                 of convex objects; mathematical techniques ---
                 Geometry; theory; verification",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES. {\bf F.2.2}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems.",
}

@Article{Vianu:1987:DFD,
  author =       "Victor Vianu",
  title =        "Dynamic Functional Dependencies and Database Aging",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "28--59",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/7918.html",
  abstract =     "A simple extension of the relational model is
                 introduced to study the effects of dynamic constraints
                 on database evolution. Both static and dynamic
                 constraints are used in conjunction with the model. The
                 static constraints considered here are functional
                 dependencies (FDs). The dynamic constraints involve
                 global updates and are restricted to certain analogs of
                 FDs, called ``dynamic'' FDs. The results concern the
                 effect of the dynamic constraints on the static
                 constraints satisfied by the database in the course of
                 time. The effect of the past history of the database on
                 the static constraints is investigated using the
                 notions of age and age closure. The connection between
                 the static constraints and the potential future
                 evolution of the database is briefly discussed using
                 the notions of survivability and survivability
                 closure.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California, San Diego, La Jolla, CA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "database aging; database systems; dynamic constraints;
                 functional dependencies; Relational; static
                 constraints; survivability; theory",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design. {\bf H.2.3}: Information Systems,
                 DATABASE MANAGEMENT, Languages, Data description
                 languages (DDL).",
}

@Article{Reif:1987:LTS,
  author =       "John H. Reif and Leslie G. Valiant",
  title =        "A Logarithmic Time Sort for Linear Size Networks",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "60--76",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/7532.html",
  abstract =     "A randomized parallel algorithm that sorts on an $N$
                 node network with constant valence in $O(\log N)$ time
                 is given. More particularly, the algorithm sorts $N$
                 items on an $N$-node cube-connected cycles graph, and,
                 for some constant $k$,for all large enough alpha, it
                 terminates with $k \alpha \log N$ time with probability
                 at least $1 - N^{-\alpha}$.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Harvard Univ, Cambridge, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 computer systems programming; linear size networks;
                 logarithmic time sort; parallel algorithms; randomized
                 algorithms; Sorting; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 F.1.2}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Modes of Computation, Probabilistic
                 computation. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Routing and
                 layout. {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 F.1.2}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Modes of Computation, Parallelism and
                 concurrency.",
}

@Article{Dolev:1987:MSN,
  author =       "Danny Dolev and Cynthia Dwork and Larry Stockmeyer",
  title =        "On the Minimal Synchronism Needed for Distributed
                 Consensus",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "77--97",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/7533.html",
  abstract =     "Reaching agreement is a primitive of distributed
                 computing. Whereas this poses no problem in an ideal,
                 failure-free environment, it imposes certain
                 constraints on the capabilities of an actual system: A
                 system is viable only if it permits the existence of
                 consensus protocols tolerant to some number of
                 failures. M. J. Fischer et al. have shown that in a
                 completely asynchronous model, even one failure cannot
                 be tolerated. In this paper their work is extended:
                 Several critical system parameters, including various
                 synchrony conditions, are identified and how varying
                 these affects the number of faults that can be
                 tolerated is examined. The proofs expose general
                 heuristic principles that explain why consensus is
                 possible in certain models but not possible in
                 others.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Hebrew Univ, Jerusalem, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer networks --- Protocols; computer systems,
                 digital; design; Distributed; distributed consensus;
                 general heuristic principles; minimal synchronism;
                 reliability; synchrony conditions",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed applications. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed databases. {\bf
                 C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Network operating systems. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Reliability,
                 availability, and serviceability.",
}

@Article{Frederickson:1987:ELS,
  author =       "Greg N. Frederickson and Nancy A. Lynch",
  title =        "Electing a Leader in a Synchronous Ring",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "98--115",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/7919.html",
  abstract =     "The problem of electing a leader in a synchronous ring
                 of $n$ processors is considered. Both positive and
                 negative results are obtained. On the one hand, if
                 processor IDs are chosen from some countable set, then
                 there is an algorithm that uses only $O(n)$ messages in
                 the worst case. On the other hand, any algorithm that
                 is restricted to use only comparisons of IDs requires
                 $\Omega (n \log n)$ messages in the worst case.
                 Alternatively, if the number of rounds is required to
                 be bounded by some $t$ in the worst case, and IDs are
                 chosen from any set having at least $f(n, t)$ elements,
                 for a certain very fast-growing function $f$, then any
                 algorithm requires $\Omega(n \log n)$ messages in the
                 worst case.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Purdue Univ, West Lafayette, IN, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; comparison algorithms; computer networks;
                 computer programming --- Algorithms; computer systems,
                 digital; Distributed; distributed algorithms; leader
                 election; ring networks; synchronous ring; theory;
                 verification",
  subject =      "{\bf C.2.5}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Local Networks, Rings.
                 {\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 F.1.1}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Unbounded-action
                 devices. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems.",
}

@Article{Upfal:1987:HSM,
  author =       "Eli Upfal and Avi Wigderson",
  title =        "How to Share Memory in a Distributed System",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "116--127",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/7926.html",
  abstract =     "The power of shared-memory in models of parallel
                 computation is studied, and a novel distributed data
                 structure that eliminates the need for shared memory
                 without significantly increasing the run time of the
                 parallel computation is described. More specifically,
                 it is shown how a complete network of processors can
                 deterministically simulate one PRAM step in $O(\log n
                 (\log\log n)hoch2)$ time when both models use $n$
                 processors and the size of the PRAM's shared memory is
                 polynomial in $n$. (The best previously known upper
                 bound was the trivial $O(n)$). It is established that
                 this upper bound is nearly optimal, and it is proved
                 that an one-line simulation of $T$ PRAM steps by a
                 complete network of processors requires $\omega(T(\log
                 n/\log\log n))$ time. A simple consequence of the upper
                 bound is that an Ultracomputer (the currently feasible
                 general-purpose parallel machine) can simulate one step
                 of a PRAM (the most convenient parallel model to
                 program) in $O((\log n)hoch2 \log\log n)$ steps.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford Univ, Stanford, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer operating systems; computer programming ---
                 Algorithms; computer simulation; computer systems,
                 digital --- Parallel Processing; data processing ---
                 Data Structures; design; parallel algorithms;
                 performance; shared memory; Storage Allocation; theory;
                 ultracomputer",
  subject =      "{\bf D.4.2}: Software, OPERATING SYSTEMS, Storage
                 Management, Distributed memories. {\bf D.4.7}:
                 Software, OPERATING SYSTEMS, Organization and Design,
                 Distributed systems. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf C.1.2}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors),
                 Parallel processors. {\bf B.3.3}: Hardware, MEMORY
                 STRUCTURES, Performance Analysis and Design Aids,
                 Formal models.",
}

@Article{Toyama:1987:CRP,
  author =       "Yoshihito Toyama",
  title =        "On the {Church--Rosser} Property for the Direct Sum of
                 Term Rewriting Systems",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "128--143",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Compiler/prog.lang.theory.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/7534.html",
  abstract =     "The direct sum of two term rewriting systems is the
                 union of systems having disjoint sets of function
                 symbols. It is shown that if two term rewriting systems
                 both have the Church--Rosser property, then the direct
                 sum of these systems also has this property.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "NTT, Electrical Communication Lab, Tokyo, Jpn",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory; Church--Rosser property; computer
                 programming languages --- Theory; disjoint sets of
                 function symbols; Formal Languages; term rewriting
                 systems",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Lambda
                 calculus and related systems. {\bf F.4.2}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Grammars and Other Rewriting Systems. {\bf F.4.1}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic, Mechanical theorem
                 proving. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving.",
}

@Article{Hochbaum:1987:UDA,
  author =       "Dorit S. Hochbaum and David B. Shmoys",
  title =        "Using Dual Approximation Algorithms for Scheduling
                 Problems: {Theoretical} and Practical Results",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "144--162",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/7535.html",
  abstract =     "The problem of scheduling a set of $n$ jobs on $m$
                 identical machines so as to minimize the makespan time
                 is perhaps the most well-studied problem in the theory
                 of approximation algorithms for NP-hard optimization
                 problems. In this paper the strongest possible type of
                 result for this problem, a polynomial approximation
                 scheme, is presented. The scheme is based on a new
                 approach to constructing approximation algorithms,
                 which is called dual approximation algorithms, where
                 the aim is to find superoptimal, but infeasible,
                 solutions, and the performance is measured by the
                 degree of infeasibility allowed. This notion should
                 find wide applicability in its own right and should be
                 considered for any optimization problem where
                 traditional approximation algorithms have been
                 particularly elusive.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California, Berkeley, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912; 913",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; combinatorial optimization; computer
                 programming --- Algorithms; dual approximation
                 algorithms; makespan time minimization; operations
                 research; performance; Scheduling; theory;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sequencing and scheduling.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures.",
}

@Article{Reischuk:1987:SWP,
  author =       "R{\"{u}}diger Reischuk",
  title =        "Simultaneous {WRITES} of Parallel Random Access
                 Machines Do Not Help to Compute Simple Arithmetic
                 Functions",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "163--178",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/22944.html",
  abstract =     "The ability of the strongest parallel random access
                 machine model WRAM is investigated. In this model
                 different processors may simultaneously try to write
                 into the same cell of the common memory. It has been
                 shown that a parallel RAM without this option (PRAM),
                 even with arbitrarily many processors, can almost never
                 achieve sublogarithmic time. On the contrary, every
                 function with a small domain like binary values in case
                 of Boolean functions can be computed by a WRAM in
                 constant time. The machine makes fast table look-ups
                 using its simultaneous write ability. The main result
                 of this paper implies that in general this is the
                 ``only way'' to perform such fast computations and that
                 a domain of small size is necessary. Functions with
                 large domains for which any change of one of the $n$
                 arguments also changes the result are considered, and a
                 logarithmic lower time bound for WRAMs is proved.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ Bielefeld, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer metatheory; computer systems,
                 digital; Parallel Processing; parallel random access
                 machines; simple arithmetic functions; simultaneous
                 writes; theory; verification",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation. {\bf F.1.3}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems. {\bf F.2.3}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Tradeoffs among Complexity
                 Measures.",
}

@Article{Donatiello:1987:ACP,
  author =       "Lorenzo Donatiello and Balakrishna R. Iyer",
  title =        "Analysis of a Composite Performance Reliability
                 Measure for Fault-Tolerant Systems",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "179--199",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/7536.html",
  abstract =     "A composite measure for the performance and
                 reliability of a fault-tolerant system observed over a
                 finite mission time is analyzed. A Markov chain model
                 is used for system state-space representation, and
                 transient analysis is performed to obtain closed-form
                 solutions for the density and moments of the composite
                 measure. Only failures that cannot be repaired until
                 the end of the mission are modeled. The time spent in a
                 specific system configuration is assumed to be large
                 enough to permit the use of a hierarchical model and
                 static measures to quantify the performance of the
                 system in individual configurations. For a
                 multiple-processor system, where performance measures
                 are usually associated with and aggregated over many
                 jobs, this is tantamount to assuming that the time to
                 process a job is much smaller than the time between
                 failures. An extension of the results to general
                 acyclic Markov chain models is included.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IBM, Thomas J. Watson Research Cent, Yorktown
                 Heights, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer systems, digital; computers,
                 digital --- Reliability; Fault Tolerant Capability;
                 hierarchical model; Markov chain model; performance;
                 reliability; reliability measure; reliability theory",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Performance attributes. {\bf C.4}: Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS,
                 Reliability, availability, and serviceability.",
}

@Article{Cole:1987:SSN,
  author =       "Richard Cole",
  title =        "Slowing Down Sorting Networks to Obtain Faster Sorting
                 Algorithms",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "200--208",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/siggraph/87.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/7537.html",
  abstract =     "N. Megiddo introduced a technique for using a parallel
                 algorithm for one problem to construct an efficient
                 serial algorithm for a second problem. This paper
                 provides a general method that trims a factor of
                 $O(\log n)$ time (or more) for many applications of
                 this technique.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "New York Univ, New York, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 computer systems programming; design; parallel
                 algorithms; Sorting; sorting algorithms; sorting
                 networks; theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Relations among modes. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Geometrical problems and computations. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sequencing and scheduling. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sorting and searching. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Network problems. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Path and
                 circuit problems. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Trees.",
}

@Article{Urquhart:1987:HER,
  author =       "Alasdair Urquhart",
  title =        "Hard Examples for Resolution",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "1",
  pages =        "209--219",
  month =        jan,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/8928.html",
  abstract =     "Exponential lower bounds are proved for the
                 length-of-resolution refutations of sets of
                 disjunctions constructed from expander graphs, using
                 the method of G. S. Tseitin. Since these sets of
                 clauses encode biconditionals, they have short
                 (polynomial-length) refutations in a standard axiomatic
                 formulation of propositional calculus.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Toronto, Toronto, Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer metatheory; expander graphs;
                 length-of-resolution refutations; lower bounds;
                 mathematical techniques --- Graph Theory; performance;
                 resolution method; sets of disjunctions; theory;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Complexity of proof
                 procedures. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Mechanical theorem proving. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Resolution.",
}

@Article{Murray:1987:IPR,
  author =       "Neil V. Murray and Erik Rosenthal",
  title =        "Inference with Path Resolution and Semantic Graphs",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "225--254",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/23716.html",
  abstract =     "A graphical representation of quantifier-free
                 predicate calculus formulas in negation normal form and
                 a new rule of inference that employs this
                 representation are introduced. The new rule, path
                 resolution, is an amalgamation of resolution and
                 Prawitz analysis. The goal in the design of path
                 resolution is to retain some of the advantages of both
                 Prawitz analysis and resolution methods, and yet to
                 avoid to some extent their disadvantages. Path
                 resolution allows Prawitz analysis of an arbitrary
                 subgraph of the graph representing a formula. If such a
                 subgraph is not large enough to demonstrate a
                 contradiction, a path resolvent of the subgraph may be
                 generated with respect to the entire graph. This
                 generalizes the notions of large inference present in
                 hyperresolution, clash-resolution, NC-resolution, and
                 UR-resolution. A class of subgraphs is described for
                 which deletion of some of the links resolved upon
                 preserves the spanning property.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "State Univ of New York at Albany, Albany, NY,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; artificial intelligence; mathematical
                 techniques --- Graph Theory; path resolution; semantic
                 graphs; theory; verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Computational
                 logic. {\bf F.4.1}: Theory of Computation, MATHEMATICAL
                 LOGIC AND FORMAL LANGUAGES, Mathematical Logic,
                 Mechanical theorem proving. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Deduction. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Metatheory. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Resolution.",
}

@Article{Hsu:1987:RPP,
  author =       "Wen-Lian Hsu",
  title =        "Recognizing Planar Perfect Graphs",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "255--288",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/31330.html",
  abstract =     "An $O(n^3)$ algorithm for recognizing planar graphs
                 that do not contain induced odd cycles of length
                 greater than 3 (odd holes) is presented. A planar graph
                 with this property satisfies the requirement that its
                 maximum clique size equal the minimum number of colors
                 required for the graph (graphs all of whose induced
                 subgraphs satisfy the latter property are perfect as
                 defined by Berge). The algorithm presented is based on
                 decomposing these graphs into essentially two special
                 classes of inseparable component graphs that are easy
                 to recognize. The algorithm can also be adapted to
                 solve the corresponding maximum independent set and
                 minimum coloring problems. Finally, the path-parity
                 problem on planar perfect graphs is considered.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Northwestern Univ, Evanston, IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 decomposition algorithms; graph algorithms; graph
                 coloring; graph decomposition; Graph Theory;
                 mathematical techniques; planar perfect graphs; theory;
                 verification",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems. {\bf I.5.3}: Computing Methodologies, PATTERN
                 RECOGNITION, Clustering, Algorithms.",
}

@Article{Greenberg:1987:EMC,
  author =       "Albert G. Greenberg and Philippe Flajolet and Richard
                 E. Ladner",
  title =        "Estimating the Multiplicities of Conflicts to Speed
                 Their Resolution in Multiple Access Channels",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "289--325",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/CCR.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "{\em Reviews\/}: Computing Reviews, Vol. 30, No. 7",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/23006.html",
  abstract =     "New, improved algorithms are proposed for regulating
                 access to a common channel shared by many
                 geographically distributed computing stations. A
                 conflict of multiplicity $n$ occurs when $n$ stations
                 transmit simultaneously to the channel. Stations
                 receive feedback indicating whether $n$ is 0, 1, or
                 less than equivalent to 2. If $n = 1$, the transmission
                 succeeds; whereas if $n \geq 2$, all the transmissions
                 fail. Algorithms are presented and analyzed that allow
                 the conflicting stations to compute a stochastic
                 estimate of $n$, cooperatively, at small cost, as a
                 function of the feedback elicited during its execution.
                 An algorithm to resolve a conflict among two or more
                 stations controls the retransmissions of the
                 conflicting stations so that each eventually transmits
                 singly to the channel. Combining one of these
                 estimation algorithms with a tree algorithm leads to a
                 hybrid algorithm for conflict resolution.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer networks --- Local Networks;
                 computer programming --- Algorithms; computer systems,
                 digital; conflict resolution; Distributed; Lower-Layer
                 Protocols; multiple access channels; performance;
                 random-access schemes; theory; verification",
  subject =      "{\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf C.2.5}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Local Networks, Access schemes.",
}

@Article{Lee:1987:ORS,
  author =       "Yann-Hang Lee and Kang G. Shin",
  title =        "Optimal Reconfiguration Strategy for a Degradable
                 Multimodule Computing System",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "326--348",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:57:16 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/23016.html",
  abstract =     "A quantitative approach to the problem of
                 reconfiguring a degradable multimodule system is
                 presented. The approach is concerned with both
                 assigning some modules for computation and arranging
                 others for reliability. Conventionally, a
                 fault-tolerant system performs reconfiguration only
                 upon a subsystem failure. Since there exists an
                 inherent trade-off between the computation capacity and
                 fault tolerance of a multimodule computing system, the
                 conventional approach is a passive action and does not
                 yield a configuration that provides an optimal
                 compromise for the trade-off. By using the expected
                 total reward as the optimal criterion, the need and
                 existence of an active reconfiguration strategy, in
                 which the system reconfigures itself on the basis of
                 not only the occurrence of a failure but also the
                 progression of the mission, are shown. Some important
                 properties of an optimal reconfiguration strategy.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Michigan, Ann Arbor, MI, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; degradable multimodule
                 computing system; dynamic failure; Fault Tolerant
                 Capability; optimal reconfiguration strategy;
                 optimization; performance; reliability; verification",
  subject =      "{\bf B.2.3}: Hardware, ARITHMETIC AND LOGIC
                 STRUCTURES, Reliability, Testing, and Fault-Tolerance.
                 {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf G.1.6}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Optimization, Integer programming.",
}

@Article{Chan:1987:AQE,
  author =       "Edward P. F. Chan and Alberto O. Mendelzon",
  title =        "Answering Queries on Embedded-Complete Database
                 Schemes",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "349--375",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/23007.html",
  abstract =     "It has been observed that, for some database schemes,
                 users may have difficulties retrieving correct
                 information, even for simple queries. The problem
                 occurs when some implicit ``piece'' of information,
                 defined on some subset of a relation scheme, is not
                 explicitly represented in the database state. In this
                 situation, users may be required to know how the state
                 and the constraints interact before they can retrieve
                 the information correctly. In this paper, the formal
                 notion of embedded-completeness is proposed, and it is
                 shown that schemes with this property avoid the problem
                 described above. A polynomial-time algorithm is given
                 to test whether a database scheme is independent and
                 embedded-complete.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Toronto, Toronto, Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; database systems;
                 design; embedded-complete database schemes; functional
                 dependencies; join dependencies; query-answering;
                 Relational; theory",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Schema and subschema. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Query processing. {\bf H.1.1}: Information Systems,
                 MODELS AND PRINCIPLES, Systems and Information Theory.
                 {\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Normal forms.",
}

@Article{Papachristou:1987:ATL,
  author =       "Christos A. Papachristou",
  title =        "Associative Table Lookup Processing for Multioperand
                 Residue Arithmetic",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "376--396",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/23017.html",
  abstract =     "This paper investigates the complexity of multioperand
                 residue addition and multiplication implemented by
                 associative table lookup processing. The complexity
                 measure used is the size of the associative memory,
                 that is, the number of matching words in memory. This
                 measure largely depends on the residue recurrencies, or
                 multiplicities, in the addition and multiplication
                 tables modulo M. The major effort in this work is to
                 evaluate the recurrencies in simultaneous multioperand
                 residue addition and multiplication. The evaluation is
                 simple in case of addition mode M, and also in
                 multiplication mod M if M is prime. To treat the more
                 difficult case of M nonprime, a recursive procedure was
                 developed for computing the 2-operand multiplication
                 recurrencies mod M. Computation results of 2-operand
                 residue arithmetic operations are provided.
                 Applications to RNS arithmetic implementation are
                 discussed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Case Western Reserve Univ, Cleveland, OH, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "addition; data processing; data storage, digital ---
                 Associative; multiplication; residue number system;
                 table lookup processing",
  subject =      "{\bf B.2.1}: Hardware, ARITHMETIC AND LOGIC
                 STRUCTURES, Design Styles, Parallel. {\bf B.3.2}:
                 Hardware, MEMORY STRUCTURES, Design Styles, Associative
                 memories. {\bf B.7.1}: Hardware, INTEGRATED CIRCUITS,
                 Types and Design Styles, VLSI (very large scale
                 integration). {\bf F.2.1}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Numerical Algorithms and Problems, Number-theoretic
                 computations. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Computations on
                 discrete structures. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics,
                 Counting problems.",
}

@Article{Pflug:1987:LPN,
  author =       "Georg Ch. Pflug and Hans W. Kessler",
  title =        "Linear Probing with a Nonuniform Address
                 Distribution",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "397--410",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42225.html",
  abstract =     "This paper presents a new approach to the analysis of
                 hashing with linear probing for nonuniformly
                 distributed hashed keys. The use of urn models is
                 avoided. Instead, some facts about empirical processes,
                 which are well known in statistics, are used. In
                 particular, an asymptotic formula for the expected
                 probe length for both a successful and an unsuccessful
                 search is obtained. The accuracy of the approximation
                 is confirmed by simulation.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Justus Liebig Univ, Giessen, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer simulation; data processing; File
                 Organization; hash-table representations; linear
                 probing; nonuniform address distribution; performance;
                 theory; verification",
  subject =      "{\bf E.2}: Data, DATA STORAGE REPRESENTATIONS,
                 Hash-table representations. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sorting and searching. {\bf H.2.2}: Information
                 Systems, DATABASE MANAGEMENT, Physical Design, Access
                 methods.",
}

@Article{Degano:1987:MDS,
  author =       "Pierpaolo Degano and Ugo Montanari",
  title =        "A Model for Distributed Systems Based on Graph
                 Rewriting",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "411--449",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/24038.html",
  abstract =     "In our model, a graph describes a net of processes
                 communicating through ports and, at the same time, its
                 computation history consisting of a partial ordering of
                 events. Stand-alone evolution of processes is specified
                 by context-free productions. From productions and a
                 basic synchronization mechanism, a set of
                 context-sensitive rewriting rules that models the
                 evolution of processes connected to the same ports can
                 be derived. A computation is a sequence of graphs
                 obtained by successive rewritings. The result of a
                 finite computation is its last graph, whereas the
                 result of an infinite computation is the limit,
                 infinite graph defined through a completion technique
                 based on metric spaces. A result characterizes a
                 concurrent computation, since it abstracts from any
                 particular interleaving of concurrent events, while in
                 the meantime providing information about termination,
                 partial or complete deadlocks, and fairness.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ di Pisa, Pisa, Italy",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital; concurrent computation;
                 context-sensitive rewriting rules; Distributed; graph
                 rewriting; languages; mathematical techniques --- Graph
                 Theory; theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation. {\bf D.3.1}:
                 Software, PROGRAMMING LANGUAGES, Formal Definitions and
                 Theory. {\bf F.3.1}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs. {\bf F.4.2}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Grammars and Other Rewriting Systems.",
}

@Article{Peleg:1987:CDL,
  author =       "David Peleg",
  title =        "Concurrent Dynamic Logic",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "450--479",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/23008.html",
  abstract =     "In this paper concurrent dynamic logic (CDL) is
                 introduced as an extension of dynamic logic tailored
                 toward handling concurrent programs. Properties of CDL
                 are discussed, both on the propositional and
                 first-order level, and the extension is shown to
                 possess most of the desirable properties of DL. Its
                 relationships with the $\mu$-calculus, game logic, DL
                 with recursive procedures, and PTIME are further
                 explored, revealing natural connections between
                 concurrency, recursion, and alternation.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Weizmann Inst of Science, Rehovot, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory --- Programming Theory; computer
                 programming; concurrent dynamic logic; concurrent
                 programs; languages; logics of programs; program
                 constructs; Theory; theory; verification",
  subject =      "{\bf F.3.1}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Logics of programs. {\bf
                 F.1.2}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs.
                 {\bf F.3.3}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Studies of Program Constructs, Control
                 primitives. {\bf F.3.3}: Theory of Computation, LOGICS
                 AND MEANINGS OF PROGRAMS, Studies of Program
                 Constructs, Program and recursion schemes.",
}

@Article{Homer:1987:MDP,
  author =       "Steven Homer",
  title =        "Minimal Degrees for Polynomial Reducibilities",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "480--491",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/23009.html",
  abstract =     "The existence of minimal degrees is investigated for
                 several polynomial reducibilities. It is shown that no
                 set has minimal degree with respect to polynomial
                 many-one or Turing reducibility. This extends a result
                 of R. E. Ladner in which only recursive sets are
                 considered. A polynomial reducibility is defined. This
                 reducibility is a strengthening of polynomial Turing
                 reducibility, and its properties relate to the P equals
                 ? NP question. For this new reducibility, a set of
                 minimal degree is constructed under the assumption that
                 P equals NP. However, the set constructed is
                 nonrecursive.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Boston Univ, Boston, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "complexity theory; computer metatheory; languages;
                 mathematical techniques --- Polynomials; minimal
                 degrees; polynomial reducibilities; recursion theory;
                 theory; verification",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Complexity
                 hierarchies. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Computability theory. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Reducibility and completeness.",
}

@Article{Venkataraman:1987:DPE,
  author =       "K. N. Venkataraman",
  title =        "Decidability of the Purely Existential Fragment of the
                 Theory of Term Algebras",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "2",
  pages =        "492--510",
  month =        apr,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/24037.html",
  abstract =     "This paper is concerned with the question of the
                 decidability and the complexity of the decision problem
                 for certain fragments of the theory of free term
                 algebras. The existential fragment of the theory of
                 term algebras is shown to be decidable through the
                 presentation of a nondeterministic algorithm, which,
                 given a quantifier-free formula P, constructs a
                 solution for P if it has one and indicates failure if
                 there are no solutions. It is shown that the decision
                 problem is in NP by proving that if a quantifier-free
                 formula P has a solution, then there is one that can be
                 represented as a directed acyclic graph in space at
                 most cubic in the length of P. The decision problem is
                 shown to be complete for NP by reducing 3-SAT to that
                 problem. Thus it is established that the existential
                 fragment of the theory of pure list structures in the
                 language of NIL, CONS, CAR, CDR, equals, less than
                 equivalent to (subexpression) is NP-complete. It is
                 further shown that even a slightly more expressive
                 fragment of the theory of term algebras, the one that
                 allows bounded universal quantifiers, is undecidable.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Tufts Univ, Medford, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; bounded universal quantifiers; computer
                 metatheory; computer programming languages;
                 decidability; Theory; theory; theory of term algebras;
                 verification",
  subject =      "{\bf F.2.0}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, General. {\bf
                 F.4.2}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Grammars and Other Rewriting Systems,
                 Decision problems. {\bf F.3.1}: Theory of Computation,
                 LOGICS AND MEANINGS OF PROGRAMS, Specifying and
                 Verifying and Reasoning about Programs, Mechanical
                 verification. {\bf F.1.3}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Classes,
                 Reducibility and completeness.",
}

@Article{Galil:1987:DVI,
  author =       "Zvi Galil and Christoph M. Hoffmann and Eugene M. Luks
                 and Claus P. Schnorr and Andreas Weber",
  title =        "An ${O}(n^3 \log n)$ Deterministic and an ${O}(n^3)$
                 {Las Vegas} Isomorphism Test for Trivalent Graphs",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "513--531",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28870.html",
  abstract =     "This paper describes an $O(n^3 \log n)$ deterministic
                 algorithm and an $O(n^3)$ Las Vegas algorithm for
                 testing whether two given trivalent graphs on $n$
                 vertices are isomorphic. In fact, the algorithms
                 construct the set of all isomorphisms between two such
                 graphs, presenting, in particular, generators for the
                 group of all automorphisms of a trivalent graph. The
                 algorithms are based upon the original polynomial-time
                 solution to these problems by E. M. Luks but they
                 introduce numerous speedups. These include improved
                 permutation-group algorithms that exploit the structure
                 of the underlying 2-groups. A remarkable property of
                 the Las Vegas algorithm is that it computes the set of
                 all isomorphisms between two trivalent graphs for the
                 cost of computing only those isomorphisms that map a
                 specified edge to a specified edge.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Columbia Univ, New York, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 deterministic algorithm; Graph Theory; Las Vegas
                 isomorphism test; mathematical techniques;
                 probabilistic algorithms; theory; trivalent graphs;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Combinatorial
                 algorithms. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Permutations and
                 combinations. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Graph algorithms.",
}

@Article{Irving:1987:EAO,
  author =       "Robert W. Irving and Paul Leather and Dan Gusfield",
  title =        "An Efficient Algorithm for the ``Optimal'' Stable
                 Marriage",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "532--543",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28871.html",
  abstract =     "In an instance of size $n$ of the stable marriage
                 problem each of $n$ men and $n$ women ranks the members
                 of the opposite sex in order of preference. A stable
                 matching is a complete matching of men and women such
                 that no man and woman who are not partners both prefer
                 each other to their actual partners under the matching.
                 The problem arises of finding a stable matching that is
                 optimal under an equitable or egalitarian criterion of
                 optimality. This problem was posed by D. E. Knuth and
                 has remained unsolved for some time. Here, the
                 objective of maximizing the average (or, equivalently,
                 the total) `satisfaction' of all people is used. This
                 objective is achieved when a person's satisfaction is
                 measured by the position of his\slash her partner in
                 his\slash her preference list. By exploiting the
                 structure of the set of all stable matchings, and using
                 graph-theoretic methods, an $O(n^4)$ algorithm for this
                 problem is derived.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Glasgow, Glasgow, Scotl",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; computer programming;
                 mathematical techniques --- Graph Theory; stable
                 marriage problem; stable matching; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Combinatorial
                 algorithms. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Graph algorithms.",
}

@Article{Beeri:1987:TIA,
  author =       "Catriel Beeri and Michael Kifer",
  title =        "A Theory of Intersection Anomalies in Relational
                 Database Schemes",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "544--577",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28872.html",
  abstract =     "For schemas described by multivalued dependencies,
                 acyclicity means that the dependencies do not split
                 each other's left-hand sides and do not form
                 intersection anomalies. In a recent work it is argued
                 that real-world database schemes always meet the former
                 requirement, and in another study it is shown that any
                 given real-world scheme can be made to satisfy also the
                 latter requirement, after being properly extended.
                 However, the method of elimination of intersection
                 anomalies proposed in the latter is intrinsically
                 non-deterministic --- an undesirable property for a
                 design tool. In the present work i is shown that this
                 nondeterminism does not, however, affect the final
                 result of the design process. In addition, we present
                 an efficient deterministic algorithm, which is
                 equivalent to the nondeterministic process. Along the
                 way a study of intersection anomalies is performed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Hebrew Univ of Jerusalem, Jerusalem, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Intersection anomalies due to multivalued
                 dependencies, that need to be removed from real-world
                 databases to make them acyclic. Transformation
                 algorithm.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "acyclic database schemes; computer programming ---
                 Algorithms; database systems; design; deterministic
                 algorithm; functional dependencies; intersection
                 anomalies; multivalued dependencies; Relational;
                 theory; verification",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Normal forms. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Schema
                 and subschema.",
}

@Article{Blumer:1987:CIF,
  author =       "A. Blumer and J. Blumer and D. Haussler and R.
                 McConnell and A. Ehrenfeucht",
  title =        "Complete Inverted Files for Efficient Text Retrieval
                 and Analysis",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "578--595",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28873.html",
  abstract =     "Given a finite set of texts $S$ equals $\{w_1,
                 \ldots{}, w_k\}$ over some fixed finite alphabet
                 $\Sigma$, a complete inverted file for $S$ is an
                 abstract data type that provides the functions {\tt
                 find}($w$), which returns the longest prefix of $w$
                 that occurs (as a subword of a word) in $S$; {\tt
                 freq}($w$), which returns the number of times $w$
                 occurs in $S$; and {\tt locations}($w$), which returns
                 the set of positions where $w$ occurs in $S$. A data
                 structure that implements a complete inverted file for
                 $S$ that occupies linear space and can be built in
                 linear time, using the uniform-cost RAM model, is
                 given. Using this data structure, the time for each of
                 the above query functions is optimal. To accomplish
                 this, techniques from the theory of finite automata and
                 the work on suffix trees are used to build a
                 deterministic finite automation that recognizes the set
                 of all subwords of the set $S$. This automation is then
                 annotated with additional information and compacted to
                 facilitate the desired query functions. The result is a
                 data structure that is smaller and more flexible than
                 the suffix tree.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Denver, Denver, CO, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Data structure is a compact directed acyclic word
                 graph. Searches for arbitrary strings are allowed.
                 Suggest searching DNA sequences. Linear times for
                 finding the longest prefix of a keyword.",
  classification = "721; 723; 903",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; automata theory --- Finite Automata;
                 complete inverted files; data processing; Data
                 Structures; information science --- Information
                 Retrieval; mathematical techniques --- Trees; suffix
                 trees; text retrieval and analysis; theory",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Graphs. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Pattern matching. {\bf H.3.1}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Content
                 Analysis and Indexing, Indexing methods.",
}

@Article{Fredman:1987:FHT,
  author =       "Michael L. Fredman and Robert Endre Tarjan",
  title =        "{Fibonacci} Heaps and Their Uses in Improved Network
                 Optimization Algorithms",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "596--615",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28874.html",
  abstract =     "In this paper we develop a new data structure for
                 implementing heaps (priority queues). Our structure,
                 Fibonacci heaps (abbreviated $F$-heaps), extends the
                 binomial queues proposed by J. Vuillemin. $F$-heaps
                 support arbitrary deletion from an $n$-item heap in
                 $O(\log n)$ amortized time and all other standard heap
                 operations in $O(1)$ amortized time. Using $F$-heaps we
                 are able to obtain improved running times for several
                 network optimization algorithms. In particular, we
                 obtain several worst-case bounds. Of the results, an
                 improved bound for minimum spanning trees is the most
                 striking, although all the results give asymptotic
                 improvements for graphs of appropriate densities.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California at San Diego, La Jolla, CA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; binomial queues; computer networks ---
                 Optimization; computer programming --- Algorithms; data
                 processing; Data Structures; Fibonacci heaps;
                 mathematical techniques --- Graph Theory; network
                 optimization algorithms; theory; worst-case bounds",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Graphs. {\bf E.1}:
                 Data, DATA STRUCTURES, Trees. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sorting and searching. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory.",
}

@Article{Hirschberg:1987:NAF,
  author =       "D. S. Hirschberg and L. L. Larmore",
  title =        "New Applications of Failure Functions",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "616--625",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 28 09:27:41 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28875.html",
  abstract =     "Presented are several algorithms whose operations are
                 governed by a principle of failure functions. When
                 searching for an extremal value within a sequence, it
                 suffices to consider only the subsequence of items each
                 of which is the first possible improvement of its
                 predecessor. These algorithms are more efficient than
                 their more traditional counterparts.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California at Irvine, Irvine, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "This paper discusses line-breaking and page-breaking
                 algorithms at length, proving the correctness of an
                 improvement on the Knuth/Plass line-breaking algorithm
                 used in the \TeX{} typesetting system.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms; data
                 processing; Data Structures; extremal value; failure
                 functions; mathematical programming, dynamic; search
                 methods; theory; verification",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Arrays. {\bf E.1}:
                 Data, DATA STRUCTURES, Lists. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures.",
}

@Article{Srikanth:1987:OCS,
  author =       "T. K. Srikanth and Sam Toueg",
  title =        "Optimal Clock Synchronization",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "626--645",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/dist-time.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28876.html",
  abstract =     "We present a simple, efficient, and unified solution
                 to the problems of synchronizing, initializing, and
                 integrating clocks for systems with different types of
                 failures: crash, omission, and arbitrary failures with
                 and without message authentication. This is the first
                 known solution that achieves optimal accuracy - the
                 accuracy of synchronized clocks (with respect to real
                 time) is as good as that specified for the underlying
                 hardware clocks. The solution is also optimal with
                 respect to the number of faulty processes that can be
                 tolerated to achieve this accuracy.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cornell Univ, Ithaca, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Byzantine failures; computer programming
                 --- Algorithms; computer systems, digital; Distributed;
                 message authentication; optimal clock synchronization;
                 reliability; synchronizing in presence of faults;
                 theory; verification",
  subject =      "{\bf D.4.5}: Software, OPERATING SYSTEMS, Reliability,
                 Fault-tolerance. {\bf D.4.7}: Software, OPERATING
                 SYSTEMS, Organization and Design, Distributed
                 systems.",
}

@Article{Cabay:1987:SLE,
  author =       "Stanley Cabay and Bart Domzy",
  title =        "Systems of Linear Equations with Dense Univariate
                 Polynomial Coefficients",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "646--660",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28877.html",
  abstract =     "An algorithm for computing the power series solution
                 of a system of linear equations with components that
                 are dense univariate polynomials over a field is
                 described and analyzed. A method for converting the
                 power series solution to rational form is derived.
                 Theoretical and experimental cost estimates are
                 obtained and used to identify classes of problems for
                 which the power series method outperforms modular
                 methods. Finally, it is shown that the power series
                 method also provides an effective mechanism for solving
                 the problem in which the coefficients of the
                 polynomials are from the ring of integers.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Alberta, Edmonton, Alberta, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms; dense
                 univariate polynomial coefficients; design;
                 experimentation; Linear Algebra; mathematical
                 techniques; systems of linear equations; verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations in finite fields. {\bf
                 F.2.1}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Numerical Algorithms and
                 Problems, Computations on matrices. {\bf F.2.1}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Numerical Algorithms and Problems,
                 Computations on polynomials. {\bf I.1.2}: Computing
                 Methodologies, ALGEBRAIC MANIPULATION, Algorithms,
                 Algebraic algorithms. {\bf I.1.2}: Computing
                 Methodologies, ALGEBRAIC MANIPULATION, Algorithms,
                 Analysis of algorithms. {\bf I.1.4}: Computing
                 Methodologies, ALGEBRAIC MANIPULATION, Applications.",
}

@Article{Nelson:1987:SCT,
  author =       "Randolph Nelson",
  title =        "Stochastic Catastrophe Theory in Computer Performance
                 Modeling",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "661--685",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1987.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28878.html",
  abstract =     "In this paper catastrophic behavior found in computer
                 systems is investigated. Deterministic Catastrophe
                 theory is introduced first. Then it is shown how the
                 theory can be applied in a stochastic framework, which
                 is useful for understanding computer system performance
                 models. Computer system models that exhibit stochastic
                 cusp catastrophe behavior are then analyzed. These
                 models include slotted ALOHA, multiprogramming in
                 computer systems, and buffer flow control in computer
                 networks.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IBM, Yorktown Heights, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  descriptors =  "Computer system; performance evaluation; model;
                 stochastic theory; slotted ALOHA; multiprogramming;
                 buffer; flow control",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "buffer flow control; computer networks ---
                 Performance; computer systems programming ---
                 Multiprogramming; computer systems, digital;
                 Performance; slotted aloha; stochastic catastrophe
                 theory; theory; verification",
  subject =      "{\bf B.3.3}: Hardware, MEMORY STRUCTURES, Performance
                 Analysis and Design Aids, Formal models. {\bf B.4.4}:
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Performance Analysis and Design Aids, Formal models.
                 {\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Modeling techniques. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance.",
}

@Article{Suri:1987:IPA,
  author =       "Rajan Suri",
  title =        "Infinitesimal Perturbation Analysis for General
                 Discrete Event Systems",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "686--717",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/Discrete.event.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28879.html",
  abstract =     "A rigorous extension of the recent perturbation
                 analysis approach to more general discrete event
                 systems is given. First, a general class of systems and
                 performance measures is defined, and some basic
                 representational and linearity properties are derived.
                 Next a sample gradient of performance with respect to a
                 parameter of the system is defined. Then, for certain
                 parameters of such systems, an infinitesimal
                 perturbation analysis algorithm is derived. It is
                 proved that this algorithm gives exact values for the
                 sample gradients of performance with respect to the
                 parameters, by observing only one sample path of the
                 DEDS. The computational complexity of this algorithm is
                 bound to be linear in the number of events. These
                 results offer the potential for very efficient
                 calculation of the gradients, a fact that can be used
                 for design/ operation of computer systems,
                 communication networks, manufacturing systems, and many
                 other real-world systems.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Wisconsin, Madison, WI, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "716; 717; 718; 723; 912; 921",
  descriptors =  "Performance evaluation; simulation; stochastic
                 analysis; operational analysis",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Analysis; computer networks --- Design; computer
                 programming --- Algorithms; computer systems, digital
                 --- Design; discrete event dynamic systems;
                 experimentation; general discrete event systems;
                 infinitesimal perturbation analysis; mathematical
                 techniques --- Perturbation Techniques; measurement;
                 performance; Performance and Parameters; Perturbation;
                 systems science and cybernetics; telecommunication
                 systems --- Design; theory; verification",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Modeling and prediction. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Operational analysis.
                 {\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Simulation. {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance, Stochastic analysis.",
}

@Article{Book:1987:EDG,
  author =       "Ronald V. Book and Ding-Zhu Du",
  title =        "The Existence and Density of Generalized Complexity
                 Cores",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "718--730",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28880.html",
  abstract =     "The concept of complexity cores is extended to the
                 notion of a proper hard core, and an existence theorem
                 for these cores is proved. In addition, the density of
                 such generalized complexity cores is studied.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of California, Santa Barbara, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer metatheory; generalized complexity cores;
                 mathematical techniques --- Set Theory; proper hard
                 cores; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes,
                 Machine-independent complexity.",
}

@Article{Oyamaguchi:1987:EPR,
  author =       "Michio Oyamaguchi",
  title =        "The Equivalence Problem for Real-Time {DPDA}s",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "3",
  pages =        "731--760",
  month =        jul,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/28881.html",
  abstract =     "The equivalence problem for deterministic real-time
                 pushdown automata is shown to be decidable. This result
                 is obtained by showing that L. G. Valiant's parallel
                 stacking technique using a replacement function
                 introduced in this paper succeeds for deterministic
                 real-time pushdown automata. Equivalence is also
                 decidable for two deterministic pushdown automata, one
                 of which is real-time.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Mie Univ, Tsu, Jpn",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "automata theory; deterministic pushdown automata;
                 equivalence problem; parallel stacking; real-time
                 DPDAS; theory; verification",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 F.4.3}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Formal Languages, Decision
                 problems.",
}

@Article{Inselberg:1987:CAP,
  author =       "Alfred Inselberg and Tuval Chomut and Mordechai Reif",
  title =        "Convexity Algorithms in Parallel Coordinates",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "765--801",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/32221.html",
  abstract =     "With a system of parallel coordinates, objects in
                 $R^N$ can be represented with planar `graphs' (ie.,
                 planar diagrams) for arbitrary $N$. In $R^2$, embedded
                 in the projective plane, parallel coordinates induce a
                 point-line duality. This yields a new duality between
                 bounded and unbounded convex sets and hstars (a
                 generalization of hyperbolas), as well as a duality
                 between convex union (convex merge) and intersection.
                 From these results, algorithms are derived for
                 constructing the intersection and convex merge of
                 convex polygons in $O(n)$ time and the convex hull on
                 the plane in $O(\log n)$ for real-time and $O(n \log
                 n)$ worst-case construction, where $n$ is the total
                 number of points. By virtue of the duality, these
                 algorithms also apply to polygons whose edges are a
                 certain class of convex curves.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IBM Scientific Cent, Los Angeles, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computational geometry; computer
                 programming --- Algorithms; convexity algorithms;
                 duality; Graph Theory; image part form; mathematical
                 techniques; parallel coordinates; theory;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations.",
}

@Article{Mitra:1987:RPC,
  author =       "Debasis Mitra and Randall A. Cieslak",
  title =        "Randomized Parallel Communications on an Extension of
                 the {Omega} Network",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "802--824",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "This is an extension of Valiant and Aleliunas'
                 algorithm to eliminate the need for scheduling. This
                 algorithm also works on networks of fixed degree
                 nodes.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42226.html",
  abstract =     "This paper identifies adverse source-destination
                 traffic patterns and proposes a scheme for obtaining
                 relief by means of randomized routing of packets on
                 simple extensions of the well-known $\omega$ networks.
                 L. G. Valiant and R. Aleliunas have demonstrated
                 randomized algorithms, for a certain context which we
                 call nonrenewal, that complete the communication task
                 in time $O(\log N)$ with overwhelming probability,
                 where $N$ is the number of sources and destinations.
                 Our scheme has advantages because it uses switches of
                 fixed degree, requires no scheduling, and, for the
                 nonrenewal context, is as good in proven performance.
                 In the renewal context we explicitly identify the
                 maximum traffic intensities in the internal links of
                 the extended $\omega$ networks over all
                 source-destination traffic specifications that satisfy
                 loose bounds. Second, the benefits of randomization on
                 the stability of the network are identified. Third,
                 exact results, for certain restricted models for
                 sources and transmission, and approximate analytic
                 results, for quite general models, are derived for the
                 mean delays. These results show that, in the stable
                 regime, the maximum mean time from source to
                 destination is asymptotically proportional to $\log
                 N$.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "\omega network; algorithms; computer networks;
                 computer programming --- Algorithms; computer systems,
                 digital; design; Distributed; performance;
                 probabilistic algorithms; randomized parallel
                 communications; theory; verification",
  subject =      "{\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Interconnection architectures. {\bf
                 C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf D.4.8}:
                 Software, OPERATING SYSTEMS, Performance, Queueing
                 theory. {\bf G.3}: Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Probabilistic algorithms
                 (including Monte Carlo).",
}

@Article{Vitter:1987:DAD,
  author =       "Jeffrey Scott Vitter",
  title =        "Design and Analysis of Dynamic {Huffman} Codes",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "825--845",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42227.html",
  abstract =     "A new one-pass algorithm for constructing dynamic
                 Huffman codes is introduced and analyzed. We also
                 analyze the one-pass algorithm due to N. Faller, R. G.
                 Gallager, and D. E. Knuth. In each algorithm, both the
                 sender and the receiver maintain equivalent dynamically
                 varying Huffman trees, and the coding is done in real
                 time. We show that the number of bits used by the new
                 algorithm to encode a message containing t letters is
                 less than t bits more than that used by the
                 conventional two-pass Huffman scheme, independent of
                 the alphabet size. This is best possible in the worst
                 case, for any one-pass Huffman method. Tight upper and
                 lower bounds are derived. Empirical tests show that the
                 encodings produced by the new algorithm are shorter
                 than those of the other one-pass algorithm and, except
                 for long messages, are shorter than those of the
                 two-pass method. The new algorithm is well suited for
                 online encoding\slash decoding in data networks and for
                 file compression.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Brown Univ, Providence, RI, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; codes, symbolic; computer networks;
                 computer programming --- Algorithms; Design; design;
                 dynamic Huffman codes; file compression; one-pass
                 algorithm; performance; theory",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems. {\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf
                 G.2.2}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Trees. {\bf C.2.0}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, General,
                 Data communications.",
}

@Article{Willard:1987:MST,
  author =       "Dan E. Willard",
  title =        "Multidimensional Search Trees That Provide New Types
                 of Memory Reductions",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "846--858",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42228.html",
  abstract =     "An orthogonal query that asks to aggregate the set of
                 records in $k$-dimensional box regions is studied, and
                 it is shown that space $O(N((\log N)/(\log \log N))^{k
                 - 1})$ makes possible a combined time complexity
                 $O(\log^k N)$ for retrievals, insertions, and
                 deletions.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "State Univ of New York at Albany, Albany, NY,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; data processing --- Data Structures;
                 database systems; design; image part pattern;
                 insertions; memory reductions; multidimensional search
                 trees; orthogonal query; performance; retrievals;
                 Theory; theory; verification",
  subject =      "{\bf B.3.3}: Hardware, MEMORY STRUCTURES, Performance
                 Analysis and Design Aids. {\bf I.1.2}: Computing
                 Methodologies, ALGEBRAIC MANIPULATION, Algorithms. {\bf
                 E.1}: Data, DATA STRUCTURES. {\bf I.3.5}: Computing
                 Methodologies, COMPUTER GRAPHICS, Computational
                 Geometry and Object Modeling. {\bf E.2}: Data, DATA
                 STORAGE REPRESENTATIONS.",
}

@Article{Bloch:1987:WVA,
  author =       "Joshua J. Bloch and Dean S. Daniels and Alfred Z.
                 Spector",
  title =        "A Weighted Voting Algorithm for Replicated
                 Directories",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "859--909",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/31847.html",
  abstract =     "Weighted voting is used as the basis for a replication
                 technique for directories. This technique affords
                 arbitrarily high data availability as well as high
                 concurrency. Efficient algorithms are presented for all
                 of the standard directory operations. A structural
                 property of the replicated directory that permits the
                 construction of an efficient algorithm for deletion is
                 proven. Simulation results are presented and the system
                 is modeled and analyzed. The analysis agrees well with
                 the simulation, and the space and time performance are
                 shown to be good for all configurations of the
                 system.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Carnegie Mellon Univ, Pittsburgh, PA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 computer simulation; computer systems, digital;
                 database systems --- Distributed; deletion;
                 Distributed; distributed algorithms; performance;
                 reliability; replicated directories; theory; weighted
                 voting algorithm",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed applications. {\bf D.4.5}: Software,
                 OPERATING SYSTEMS, Reliability, Fault-tolerance. {\bf
                 E.1}: Data, DATA STRUCTURES, Tables. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Distributed systems. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Transaction
                 processing. {\bf I.6.3}: Computing Methodologies,
                 SIMULATION AND MODELING, Applications.",
}

@Article{Bracha:1987:ERR,
  author =       "Gabriel Bracha",
  title =        "An ${O}(\log n)$ Expected Rounds Randomized
                 {Byzantine} Generals Protocol",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "910--920",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42229.html",
  abstract =     "Byzantine Generals protocols enable processes to
                 broadcast messages reliably in the presence of faulty
                 processes. These protocols are run in a system that
                 consists of $n$ processes, $t$ of which are faulty. The
                 protocols are conducted in synchronous rounds of
                 message exchange. It is shown that, in the absence of
                 eavesdropping, without using cryptography, for any
                 $\epsilon > 0$ and $t = n/(3 + \epsilon)$, there is a
                 randomized protocol with $O(\log n)$ expected number of
                 rounds. If cryptographic methods are allowed, then, for
                 $\epsilon > 0$ and $t = n / (2 + \epsilon)$, there is a
                 randomized protocol with $O(\log n)$ expected number of
                 rounds. This is an improvement on the lower bound of $t
                 + 1$ rounds required for deterministic protocols, and
                 on a previous result of $t / \log n$ expected number of
                 rounds for randomized noncryptographic protocols.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cornell Univ, Ithaca, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer networks --- Protocols; computer
                 programming --- Algorithms; computer systems, digital;
                 consensus protocols; cryptography; Distributed;
                 distributed algorithms; parallel algorithms; randomized
                 Byzantine generals protocol; reliability; theory;
                 verification",
  subject =      "{\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.1.0}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, General, Parallel
                 algorithms. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Permutations and
                 combinations.",
}

@Article{Tiwari:1987:LBC,
  author =       "Prasoon Tiwari",
  title =        "Lower Bounds on Communication Complexity in
                 Distributed Computer Networks",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "921--938",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "{\bf Reviews: \em Computing Reviews}, Vol. 29, No. 9,
                 September 1988.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/32978.html",
  abstract =     "The main result of this paper is a general technique
                 for determining lower bounds on the communication
                 complexity of problems on various distributed computer
                 networks. This general technique is derived by
                 simulating the general network by a linear array and
                 then using a lower bound on the communication
                 complexity of the problem on the linear array.
                 Applications of this technique yield optimal bounds on
                 the communication complexity of merging, ranking,
                 uniqueness, and triangle-detection problems on a ring
                 of processors. Nontrivial near-optimal lower bounds on
                 the communication complexity of distinctness, merging,
                 and ranking on meshes and complete binary trees are
                 also derived.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Illinois at Urbana-Champaign, Urbana,
                 IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; communication complexity; computer
                 networks; computer systems, digital --- Distributed;
                 interprocessor communication; lower bounds;
                 performance; theory",
  subject =      "{\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf F.2.0}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, General. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes.",
}

@Article{Tezuka:1987:DGP,
  author =       "Shu Tezuka",
  title =        "On the Discrepancy of {GFSR} Pseudorandom Numbers",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "939--949",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/31846.31848",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/31848.html",
  abstract =     "A new summation formula based on the orthogonal
                 property of Walsh functions is devised. Using this
                 formula, the $k$-dimensional discrepancy of the
                 generalized feedback shift register (GFSR) pseudorandom
                 numbers is derived. The relation between the
                 discrepancy and $k$-distribution of GFSR sequences is
                 also obtained. Finally the definition of optimal GFSR
                 pseudorandom number generators is introduced.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IBM Tokyo Research Lab, Tokyo, Jpn",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 generalized feedback shift register; GFSR algorithm;
                 mathematical statistics; pseudorandom numbers; Random
                 Number Generation; theory; verification; Walsh
                 functions",
  subject =      "{\bf G.2.1}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Combinatorics. {\bf G.3}: Mathematics of
                 Computing, PROBABILITY AND STATISTICS, Random number
                 generation.",
}

@Article{Johnson:1987:PAM,
  author =       "Donald B. Johnson",
  title =        "Parallel Algorithms for Minimum Cuts and Maximum Flows
                 in Planar Networks",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "950--967",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Preliminary version in Proc. 23rd Annual IEEE
                 Symposium on the Foundations of Computer Science, pages
                 244--254, 1982",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/31849.html",
  abstract =     "Algorithms are given that compute maximum flows in
                 planar directed networks either in $O((\log n)^3)$
                 parallel time using $O(n^4)$ processors or $O((\log
                 n)^2)$ parallel time using $O(n^6)$ processors. The
                 resource consumption of these algorithms is dominated
                 by the cost of finding the value of a maximum flow.
                 When such a value is given, or when the computation is
                 on an undirected network, the bound is $O((\log n)^2)$
                 time using $O(n^3)$ processors. No efficient parallel
                 algorithm is known for the maximum flow problem in
                 general networks.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Dartmouth Coll, Hanover, NH, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; computer programming; computer
                 systems, digital --- Parallel Processing; mathematical
                 techniques --- Graph Theory; maximum flows; minimum
                 cuts; parallel algorithms; planar directed networks;
                 theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Network problems.",
}

@Article{Kaminski:1987:LTA,
  author =       "Michael Kaminski",
  title =        "A Linear Time Algorithm for Residue Computation and a
                 Fast Algorithm for Division with a Sparse Divisor",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "968--984",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/31850.html",
  abstract =     "An algorithm is presented to compute the residue of a
                 polynomial over a finite field of degree $n$ modulo a
                 polynomial of degree $O(\log n)$ in $O(n)$ algebraic
                 operations. This algorithm can be implemented on a
                 Turing machine. The implementation is based on Turing
                 machine procedure that divides a polynomial of degree
                 $n$ by a sparse polynomial with $k$ nonzero
                 coefficients in $O(k n)$ steps. This algorithm can be
                 adapted to compute the residue of a number of length
                 $n$ modulo a number of length $O(\log n)$ in $O(n)$ bit
                 operations.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technion-Israel Inst of Technology, Haifa, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 mathematical techniques; polynomial division;
                 polynomial multiplication; Polynomials; residue
                 computation; sparse polynomials; theory; verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations on polynomials. {\bf F.2.1}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Numerical Algorithms and Problems,
                 Computations in finite fields. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Sorting and
                 searching.",
}

@Article{McKenna:1987:AES,
  author =       "James McKenna",
  title =        "Asymptotic Expansions of the Sojourn Time Distribution
                 Functions of Jobs in Closed, Product-Form Queuing
                 Networks",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "985--1003",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/31851.html",
  abstract =     "Asymptotic techniques for the calculation of the
                 partition function of large, product-form closed
                 queueing networks are applied to the sojourn time
                 problem. Asymptotic expansions are obtained for the
                 sojourn-time distribution function (STDF) of a job at
                 $c$-server, first-come first-served (FCFS) center in
                 closed, product-form queueing networks. Similar
                 expansions are obtained for the joint DF of the sojourn
                 times of a job at a sequence of single server, FCFS
                 centers lying on an `overtake-free' path. In addition,
                 integral expressions are obtained for the STDF of a job
                 at a single server, FCFS center in a closed,
                 product-form queueing network in which all the centers
                 are load independent. These integral expressions also
                 yield useful asymptotic expansions. Finally, integral
                 expressions are also obtained for the joint DF of the
                 sojourn times of a job at the centers of an
                 `overtake-free' path in such a network.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 922",
  descriptors =  "Queueing network; product form; analysis",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; closed product-form queueing networks;
                 computer systems, digital; first-come first-served;
                 Mathematical Models; performance; probability ---
                 Queueing Theory; sojourn time distribution functions;
                 theory; verification",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Stochastic analysis. {\bf G.m}:
                 Mathematics of Computing, MISCELLANEOUS, Queueing
                 theory.",
}

@Article{Ajtai:1987:MVP,
  author =       "Miklos Ajtai and Yuri Gurevich",
  title =        "Monotone versus Positive",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "1004--1015",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/31852.html",
  abstract =     "In connection with the least fixed point operator the
                 following question was raised: Suppose that a
                 first-order formula phi (P) is (semantically) monotone
                 in a predicate symbol P on finite structures. Is phi
                 (P) necessarily equivalent on finite structures to a
                 first-order formula with only positive occurrences of
                 P? In this paper, this question is answered negatively.
                 Moreover, the counterexample naturally gives a uniform
                 sequence of constant-depth, polynomial-size, monotone
                 Boolean circuits that is not equivalent to any (however
                 nonuniform) sequence of constant-depth,
                 polynomial-size, positive Boolean circuits.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IBM Research, San Jose, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer metatheory; languages; least
                 fixed point operator; mathematical techniques ---
                 Operators; monotone first-order formula; theory;
                 verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic. {\bf F.1.1}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Models of Computation. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics. {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS.",
}

@Article{Sagiv:1987:CEB,
  author =       "Y. Sagiv and C. Delobel and D. S. {Parker, Jr.} and
                 Ronald Fagin",
  title =        "Correction to ``An Equivalence between Relational
                 Database Dependencies and a Fragment of Propositional
                 Logic''",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "1016--1018",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Sagiv:1981:EBR}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/31853.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic.",
}

@Article{Walther:1988:MSU,
  author =       "Christoph Walther",
  title =        "Many-Sorted Unification",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "1",
  pages =        "1--17",
  month =        jan,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/hybrid.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/45071.html",
  abstract =     "Many-sorted unification is considered; that is,
                 unification in the many-sorted free algebras of terms,
                 where variables, as well as the domains and ranges of
                 functions, are restricted to certain subsets of the
                 universe, given as a potentially infinite hierarchy of
                 sorts. It is shown that complete and minimal sets of
                 unifiers may not always exist for many-sorted
                 unification. Conditions for sort hierarchies that are
                 equivalent for the existence of these sets with one,
                 finitely many, or infinitely many elements are
                 presented. It is also proved that being a
                 forest-structured sort hierarchy is a necessary and
                 sufficient criterion for the Robinson Unification
                 Theorem to hold for many-sorted unification. An
                 algorithm for many-sorted unification is given.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ Karlsruhe, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; artificial intelligence; computer
                 metatheory --- Formal Logic; computer programming ---
                 Algorithms; many-sorted logic; many-sorted unification;
                 mathematical techniques --- Algebra; Robinson
                 unification theorem; theory; verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Pattern matching.
                 {\bf I.1.3}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Languages and Systems, Substitution
                 mechanisms. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Resolution.",
}

@Article{Megiddo:1988:CSG,
  author =       "N. Megiddo and S. L. Hakimi and M. R. Garey and D. S.
                 Johnson and C. H. Papadimitriou",
  title =        "The Complexity of Searching a Graph",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "1",
  pages =        "18--44",
  month =        jan,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42268.html",
  abstract =     "T. Parsons originally proposed and studied the
                 following pursuit-evasion problem on graphs: Members of
                 a team of searchers traverse the edges of a graph $G$
                 in pursuit of a fugitive, who moves along the edges of
                 the graph with complete knowledge of the locations of
                 the pursuers. What is the smallest number $s(G)$ of
                 searchers that will suffice for guaranteeing capture of
                 the fugitive? It is shown that determining whether
                 $s(G) \leq K$, for a given integer $K$, is NP-complete
                 for general graphs but can be solved in linear time for
                 trees. We also provide a structural characterization of
                 those graphs $G$ with s(G) less than equivalent to $K$
                 for $K = 1, 2, 3$.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Tel-Aviv Univ, Tel-Aviv, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; complexity; computer programming ---
                 Algorithms; Graph Theory; mathematical techniques;
                 np-completeness; pursuit-evasion problem on graphs;
                 search methods; theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory.",
}

@Article{Lee:1988:ODU,
  author =       "Yann-Hang Lee and Kang G. Shin",
  title =        "Optimal Design and Use of Retry in Fault-Tolerant
                 Computer Systems",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "1",
  pages =        "45--69",
  month =        jan,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42269.html",
  abstract =     "A new method is presented for (i) determining an
                 optimal retry policy and (ii) using retry for fault
                 characterization, which is defined as classification of
                 the fault type and determination of fault durations.
                 First, an optimal retry policy is derived for a given
                 fault characteristic, which determines the maximum
                 allowable retry durations so as to minimize the total
                 task completion time. Then, the combined fault
                 characterization and retry decision, in which the
                 characteristic of a fault is estimated simultaneously
                 with the determination of the optimal retry policy, are
                 carried out. Two solution approaches are developed: one
                 is based on point estimation and the other on Bayes
                 sequential decision analysis. Numerical examples are
                 presented.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Michigan, Ann Arbor, MI, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Bayes decision problem; computer systems, digital;
                 decision theory and analysis; design; fault
                 characterization; Fault Tolerant Capability; optimal
                 retry policy; Optimale Reconfiguration; performance;
                 reliability; task completion time; verification",
  subject =      "{\bf B.2.3}: Hardware, ARITHMETIC AND LOGIC
                 STRUCTURES, Reliability, Testing, and Fault-Tolerance.
                 {\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Statistical computing.",
}

@Article{Abiteboul:1988:EOR,
  author =       "Serge Abiteboul and Victor Vianu",
  title =        "Equivalence and Optimization of Relational
                 Transactions",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "1",
  pages =        "70--120",
  month =        jan,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42271.html",
  abstract =     "A large class of relational database update
                 transaction is investigated with respect to equivalence
                 and optimization. The transactions are straight-line
                 programs with inserts, deletes, and modifications using
                 simple selection conditions. Several basic results are
                 obtained. It is shown that transaction equivalence can
                 be decided in polynomial time. A number of optimality
                 criteria for transactions are then proposed, as well as
                 two normal forms. Polynomial-time algorithms for
                 transaction optimization and normalization are
                 exhibited. Also, an intuitively appealing system of
                 axioms for proving transaction equivalence is
                 introduced. Finally, a simple, natural subclass of
                 transactions, called strongly acyclic, is shown to have
                 particularly desirable properties.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Inst Natl de Recherche en Informatique et en
                 Automatique, Le Chesnay, Fr",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Equivalence can be decided in polynomial time.
                 Algorithms for transactions and normalization. A
                 strongly acyclic TX have particularly desirable
                 properties.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer programming --- Algorithms; database systems;
                 design; equivalence; languages; optimization;
                 Relational; straight-line programs; transaction
                 equivalence; update transactions",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.2.3}: Information
                 Systems, DATABASE MANAGEMENT, Languages, Data
                 manipulation languages (DML). {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Transaction
                 processing.",
}

@Article{Hadzilacos:1988:TRD,
  author =       "Vassos Hadzilacos",
  title =        "A Theory of Reliability in Database Systems",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "1",
  pages =        "121--145",
  month =        jan,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42272.html",
  abstract =     "Reliable concurrent processing of transactions in a
                 database systems is examined. Since serializability,
                 the conventional concurrency control correctness
                 criterion, is not adequate in the presence of common
                 failures, another theory of correctness is proposed,
                 involving the concepts of commit serializability,
                 recoverability, and resiliency.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Toronto, Toronto, Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Concepts of commit serializability, recoverability,
                 and resiliency. Principles of reliable transaction.
                 Specification. Based on PhD Th., `Issues of Fault
                 Tolerance in Concurrent Computations' Harvard,
                 Jun.1984.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; and resiliency; commit serializability;
                 concurrency control; correctness criterion; database
                 systems; recoverability; Reliability; reliability;
                 theory",
  subject =      "{\bf D.4.5}: Software, OPERATING SYSTEMS, Reliability,
                 Fault-tolerance. {\bf H.2.4}: Information Systems,
                 DATABASE MANAGEMENT, Systems, Transaction processing.
                 {\bf H.2.7}: Information Systems, DATABASE MANAGEMENT,
                 Database Administration, Logging and recovery.",
}

@Article{Klug:1988:CQC,
  author =       "Anthony Klug",
  title =        "On Conjunctive Queries Containing Inequalities",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "1",
  pages =        "146--160",
  month =        jan,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42273.html",
  abstract =     "Conjunctive queries are generalized so that inequality
                 comparisons can be made between elements of the query.
                 Algorithms for containment and equivalence of such
                 `inequality queries' are given, under the assumption
                 that the data domains are dense and totally ordered. In
                 general, containment does not imply the existence of
                 homomorphisms (containment mappings), but the
                 homomorphism property does exist for subclasses of
                 inequality queries. A minimization algorithm is defined
                 using the equivalence algorithm. It is first shown that
                 the constants appearing in a query can be divided into
                 `essential' and `nonessential' subgroups. The minimum
                 query can be nondeterministically guessed using only
                 the essential constants of the original query.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Wisconsin, Madison, WI, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Constants in a query can be divided into essential and
                 nonessential.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 conjunctive queries; database systems; equivalence
                 algorithm; inequality comparisons; languages;
                 minimization algorithm; Relational; theory",
  subject =      "{\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Query languages. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Data
                 models.",
}

@Article{Gonnet:1988:EHL,
  author =       "Gaston H. Gonnet and Per-{\AA}ke Larson",
  title =        "External Hashing with Limited Internal Storage",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "1",
  pages =        "161--184",
  month =        jan,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42274.html",
  abstract =     "The following problem is studied: How, and to what
                 extent, can the retrieval speed of external hashing be
                 improved by storing a small amount of extra information
                 in internal storage? Several algorithms that guarantee
                 retrieval in one access are developed and analyzed. In
                 the first part of the paper, a restricted class of
                 algorithms is studied, and a lower bound on the amount
                 of extra storage is derived. An algorithm that achieves
                 this bound, up to a constant difference, is also given.
                 In the second part of the paper a number of
                 restrictions are relaxed and several more practical
                 algorithms are developed and analyzed. The last one, in
                 particular, is very simple and efficient.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Waterloo, Waterloo, Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "External hashing with signatures.
                 Information-theoretic lower bound on the number of bits
                 per bucket.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms; data
                 processing; external hashing; File Organization;
                 limited internal storage; performance; retrieval speed;
                 theory",
  review =       "ACM CR 8902--0062",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Extensible languages. {\bf H.2.2}:
                 Information Systems, DATABASE MANAGEMENT, Physical
                 Design, Access methods.",
}

@Article{Hickey:1988:APA,
  author =       "Timothy Hickey and Jacques Cohen",
  title =        "Automating Program Analysis",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "1",
  pages =        "185--220",
  month =        jan,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:57:39 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Pfpbib.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42275.html",
  abstract =     "The first part of the paper shows that previous
                 theoretical work on the semantics of probabilistic
                 programs (Kozen) and on the correctness of performance
                 annotated programs (Ramshaw) can be used to automate
                 the average-case analysis of simple programs containing
                 assignments, conditionals, and loops. A performance
                 compiler has been developed using this theoretical
                 foundations. The compiler is described, and it is shown
                 that special cases of symbolic simplifications of
                 formulas play a major role in rendering the system
                 usable. The performance compiler generates a system of
                 recurrence equations derived from a given program whose
                 efficiency one wishes to analyze. This generation is
                 always possible, but the problem of solving the
                 resulting equations may be complex. The second part of
                 the paper presents an original method that generalizes
                 our previous approach and is applicable to functional
                 programs that make use of recursion and complex data
                 structures. Several examples are presented including an
                 analysis of binary tree sort. A key feature of the
                 analysis of such programs is that distributions on
                 complex data structures are represented using
                 attributed probabilistic grammars.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Brandeis Univ, Waltham, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Analysis; automated program analysis;
                 computer metatheory --- Programming Theory; computer
                 programming; computer-aided program analysis;
                 functional; Granularity Analysis; measurement;
                 performance; performance compiler; probabilistic
                 programs; theory",
  subject =      "{\bf D.2.8}: Software, SOFTWARE ENGINEERING, Metrics,
                 Complexity measures. {\bf D.3.4}: Software, PROGRAMMING
                 LANGUAGES, Processors, Compilers. {\bf D.3.4}:
                 Software, PROGRAMMING LANGUAGES, Processors,
                 Interpreters. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Computations on
                 discrete structures.",
}

@Article{Tripathi:1988:VAT,
  author =       "Satish K. Tripathi and C. Murray Woodside",
  title =        "A Vertex-Allocation Theorem for Resources in Queuing
                 Networks",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "1",
  pages =        "221--230",
  month =        jan,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/45068.html",
  abstract =     "A product-form queuing network with multiple open and
                 closed chains is considered. Some of the closed chains,
                 which have a single customer each, require allocation
                 of resources in the network so as to maximize a
                 weighted throughput performance criterion. Chains with
                 more than one customer can be decomposed into many
                 chains of one customer each. It is proved that an
                 optimal allocation of resources lies on a vertex
                 (extreme points) of the set of feasible allocations.
                 This considerably reduces the search space for an
                 optimal allocation. Applications of this result in
                 distributed computing are discussed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Maryland, College Park, MD, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  descriptors =  "Performance evaluation; Queueing network;
                 optimization",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems, digital --- Distributed;
                 performance; probability; product-form queuing network;
                 Queueing Theory; resource allocation; theory;
                 verification; vertex-allocation theorem",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.4}:
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS,
                 Modeling techniques. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Operational analysis. {\bf
                 G.1.6}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization.",
}

@Article{Kaltofen:1988:GCD,
  author =       "Erich Kaltofen",
  title =        "Greatest Common Divisors of Polynomials Given by
                 Straight-Line Programs",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "1",
  pages =        "231--264",
  month =        jan,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/auto.diff.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/45069.html",
  abstract =     "Algorithms on multivariate polynomials represented by
                 straight-line programs are developed. First, it is
                 shown that most algebraic algorithms can be
                 probabilistically applied to data that are given by a
                 straight-line computation. Testing such rational
                 numeric data for zero, for instance, is facilitated by
                 random evaluations modulo random prime numbers. Then,
                 auxiliary algorithms that determine the coefficients of
                 a multivariate polynomial in a single variable are
                 constructed. The first main result is an algorithm that
                 produces the greatest common divisor of the input
                 polynomials, all in straight-line representation. The
                 second result shows how to find a straight-line program
                 for the reduced numerator and denominator from one for
                 the corresponding rational function. Both the algorithm
                 for that construction and the greatest common divisor
                 algorithm are in random polynomial time for the usual
                 coefficient fields and output a straight-line program,
                 which with controllably high probability correctly
                 determines the requested answer.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Rensselaer Polytechnic Inst, Troy, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algebraic algorithms; Algorithms; algorithms; computer
                 programming; design; greatest common divisors of
                 polynomials; mathematical techniques --- Polynomials;
                 multivariate polynomials; straight-line programs;
                 theory; verification",
  subject =      "{\bf I.1.1}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Expressions and Their Representation,
                 Representations (general and polynomial). {\bf I.1.2}:
                 Computing Methodologies, ALGEBRAIC MANIPULATION,
                 Algorithms, Algebraic algorithms. {\bf F.1.1}: Theory
                 of Computation, COMPUTATION BY ABSTRACT DEVICES, Models
                 of Computation, Unbounded-action devices.",
}

@Article{Baltsan:1988:SPB,
  author =       "Avikam Baltsan and Micha Sharir",
  title =        "On the shortest paths between two convex polyhedra",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "2",
  pages =        "267--287",
  month =        apr,
  year =         "1988",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/42282.214094",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214094.html",
  abstract =     "The problem of computing the Euclidean shortest path
                 between two points in three-dimensional space bounded
                 by a collection of convex and disjoint polyhedral
                 obstacles having $n$ faces altogether is considered.
                 This problem is known to be NP-hard and in exponential
                 time for arbitrarily many obstacles; it can be solved
                 in $O(n^2 \log n)$ time for a single convex polyhedral
                 obstacle and in polynomial time for any fixed number of
                 convex obstacles. In this paper Mount's technique is
                 extended to the case of two convex polyhedral obstacles
                 and an algorithm that solves this problem in time
                 $O(n^3 \cdot 2^{O(\alpha(n^4))} \log n)$ (where
                 $\alpha(n)$ is the functional inverse of Ackermann's
                 function, and is thus extremely slowly growing) is
                 presented, thus improving significantly Sharir's
                 previous results for this special case. This result is
                 achieved by constructing a new kind of Voronoi diagram,
                 called peeper's Voronoi diagram, which is introduced
                 and analyzed in this paper, and which may be of
                 interest in its own right.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Tel-Aviv Univ, Tel-Aviv, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 722; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; analysis of algorithms;
                 complexity of algorithms; computer programming;
                 computers, digital --- Computational Methods; convex;
                 Davenport--Schinzel sequences; Euclidean shortest
                 paths; image part pattern; mathematical techniques ---
                 Algorithms; polyhedra; shortest paths; theory;
                 three-dimensional; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Geometrical
                 problems and computations. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics,
                 Combinatorial algorithms.",
}

@Article{Dwork:1988:CPP,
  author =       "Cynthia Dwork and Nancy Lynch and Larry Stockmeyer",
  title =        "Consensus in the Presence of Partial Synchrony",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "2",
  pages =        "288--323",
  month =        apr,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42283.html",
  abstract =     "The concept of partial synchrony in a distributed
                 system is introduced. Partial synchrony lies between
                 the cases of a synchronous system and an asynchronous
                 system. In a synchronous system, there is a known fixed
                 upper bound $\Delta$ on the time required for a message
                 to be sent from one processor to another and a known
                 fixed upper bound $\Phi$ on the relative speeds of
                 different processors. In an asynchronous system no
                 fixed upper bounds $\Delta$ and $\Phi$ exist. In one
                 version of partial synchrony, fixed bounds $\Delta$ and
                 $\Phi$ exist, but they are not known a priori. The
                 problem is to design protocols that work correctly in
                 the partially synchronous system regardless of the
                 actual values of the bounds $\Delta$ and $\Phi$. In
                 another version of partial synchrony, the bounds are
                 known, but are only guaranteed to hold starting at some
                 unknown time T, and protocols must be designed to work
                 correctly regardless of when time $T$ occurs.
                 Fault-tolerant consensus protocols are given for
                 various cases of partial synchrony and various fault
                 models.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "MIT, Cambridge, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "718; 721; 722; 723; 913",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "agreement problem; algorithms; Byzantine generals
                 problem; computer networks; computer systems, digital
                 --- Distributed; computers, digital --- Data
                 Communication Systems; consensus problem; database
                 systems --- Distributed; Reliability; reliability;
                 theory",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Reliability, availability, and
                 serviceability. {\bf D.4.7}: Software, OPERATING
                 SYSTEMS, Organization and Design, Distributed
                 systems.",
}

@Article{McNaughton:1988:CRT,
  author =       "Robert McNaughton and Paliath Narendran and Friedrich
                 Otto",
  title =        "{Church--Rosser Thue} Systems and Formal Languages",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "2",
  pages =        "324--344",
  month =        apr,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42284.html",
  abstract =     "Since about 1971, much research has been done on Thue
                 systems that have properties that ensure viable and
                 efficient computation. The strongest of these is the
                 Church--Rosser property, which states that two
                 equivalent strings can each be brought to a unique
                 canonical form by a sequence of length-reducing rules.
                 In this paper three ways in which formal languages can
                 be defined by Thue systems with this property are
                 studied, and some general results about the three
                 families of languages so determined are studied.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Rensselaer Polytechnic Inst, Troy, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; automata theory; Church--Rosser Thue
                 systems; computer metatheory --- Formal Logic; Formal
                 Languages; languages; mathematical techniques ---
                 Algorithms; theory; verification",
  subject =      "{\bf F.4.3}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Formal Languages. {\bf F.4.2}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Grammars and Other Rewriting Systems, Thue
                 systems.",
}

@Article{Ullman:1988:ETT,
  author =       "Jeffrey D. Ullman and Allen {Van Gelder}",
  title =        "Efficient Tests for Top-Down Termination of Logical
                 Rules",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "2",
  pages =        "345--373",
  month =        apr,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/prolog.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42285.html",
  abstract =     "Considered is the question of whether top-down
                 (Prolog-like) evaluation of a set of logical rules can
                 be guaranteed to terminate. The NAIL| system is
                 designed to process programs consisting of logical
                 rules and to select, for each fragment of the program,
                 the best from among many possible strategies for its
                 evaluation. In the context of such a system, it is
                 essential that termination tests be fast. Thus, the
                 ``uniqueness'' property of logical rules is introduced.
                 This property is satisfied by many of the common
                 examples of rules and is easily recognized. For rules
                 with this property, a set of inequalities, whose
                 satisfaction is sufficient for termination of the
                 rules, can be generated in polynomial time. Then a
                 polynomial test for satisfaction of constraints
                 generated by this process is given.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford Univ, Stanford, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; analysis of algorithms; complexity of
                 algorithms; computer metatheory --- Programming Theory;
                 computer programming --- Algorithms; computer software;
                 languages; logic programs; prolog; Software
                 Engineering; verification",
  subject =      "{\bf D.2.4}: Software, SOFTWARE ENGINEERING, Program
                 Verification, Correctness proofs. {\bf F.2.2}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf F.3.1}:
                 Theory of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Invariants. {\bf F.3.1}: Theory of Computation, LOGICS
                 AND MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Mechanical verification. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming. {\bf D.3.2}: Software, PROGRAMMING
                 LANGUAGES, Language Classifications, Prolog.",
}

@Article{Galil:1988:MCF,
  author =       "Zvi Galil and {\'E}va Tardos",
  title =        "An ${O}(n^2 (m + n \log n) \log n)$ Min-Cost Flow
                 Algorithm",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "2",
  pages =        "374--386",
  month =        apr,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/netflow.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Preliminary version in Proc. 27th Annual IEEE
                 Symposium on the Foundations of Computer Science, pages
                 1--9, 1986",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214090.html",
  abstract =     "The minimum cost flow problem is: Given a network with
                 $n$ vertices and m edges, find a maximum flow of
                 minimum cost. Many network problems are easily
                 reducible to this problem. A polynomial-time algorithm
                 for the problem has been known for some time, but only
                 recently a strongly polynomial algorithm was
                 discovered. In this paper an $O(n^f (m + n \log n) \log
                 n)$ algorithm is designed. The previous best algorithm,
                 due to Fujishige and Orlin, had an $O(m^2 (m + n \log
                 n) \log n)$ time bound. Thus, for dense graphs an
                 improvement of two orders of magnitude is obtained. The
                 algorithm in this paper is based on Fujishige's
                 algorithm (which is based on Tardos's algorithm).",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Columbia Univ, New York, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; analysis of algorithms;
                 complexity algorithms; computer metatheory ---
                 Programming Theory; computer programming; discrete
                 mathematics; mathematical programming, linear;
                 minimum-cost flow problem; optimization; theory;
                 verification",
  subject =      "{\bf G.2.1}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Combinatorics, Combinatorial algorithms.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.1.6}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, Optimization, Linear programming.
                 {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems.",
}

@Article{Sasaki:1988:TCM,
  author =       "Galen H. Sasaki and Bruce Hajek",
  title =        "The Time Complexity of Maximum Matching by Simulated
                 Annealing",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "2",
  pages =        "387--403",
  month =        apr,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/46160.html",
  abstract =     "The random, heuristic search algorithm called
                 simulated annealing is considered for the problem of
                 finding the maximum cardinality matching in a graph. It
                 is shown that neither a basic form of the algorithm,
                 nor any other algorithm in a fairly large related class
                 of algorithms, can find maximum cardinality matchings
                 such that the average time required grows as a
                 polynomial in the number of nodes of the graph. In
                 contrast, it is also shown for arbitrary graphs that a
                 degenerate form of the basic annealing algorithm
                 (obtained by letting ``temperature'' be a suitably
                 chosen constant) produces matchings with nearly maximum
                 cardinality in polynomial average time.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Illinois at Urbana-Champaign, Urbana,
                 IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 722; 723; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; artificial intelligence ---
                 Applications; combinatorial optimization; computer
                 programming; computers, digital --- Computational
                 Methods; heuristic search algorithm; mathematical
                 techniques --- Algorithms; maximum matching;
                 optimization; performance; simulated annealing;
                 theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf I.2.8}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search, Heuristic
                 methods. {\bf G.3}: Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Probabilistic algorithms
                 (including Monte Carlo). {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms.",
}

@Article{Sandhu:1988:SPM,
  author =       "Ravinderpal Singh Sandhu",
  title =        "The Schematic Protection Model: {Its} Definition and
                 Analysis for Acyclic Attenuation Schemes",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "2",
  pages =        "404--432",
  month =        apr,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42286.html",
  abstract =     "The protection state of a system is defined by the
                 privileges possessed by subjects at a given moment.
                 Operations that change this state are themselves
                 authorized by the current state. This poses a design
                 problem in constructing the initial state so that all
                 derivable states conform to a particular policy. It
                 also raises an analysis problem of characterizing the
                 protection states derivable from a given initial state.
                 A protection model provides a framework for both design
                 and analysis. Design generality and tractable analysis
                 are inherently conflicting goals. Analysis is
                 particularly difficult if creation of subjects is
                 permitted. The central point of this paper is to
                 demonstrate that the conflicting goals of convenient
                 generality and tractable analysis can be simultaneously
                 achieved. For this purpose the author has developed the
                 Schematic Protection Model (SPM), which is also
                 presented.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Ohio State Univ, Columbus, OH, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "An access control model that is for discretionary and
                 mandatory access policies; Most existing models suffer
                 from intractability with regard to safety or are of
                 limited generality.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer architecture; computer networks ---
                 Protocols; computer operating systems --- Design;
                 computer software --- Software Engineering; computer
                 systems organization; computer systems, digital;
                 computer-communication networks; database systems ---
                 Protection; Protection; security; theory;
                 verification",
  subject =      "{\bf D.4.6}: Software, OPERATING SYSTEMS, Security and
                 Protection, Access controls. {\bf D.2.0}: Software,
                 SOFTWARE ENGINEERING, General, Protection mechanisms.
                 {\bf K.6.m}: Computing Milieux, MANAGEMENT OF COMPUTING
                 AND INFORMATION SYSTEMS, Miscellaneous, Security*.",
}

@Article{Calderbank:1988:ODP,
  author =       "A. R. Calderbank and E. G. {Coffman, Jr.} and Leopold
                 Flatto",
  title =        "Optimal Directory Placement on Disk Storage Devices",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "2",
  pages =        "433--446",
  month =        apr,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42287.html",
  abstract =     "Two mathematical models dealing with optimal placement
                 of directories on disk devices are analyzed. Storage
                 addresses on the disk are approximated by points in the
                 interval $[0, 1]$. Requests for information on the disk
                 are represented by a sequence of file names. To process
                 a request, a read-write head is first moved to a
                 directory kept on the disk that specifies the address
                 of the file, and then a head is moved to the specified
                 address. The addresses are assumed to be independent
                 and uniform on $[0, 1]$. In the first model we consider
                 a system of two heads separated by a fixed distance d
                 and a directory situated at $0 \leq x \leq 1$. In the
                 second model we consider a system consisting of one
                 head and $n$ greater than equivalent to 2 directories
                 at $0 \leq x_1 < x_2 < \ldots{} < x_n \leq 1$. For both
                 models we study the problem of finding those values of
                 the parameters that minimize the expected head motion
                 to process a request in statistical equilibrium.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USa",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "locate in the center or replicate and locate in center
                 of l/r. Also two head eval.",
  classification = "721; 722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "computer systems programming --- Input Output
                 Programs; computer systems, digital --- Performance;
                 data storage, magnetic; design; Disk; optimal directory
                 placement; performance; performance of systems;
                 stochastic modeling; theory",
  subject =      "{\bf B.3.3}: Hardware, MEMORY STRUCTURES, Performance
                 Analysis and Design Aids. {\bf B.4.4}: Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Performance
                 Analysis and Design Aids. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS.",
}

@Article{Alt:1988:CCC,
  author =       "Helmut Alt",
  title =        "Comparing the Combinational Complexities of Arithmetic
                 Functions",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "2",
  pages =        "447--460",
  month =        apr,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214084.html",
  abstract =     "Methods are presented for finding reductions between
                 the computations of certain arithmetic functions that
                 preserve asymptotic Boolean complexities (circuit depth
                 or size). They can be used to show, for example, that
                 all nonlinear algebraic functions are as difficult as
                 integer multiplication with respect to circuit size. As
                 a consequence, any lower or upper bound (e.g., $O(n
                 \log n \log \log n)$) for one of them applies to the
                 whole class. It is also shown that, with respect to
                 depth and size simultaneously, multiplication is
                 reducible to any nonlinear and division to any
                 nonpolynomial algebraic function.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Freie Univ Berlin, Berlin, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 722; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; analysis of algorithms;
                 complexity of algorithms; computer programming;
                 computers, digital --- Circuits; mathematical
                 techniques --- Numerical Analysis; theory;
                 verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Number-theoretic computations. {\bf
                 G.1.0}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 General, Computer arithmetic.",
}

@Article{Wegener:1988:CBP,
  author =       "Ingo Wegener",
  title =        "On the Complexity of Branching Programs and Decision
                 Trees for Clique Functions",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "2",
  pages =        "461--471",
  month =        apr,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/46161.html",
  abstract =     "Exponential lower bounds on the complexity of
                 computing the clique functions in the Boolean
                 decision-tree model are proved. For one-time-only
                 branching programs, large polynomial lower bounds are
                 proved for $k$-clique functions if $k$ is fixed, and
                 exponential lower bounds if $k$ increases with $n$.
                 Finally, the hierarchy of the classes BP$_d$(P) of all
                 sequences of Boolean functions that may be computed by
                 $d$-times only branching programs of polynomial size is
                 introduced. It is shown constructively that BP$_2$(P)
                 is a proper subset of BP$_2$(P).",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Johann Wolfgang Goethe-Univ, Frankfurt am Main,
                 West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; automata theory ---
                 Computability and Decidability; clique functions;
                 complexity of algorithms; computation by abstract
                 devices; computer programming; decision trees;
                 mathematical techniques --- Graph Theory; theory;
                 verification",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Bounded-action
                 devices. {\bf F.1.3}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Classes,
                 Complexity hierarchies. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms.",
}

@Article{Shankar:1988:MPC,
  author =       "N. Shankar",
  title =        "A Mechanical Proof of the {Church--Rosser} Theorem",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "475--522",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44484.html",
  abstract =     "We describe a formalization and proof of the
                 Church--Rosser theorem that was carried out with the
                 Boyer--Moore theorem prover. The mechanical proof
                 illustrates the effective use of the Boyer--Moore
                 theorem prover in proof checking difficult
                 metamathematical proofs.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford Univ, Stanford, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "artificial intelligence; Boyer--Moore theorem prover;
                 Church--Rosser theorem; computer metatheory;
                 experimentation; lambda calculus; theory;
                 verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Computational logic. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Lambda calculus and related
                 systems. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Mathematical induction.",
}

@Article{Furst:1988:FMG,
  author =       "Merrick L. Furst and Jonathan L. Gross and Lyle A.
                 McGeoch",
  title =        "Finding a Maximum-Genus Graph Imbedding",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "523--534",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44485.html",
  abstract =     "The computational complexity of constructing the
                 imbeddings of a given graph into surfaces of different
                 genus is not well understood. In this paper,
                 topological methods and a reduction to linear matroid
                 parity are used to develop a polynomial-time algorithm
                 to find a maximum-genus cellular imbedding. This seems
                 to be the first imbedding algorithm for which the
                 running time is not exponential in the genus of the
                 imbedding surface.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Carnegie-Mellon Univ, Pittsburgh, PA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computational complexity; computer
                 programming --- Algorithms; Graph Theory; imbedding
                 algorithm; linear matroid parity; mathematical
                 techniques; maximum-genus graph imbedding;
                 polynomial-time algorithm; theory; topological methods;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms.",
}

@Article{Hsu:1988:CMI,
  author =       "Wen-Lian Hsu",
  title =        "The Coloring and Maximum Independent Set Problems on
                 Planar Perfect Graphs",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "535--563",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44486.html",
  abstract =     "Efficient decomposition algorithms for the weighted
                 maximum independent set, minimum coloring, and minimum
                 clique cover problems on planar perfect graphs are
                 presented. These planar graphs can also be
                 characterized by the absence of induced odd cycles of
                 length greater than 3 (odd holes). The algorithm in
                 this paper is based on decomposing these graphs into
                 essentially two special classes of inseparable
                 component graphs whose optimization problems are easy
                 to solve, finding the solutions for these components
                 and combining them to form a solution for the original
                 graph. These two classes are (i)planar comparability
                 graphs and (ii) planar line graphs of those planar
                 bipartite graphs whose maximum degrees are no greater
                 than three. The same techniques can be applied to other
                 classes of perfect graphs, provided that efficient
                 algorithms are available for their inseparable
                 component graphs.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Northwestern Univ, Evanston, IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer programming --- Algorithms;
                 decomposition algorithms; graph coloring; Graph Theory;
                 mathematical techniques; maximum independent set;
                 minimum clique cover; planar perfect graphs; theory;
                 verification",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems. {\bf I.1.2}: Computing Methodologies,
                 ALGEBRAIC MANIPULATION, Algorithms, Analysis of
                 algorithms.",
}

@Article{Rhee:1988:SDA,
  author =       "Wansoo T. Rhee and Michel Talagrand",
  title =        "Some Distributions That Allow Perfect Packing",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "564--578",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/bin-packing.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44487.html",
  abstract =     "A probability distribution $\mu$ on $[0, 1]$ allows
                 perfect packing if $n$ items of size $X_1$, \ldots{},
                 $X_n$ independent and identically distributed according
                 to $\mu$ can be packed in unit size bins in such a way
                 that the expected wasted space is $o(n)$. A large class
                 of distributions that allow perfect packing is
                 exhibited. As a corollary, the intervals $[a, b]$ for
                 which the uniform distribution on $[a, b]$ allows
                 perfect packing are determined.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Ohio State Univ, Columbus, OH, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Combinatorial Mathematics; computer
                 programming --- Algorithms; mathematical techniques;
                 perfect packing; probability; probability distribution;
                 stochastic bin packing; theory; verification",
  subject =      "{\bf F.2.m}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Miscellaneous.",
}

@Article{Goodman:1988:SBE,
  author =       "Jonathan Goodman and Albert G. Greenberg and Neal
                 Madras and Peter March",
  title =        "Stability of Binary Exponential Backoff",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "579--602",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44488.html",
  abstract =     "Binary exponential backoff is a randomized protocol
                 for regulating transmissions on a multiple-access
                 broadcast channel. Ethernet, a local-area network, is
                 built upon this protocol. The fundamental theoretical
                 issue is stability: Does the backlog of packets
                 awaiting transmission remain bounded in time, provided
                 the rates of new packet arrivals are small enough? It
                 is assumed $n \geq 2$ stations share the channel, each
                 having an infinite buffer where packets accumulate
                 while the station attempts to transmit the first from
                 the buffer. Here, it is established that binary
                 exponential backoff is stable if the sum of the arrival
                 rates is sufficiently small. Detailed results are
                 obtained on which rates lead to stability when $n = 2$
                 stations share the channel. In passing, several other
                 results are derived bearing on the efficiency of the
                 conflict resolution process. Simulation results are
                 reported that, in particular, indicate alternative
                 retransmission protocols can significantly improve
                 performance.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Courant Inst of Mathematical Sciences, New York,
                 NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The article studies the stability of binary
                 exponential backoff. Detailed results are obtained on
                 which rates lead to stability when 2 stations share the
                 channel. Simulation results show alternative
                 retransmission protocols can significantly improve
                 performance.",
  classification = "723",
  descriptors =  "Network architecture; LAN; access protocol;
                 simulation; performance evaluation; broadcast",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "acknowledgment-based algorithms; algorithms; binary
                 exponential backoff; computer networks; computer
                 simulation; computer systems, digital --- Distributed;
                 multiple-access broadcast channel; packet networks;
                 performance; Protocols; retransmission protocols;
                 theory; verification",
  subject =      "{\bf C.2.5}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Local Networks, Access
                 schemes. {\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf C.4}: Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS, Modeling
                 techniques.",
}

@Article{Heath:1988:PMP,
  author =       "Lenwood S. Heath and Arnold L. Rosenberg and Bruce T.
                 Smith",
  title =        "The Physical Mapping Problem for Parallel
                 Architectures",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "603--634",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44489.html",
  abstract =     "The problem of realizing an idealized parallel
                 architecture on a (possibly fault-laden) physical
                 architecture is studied. Our formulation performs the
                 mapping in the light of the algorithm that one wants to
                 implement on the idealized architecture. A version of
                 the mapping algorithm suggested by the DIOGENES
                 methodology for designing fault-tolerant VLSI processor
                 array is settled definitely. Two quality metrics for
                 mappings are considered, the first embodying an
                 idealized notion of average delay, which relates to
                 power consumption, and the second being the length of
                 the longest run of wire. For the average-delay measure,
                 four algorithms that optimally assign the m vertices of
                 the embedded graph to the $n$ fault-free processors
                 that have been fabricated are presented.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Virginia Polytechnic Inst, Blacksburg, VA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer architecture; computer
                 programming --- Algorithms; computer systems, digital;
                 design; fault-tolerant VLSI processor arrays; mapping
                 algorithms; Parallel Processing; physical mapping
                 problem; quality metrics; theory; verification",
  subject =      "{\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Interconnection architectures. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms.",
}

@Article{Kosaraju:1988:OSB,
  author =       "S. Rao Kosaraju and Mikhail J. Atallah",
  title =        "Optimal Simulations between Mesh-Connected Arrays of
                 Processors",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "635--650",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jan 16 10:57:51 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44494.html",
  abstract =     "Let $G$ and $H$ be two mesh-connected arrays of
                 processors, where $G$ equals $g_1 \times g_2 \times
                 \cdots{} g_t$, $H = h_1 \times h_2 \times \cdots{}
                 \times h_d$, and $g_1 \ldots{} g_t \leq h_1 \ldots{}
                 h_d$. The problem of simulating $G$ by $H$ is
                 considered and the best possible simulation in terms of
                 the $g_i$'s and $h_i$'s is characterized by giving such
                 a simulation and proving its optimality in the
                 worst-case sense. Also the same bound on the average
                 cost of encoding the edges of $G$ as distinct paths in
                 $H$ is established.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Johns Hopkins Univ, Baltimore, MD, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; codes, symbolic --- Encoding; computer
                 simulation; computer systems, digital; graph embedding;
                 graph encoding; information processing; mathematical
                 techniques --- Graph Theory; mesh-connected arrays;
                 Parallel Processing; theory; time; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory.",
}

@Article{Fich:1988:PCE,
  author =       "Faith E. Fich and Martin Tompa",
  title =        "The Parallel Complexity of Exponentiating Polynomials
                 over Finite Fields",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "651--667",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44496.html",
  abstract =     "Modular integer exponentiation (given $a$, $e$, and
                 $m$, compute $a^e \bmod m$) is a fundamental problem in
                 algebraic complexity for which no efficient parallel
                 algorithm is known. Two closely related problems are
                 modular polynomial exponentiation (given $a(x)$, $e$,
                 and $t$, compute the coefficient of $x^t$ in
                 $(a(x))^e$). It is shown that these latter two problems
                 are in NC$^2$ when $a(x)$ and $m(x)$ are polynomials
                 over a finite field whose characteristic is polynomial
                 in the input size.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Washington, Seattle, WA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algebra; algorithms; computer programming ---
                 Algorithms; computer systems, digital --- Parallel
                 Processing; mathematical techniques; theory;
                 verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations on polynomials. {\bf F.2.1}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Numerical Algorithms and Problems,
                 Computations in finite fields. {\bf G.1.0}: Mathematics
                 of Computing, NUMERICAL ANALYSIS, General, Parallel
                 algorithms. {\bf I.1.2}: Computing Methodologies,
                 ALGEBRAIC MANIPULATION, Algorithms, Algebraic
                 algorithms.",
}

@Article{Daduna:1988:BPS,
  author =       "Hans Daduna",
  title =        "Busy Periods for Subnetworks in Stochastic Networks:
                 Mean Value Analysis",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "668--674",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1988.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44495.html",
  abstract =     "The busy period of order $n$ for a subnetwork, which
                 for large $n$ describes heavy traffic periods of that
                 subnetwork, is described for queuing networks. The mean
                 duration of such busy periods and efficient algorithms
                 for computing these quantities are determined.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ Hamburg, Hamburg, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  descriptors =  "Queueing system; busy period; MVA",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer networks; computer programming
                 --- Algorithms; performance; probability --- Random
                 Processes; theory; verification",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Stochastic analysis. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Modeling and prediction. {\bf
                 D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Network operating systems.",
}

@Article{Rohlicek:1988:RPM,
  author =       "Jan Robin Rohlicek and Alan S. Willsky",
  title =        "The Reduction of Perturbed {Markov} Generators: {An}
                 Algorithm Exposing the Role of Transient States",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "675--696",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44497.html",
  abstract =     "A new algorithm for the hierarchical aggregation of
                 singularity perturbed finite-state Markov process is
                 derived. The approach taken bridges the gap between
                 conceptually simple results for a relatively restricted
                 class of processes and the significantly more complex
                 results for the general case. The critical role played
                 by (almost) transient states is exposed, resulting in a
                 straightforward algorithm for the construction of a
                 sequence of aggregate generators associated with
                 various time scales. These generators together provide
                 a uniform asymptotic approximation of the original
                 probability transition function.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Bolt, Beranek \& Newman Lab Inc, Cambridge, MA,
                 USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; asymptotic approximation; computer
                 programming --- Algorithms; hierarchical aggregation;
                 performance; perturbed Markov generators; probability;
                 probability transition function; Random Processes;
                 reliability; theory; transient states",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Modeling and prediction. {\bf G.1.3}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Numerical Linear
                 Algebra, Conditioning. {\bf G.1.3}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Numerical Linear
                 Algebra, Eigenvalues. {\bf G.1.3}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Numerical Linear
                 Algebra, Error analysis. {\bf G.1.3}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Numerical Linear
                 Algebra, Sparse and very large systems. {\bf D.4.8}:
                 Software, OPERATING SYSTEMS, Performance, Stochastic
                 analysis. {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance, Queueing theory. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Simulation. {\bf
                 D.4.5}: Software, OPERATING SYSTEMS, Reliability,
                 Fault-tolerance.",
}

@Article{Chang:1988:POW,
  author =       "Jik H. Chang and Oscar H. Ibarra and Anastasios
                 Vergis",
  title =        "On the Power of One-Way Communication",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "697--726",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44493.html",
  abstract =     "A very model of parallel computation is considered,
                 and the question of how restricting the flow of data to
                 be one way compares with two-way flow is studied. It is
                 shown that the one-way version is surprisingly very
                 powerful in that it can solve problems that seemingly
                 require two-way communication. Whether or not one-way
                 communication is strictly weaker than two-way is an
                 open problem, although the conjecture in this paper is
                 in the positive. It is shown, however, that proving
                 this conjecture is at least as hard as some well-known
                 open problem in complexity theory.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Minnesota, Minneapolis, MN, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "alternating Turing machine; automata theory --- Turing
                 Machines; complexity theory; computer metatheory;
                 computer systems, digital --- Parallel Processing;
                 information processing; languages; nondeterministic
                 Turing machine; one-way communication; parallel
                 computation; pspace-complete; theory; time;
                 verification",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Relations among modes. {\bf F.1.1}: Theory
                 of Computation, COMPUTATION BY ABSTRACT DEVICES, Models
                 of Computation. {\bf F.4.3}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Formal
                 Languages, Classes defined by grammars or automata.
                 {\bf F.4.3}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Formal Languages, Operations on
                 languages. {\bf F.1.3}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Classes,
                 Complexity hierarchies. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity
                 measures.",
}

@Article{Fellows:1988:NTP,
  author =       "Michael R. Fellows and Michael A. Langston",
  title =        "Nonconstructive Tools for Proving Polynomial-Time
                 Decidability",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "727--739",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44491.html",
  abstract =     "Recent advances in graph theory and graph algorithms
                 dramatically alter the traditional view of concrete
                 complexity theory, in which a decision problem is
                 generally shown to be in P by producing an efficient
                 algorithm to solve an optimization version of the
                 problem. Nonconstructive tools are now available for
                 classifying problems as decidable in polynomial time by
                 guaranteeing only the existence of polynomial-time
                 decision algorithms. In this paper these new methods
                 are employed to prove membership in P for a number of
                 problems whose complexities are not otherwise known.
                 Powerful consequences of these techniques are pointed
                 out and their utility is illustrated. A type of
                 partially ordered set that supports this general
                 approach is defined and explored.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Idaho, Moscow, ID, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer metatheory; computer programming
                 --- Algorithms; decision algorithms; graph algorithms;
                 mathematical techniques --- Graph Theory; membership;
                 nonconstructive proofs; polynomial-time decidability;
                 theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Graph algorithms.",
}

@Article{MeyeraufderHeide:1988:FAD,
  author =       "Friedhelm {Meyer auf der Heide}",
  title =        "Fast Algorithms for ${N}$-Dimensional Restrictions of
                 Hard Problems",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "740--747",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44490.html",
  abstract =     "Let M be a parallel RAM with p processors and
                 arithmetic operations addition and subtraction
                 recognizing $L \in N^n$ in $T$ steps, (Inputs for $M$
                 are given integer by integer, not bit by bit). Then $L$
                 can be recognized by a (sequential) linear search
                 algorithm (LSA) in $O(n^4(\log(n) + T + \log(p)))$
                 steps. Thus many $n$-dimensional restrictions of
                 NP-complete problems (binary programming, traveling
                 salesman problem, etc.) and even that of the uniquely
                 optimum traveling salesman problem, which is
                 $\Delta_2^P$-complete, can be solved in polynomial
                 restriction of the knapsack problem previously shown by
                 the author, and destroys the hope of proving
                 nonpolynomial lower bounds on LSAs for any problem that
                 can be recognized by a PRAM as above with
                 $2^{\poly(n)}$ processors in $\poly(n)$ time.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Johann Wolfgang Goethe Univ Frankfurt, Frankfurt
                 am Main, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer metatheory; computer programming
                 --- Algorithms; languages; linear search algorithms;
                 np-complete problems; parallel random-access machines;
                 theory; verification",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Relations
                 among models. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Bounded-action devices. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf F.1.3}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity
                 classes.",
}

@Article{Schonhage:1988:NLB,
  author =       "Arnold Sch{\"{o}}nhage",
  title =        "A Nonlinear Lower Bound for Random-Access Machines
                 under Logarithmic Cost",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "3",
  pages =        "748--754",
  month =        jul,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/44492.html",
  abstract =     "For on-line random-access machines under logarithmic
                 cost, the simple task of storing arbitrary binary
                 inputs has nonlinear complexity. Even if all kinds of
                 powerful internal operations are admitted and reading
                 of storage locations is free of charge, just
                 successively changing the storage contents for properly
                 storing arbitrary $n$-bit inputs requires an average
                 cost of order $n \log n$.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ Tubingen, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "complexity; computer metatheory; logarithmic cost;
                 nonlinear lower bound; random-access machines; theory;
                 verification",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Bounded-action
                 devices. {\bf F.1.3}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Classes.",
}

@Article{Chvatal:1988:MHE,
  author =       "Va{\v{s}}ek Chv{\'{a}}tal and Endre Szemer{\'e}di",
  title =        "Many Hard Examples for Resolution",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "759--768",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/48016.html",
  abstract =     "It is proved that for every choice of positive
                 integers c and $k$ such that $k \geq 3$ and $c^2 \pm k
                 \geq 0.7$, there is a positive number \$epsilon such
                 that, with probability tending to 1 as $n \to \infty$,
                 a randomly chosen family of $c n$ clauses of size $k /
                 n$ variables is unsatisfiable, but every resolution
                 proof of its unsatisfiability must generate at least
                 $(1 + \epsilon)^n$ clauses. The proof makes use of
                 random hypergraphs.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "New Brunswick, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Artificial Intelligence; Mathematical
                 Techniques --- Graph Theory; Probability --- Random
                 Processes; Random Hypergraphs; Resolution;
                 Satisfiability; theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Complexity of proof
                 procedures.",
}

@Article{Grigoriadis:1988:NCH,
  author =       "M. D. Grigoriadis and B. Kalantari",
  title =        "A New Class of Heuristic Algorithms for Weighted
                 Perfect Matching",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "769--776",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/48015.html",
  abstract =     "The minimum-weight perfect matching problem for
                 complete graphs of $n$ vertices with edge weights
                 satisfying the triangle inequality is considered. For
                 each nonnegative integer $k \leq \log_3n$, and for any
                 perfect matching algorithm that runs in t(n) time and
                 has an error bound of $f(n)$ times the optimal weight,
                 an $O(\max[n^2, t(3 \pm / n)])$-time heuristic
                 algorithm with an error bound of $(7/3)^k(1 + f(3 \pm
                 k/n)) - 1$ is given. By the selection of $k$ as
                 appropriate functions of $n$, heuristics that have
                 better running times and\slash or error bounds than
                 existing ones are derived.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "New Brunswick, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Approximate Algorithms; Combinatorial
                 Optimization; Complexity; Computer Programming ---
                 Algorithms; Error Bounds; Graph Theory; Heuristic
                 Algorithms; Mathematical Techniques; Minimum-Weight
                 Perfect Matching; Optimization; theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures.",
}

@Article{Cole:1988:OVC,
  author =       "Richard Cole and Alan Siegel",
  title =        "Optimal {VLSI} Circuits for Sorting",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "777--809",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/48017.html",
  abstract =     "This work describes a large number of constructions
                 for sorting $N$ integers in the range [0, M - 1], for
                 $N$ $leq$ M $leq$ N$^2$, for the standard VLSI bit
                 model. Among other results we obtain: (1) VLSI sorter
                 constructions that are within a constant factor of
                 optimal size, for all M and almost all running times T;
                 (2) a fundamentally new merging network for sorting
                 numbers in a bit model; and (3) new organizational
                 approaches for optimal tuning of merging networks and
                 the proper management of data flow.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "New York, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "714; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Area/Time Tradeoffs; Computer Metatheory;
                 Integer Sorting; Integrated Circuits, VLSI; Merging
                 Networks; Optimization; Sorting Circuits;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Routing and layout. {\bf B.7.1}: Hardware,
                 INTEGRATED CIRCUITS, Types and Design Styles, VLSI
                 (very large scale integration). {\bf E.4}: Data, CODING
                 AND INFORMATION THEORY, Data compaction and
                 compression.",
}

@Article{Gonzalez:1988:LTA,
  author =       "Teofilo F. Gonzalez and Sing-Ling Lee",
  title =        "A Linear Time Algorithm for Optimal Routing Around a
                 Rectangle",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "810--831",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/48018.html",
  abstract =     "The problem of connecting a set of terminal that lie
                 on the sides of a rectangle to minimize the total area
                 is discussed. An $O(n)$ algorithm is presented to solve
                 this problem when the set of $n$ terminals is initially
                 sorted. The strategy in this paper is to reduce the
                 problem to several problems such that no matter what
                 instance is started with, at least one of these
                 problems can be solved optimally by a greedy method.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Santa Barbara, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "714; 723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Algorithms; Computer Programming; Greedy
                 Methods; Integrated Circuits --- Computer Aided Design;
                 Linear Time Algorithm; Optimal Routing; Optimization;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Routing and layout. {\bf
                 B.7.2}: Hardware, INTEGRATED CIRCUITS, Design Aids,
                 Placement and routing.",
}

@Article{Panwar:1988:OSP,
  author =       "Shivendra S. Panwar and Don Towsley and Jack K. Wolf",
  title =        "Optimal Scheduling Policies for a Class of Queues with
                 Customer Deadlines to the Beginning of Service",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "832--844",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1988.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/48019.html",
  abstract =     "Many problems can be modeled as single-server queues
                 with impatient customers. An example is that of the
                 transmission of voice packets over a packet-switched
                 network. If the voice packets do not reach their
                 destination within a certain time interval of their
                 transmission, they are useless to the receiver and
                 considered lost. It is therefore desirable to schedule
                 the customers such that the fraction of customers
                 served within their respective deadlines is maximized.
                 For this measure of performance, it is shown that the
                 shortest time to extinction (STE) policy is optimal for
                 a class of continuous and discrete time nonpreemptive
                 M/G/1 queues that do not allow unforced idle times.
                 When unforced idle times are allowed, the best policies
                 belong to the class of shortest time to extinction with
                 inserted idle time (STEI) policies. An STEI policy
                 requires that the customer closest to his or her
                 deadline be scheduled whenever it schedules a customer.
                 It also has the choice of inserting idle times while
                 the queue is nonempty.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Brooklyn, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Many problems can be modelled as single-server queues
                 with impatient customers. An example is that of the
                 transmission of voice packets over a ps network. If the
                 voice packets do not reach their destination within a
                 certain time, they are useless to the receiver and
                 considered lost. It is therefore desirable to schedule
                 the customers such that the fraction of customers
                 served within their deadlines is maximized.",
  classification = "718; 723; 913; 921; 922",
  descriptors =  "Queueing system; queueing discipline; limited waiting
                 time; M/G/1; impatient customer",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Computer Networks --- Local Networks; Customer
                 Deadlines; design; Optimal Scheduling Policies;
                 Optimization; Packetized Voice Communications;
                 performance; Probability; Queueing Theory; Scheduling;
                 Stochastic Scheduling; Telecommunication; theory;
                 verification",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory. {\bf G.m}: Mathematics of Computing,
                 MISCELLANEOUS, Queueing theory. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Stochastic analysis.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sequencing and scheduling.
                 {\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design.",
}

@Article{Attiya:1988:CAR,
  author =       "Hagit Attiya and Marc Snir and Manfred K. Warmuth",
  title =        "Computing on an Anonymous Ring",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "845--875",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/48247.html",
  abstract =     "The computational capabilities of a system of $n$
                 indistinguishable (anonymous) processors arranged on a
                 ring in the synchronous and asynchronous models of
                 distributed computation are analyzed. A precise
                 characterization of the functions that can be computed
                 in this setting is given. It is shown that any of these
                 functions can be computed in$O(n^2)$ messages in the
                 asynchronous model. This is also proved to be a lower
                 bound for such elementary functions as AND, SUM, and
                 Orientation. In the synchronous model any computable
                 function can be computed in $O(n \log n)$ messages. A
                 ring can be oriented and start synchronized within the
                 same bounds. The main contribution of this paper is a
                 new technique for proving lower bounds in the
                 synchronous model.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Jerusalem, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Anonymous Ring; Asynchronous Model;
                 Computational Capabilities; Computer Networks; Computer
                 Systems, Digital --- Distributed; Lower Bounds;
                 Synchronous Model; theory; verification",
  subject =      "{\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf F.1.1}: Theory
                 of Computation, COMPUTATION BY ABSTRACT DEVICES, Models
                 of Computation, Relations among models. {\bf F.1.2}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation, Parallelism and concurrency. {\bf
                 F.4.2}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Grammars and Other Rewriting Systems,
                 Parallel rewriting systems. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity
                 measures. {\bf C.2.5}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Local Networks,
                 Rings.",
}

@Article{Karlin:1988:PHE,
  author =       "Anna R. Karlin and Eli Upfal",
  title =        "Parallel Hashing: an Efficient Implementation of
                 Shared Memory",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "876--892",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A central issue in the theory of parallel computation
                 is the gap between the ideal models that utilize shared
                 memory and the feasible models that consist of a
                 bounded-degree network of processors sharing no common
                 memory. This problem has been widely studied. Here a
                 tight bound for the probabilistic complexity of this
                 problem is established. The solution in this paper is
                 based on a probabilistic scheme for implementing shared
                 memory on a bounded-degree network of processors. This
                 scheme, which we term parallel hashing, enables a
                 processors to store and retrieve an arbitrary set of
                 $n$ data items in $O(\log n)$ parallel steps. The
                 items' locations are specified by a function chosen
                 randomly from a small class of universal hash
                 functions. A hash function in this class has a small
                 description and can therefore be efficiently
                 distributed among the processors. A deterministic lower
                 bound for the point-to-point communication model is
                 also presented.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Computer Programming --- Algorithms; Computer Systems,
                 Digital --- Parallel Processing; Data Processing;
                 Deterministic Lower Bound; File Organization; Parallel
                 Algorithms; Parallel Hashing; Shared Memory",
}

@Article{Ramshaw:1988:EGT,
  author =       "Lyle Ramshaw",
  title =        "Eliminating go to's while Preserving Program
                 Structure",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "893--920",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/48021.html",
  abstract =     "Suppose we want to eliminate the local go to
                 statements of a Pascal program by replacing them with
                 multilevel loop exit statements. The standard ground
                 rules for eliminating go to's require that we preserve
                 the flow graph of the program, but they allow us to
                 completely rewrite the control structures that glue
                 together the program's atomic tests and actions. The go
                 to's can be eliminated from a program under those
                 ground rules if and only if the flow graph of that
                 program has the graph-theoretic property named
                 reducibility. This paper considers a stricter set of
                 ground rules, which demand that we preserve the
                 program's original control structures, as well as its
                 flow graph, while we eliminate its go to's. In
                 particular, we are allowed to delete the go to
                 statements and the labels that they jump to and to
                 insert various exit statements and labeled
                 repeat-endloop pairs for them to jump out of. But we
                 are forbidden to change the rest of the program text in
                 any way. The critical issue that determines whether go
                 to's can be eliminated under these stricter rules turns
                 out to be the static order of the atomic tests and
                 actions in the program text.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Palo Alto, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Augmented Flow Graphs; Computer Metatheory ---
                 Programming Theory; Computer Programming; Elimination
                 Rules; Flow Graphs; Go to's; Program Transformations;
                 Reducibility; Structured Programming; theory;
                 verification",
  subject =      "{\bf D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Control structures. {\bf
                 F.3.3}: Theory of Computation, LOGICS AND MEANINGS OF
                 PROGRAMS, Studies of Program Constructs, Control
                 primitives.",
}

@Article{Goldberg:1988:NAM,
  author =       "Andrew V. Goldberg and Robert E. Tarjan",
  title =        "A New Approach to the Maximum-Flow Problem",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "921--940",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/netflow.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Preliminary version in Proc. 18th Annual ACM Symposium
                 on the Theory of Computing, pages 136--146, 1986",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/61051.html",
  abstract =     "All previously known efficient maximum-flow algorithms
                 work by finding augmenting paths. An alternative method
                 based on the preflow concept is introduced. A preflow
                 is like a flow, except that the total amount flowing
                 into a vertex is allowed to exceed the total amount
                 flowing out. The method maintains a preflow in the
                 original network and pushes local flow excess toward
                 the sink along what are estimated to be shortest paths.
                 The algorithm and its analysis are simple and
                 intuitive, yet the algorithm runs as fast as any other
                 known method on dense graphs, achieving an $O(n^3)$
                 time bound on an $n$-vertex graph. A version of the
                 algorithm running in $O(n m \log(n^2 / m))$ time on an
                 $n$-vertex, $m$-edge graph is also obtained. This is as
                 fast as any known method for any graph density and
                 faster on graphs of moderate density. The algorithm
                 also admits efficient distributed and parallel
                 implementations. A parallel implementation running in
                 $O(n^2 \log n)$ time using $n$ processors and $O(m)$
                 space is obtained.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cambridge, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Computer Programming --- Algorithms;
                 Computer Systems, Digital --- Parallel Processing;
                 Directed Graphs; Graph Algorithms; Graph Theory;
                 Mathematical Techniques; Maximum-Flow Algorithms;
                 Maximum-Flow Problem; Operations Research; Preflow
                 Concept",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems.",
}

@Article{MixBarrington:1988:FMF,
  author =       "David A. {Mix Barrington} and Denis Th{\'e}rien",
  title =        "Finite monoids and the fine structure of {NC}$^1$",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "941--952",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/63138.html",
  abstract =     "Recently a new connection was discovered between the
                 parallel complexity class NC$^1$ and the theory of
                 finite automata in the work of D. A. M. Barrington on
                 bounded width branching programs. There (nonuniform)
                 NC$^1$ was characterized as those languages recognized
                 by a certain nonuniform version of a DFA. Here we
                 extend this characterization to show that the internal
                 structures of NC$^1$ and the class of automata are
                 closely related. In particular, using D. Therien's
                 classification of finite monoids, we give new
                 characterizations of the classes AC$^0$, depth-$k$
                 AC$^0$, and ACC, the last being the AC$^0$ closure of
                 the $\bmod q$ functions for all constant $q$. We settle
                 some of the open questions, give a new proof that the
                 dot-depth hierarchy of algebraic automata theory is
                 infinite, and offer a new framework for understanding
                 the internal structure of NC$^1$.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Amherst, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "From the title footnote: ``D. A. Mix Barrington was
                 formerly known as David A. Barrington.''",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algebraic Automata Theory; Automata Theory; Circuit
                 Complexity; Computer Metatheory; Finite Monoids;
                 theory; verification",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 F.1.1}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Unbounded-action
                 devices. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Relations among models. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf F.1.3}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Complexity hierarchies. {\bf
                 F.1.3}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Complexity Classes, Relations among complexity
                 classes. {\bf G.2.m}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Miscellaneous.",
}

@Article{Leivant:1988:MRF,
  author =       "Daniel Leivant and Tim Fernando",
  title =        "Meager and Replete Failures of Relative Completeness",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "953--964",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/63139.html",
  abstract =     "The nature of programming languages that fail to have
                 a relatively complete proof formalism is discussed.
                 First, it is shown that such failures may be due to the
                 meagerness of the programming language, rather than to
                 the presence of complex control structures as in the
                 cases studied so far. The failure of relative
                 completeness is then derived for two languages with a
                 rich control structure, using simple simulations of
                 general recursive functions by procedure call
                 mechanisms.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Pittsburgh, PA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Computer Metatheory; Computer Programming Languages;
                 Control Structures; General Recursive Functions; Lambda
                 Calculus; Polymorphism; Procedure Call Mechanisms;
                 Relative Completeness; Theory; theory; verification",
  subject =      "{\bf D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Coroutines. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features, Procedures, functions, and subroutines.
                 {\bf F.3.1}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Specifying and Verifying and Reasoning
                 about Programs, Logics of programs. {\bf F.3.1}: Theory
                 of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Pre- and post-conditions. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Lambda calculus and related
                 systems.",
}

@Article{Pitt:1988:CLL,
  author =       "Leonard Pitt and Leslie G. Valiant",
  title =        "Computational Limitations on Learning from Examples",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "965--984",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/colt.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/63140.html",
  abstract =     "The computational complexity of learning Boolean
                 concepts from examples is investigated. It is shown for
                 various classes of concept representations that these
                 cannot be learned feasibly in a distribution-free sense
                 unless R $=$ NP. These classes include (a) disjunctions
                 of two monomials, (b) Boolean threshold functions, and
                 (c) Boolean formulas in which each variable occurs at
                 most once. Relationships between learning of heuristics
                 and finding approximate solutions to NP-hard
                 optimization problems are given.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Urbana, IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Was Harvard University TR 6 in 1986.",
  classification = "723; 921",
  comment =      "It is NP-Complete to learn disjunction of two
                 monomials, Boolean threshold functions, Boolean
                 formulae where each variable occurs at most once.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Artificial Intelligence; Boolean formulas; Boolean
                 Threshold Functions; Computational Complexity; Computer
                 Metatheory; Disjunctions of two monomials;
                 experimentation; Learning from Examples; np-hard
                 Optimization Problems; Optimization; Systems Science
                 and Cybernetics --- Learning Systems; theory;
                 verification",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Relations
                 among models. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Probabilistic computation. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Reducibility and completeness. {\bf
                 I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Concept learning. {\bf I.2.6}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Learning, Induction.",
}

@Article{Seiferas:1988:CE,
  author =       "Joel I. Seiferas and Paul M. B. Vit{\'{a}}nyi",
  title =        "Counting Is Easy",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "985--1000",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/63141.html",
  abstract =     "It is proved that for any fixed $k$,a remarkably
                 simple single-tape Turning machine can simulate $k$
                 independent counters in real time.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Rochester, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Automata Theory; Computer Simulation;
                 Counter Machines; design; Multicounter Machines;
                 Simulation between Models; Single-Tape Turning Machine;
                 theory; Turing Machines; verification",
  subject =      "{\bf E.2}: Data, DATA STORAGE REPRESENTATIONS,
                 Contiguous representations. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Relations among models. {\bf F.1.1}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Models of Computation, Bounded-action devices. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sequencing and scheduling. {\bf F.2.3}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Tradeoffs among Complexity
                 Measures. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Combinatorial
                 algorithms.",
}

@Article{Collings:1988:AIG,
  author =       "Bruce Jay Collings and G. Barry Hembree",
  title =        "Addendum to ``Initializing Generalized Feedback Shift
                 Register Pseudorandom Number Generators''",
  journal =      j-J-ACM,
  volume =       "35",
  number =       "4",
  pages =        "1001--1001",
  month =        oct,
  year =         "1988",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Oct 21 23:55:47 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Collings:1986:IGF}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Muller:1989:IMD,
  author =       "John H. Muller and Jeremy Spinrad",
  title =        "Incremental Modular Decomposition",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "1--19",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/59300.html",
  abstract =     "Modular decomposition is a form of graph decomposition
                 that has been discovered independently by researchers
                 in graph theory, game theory, network theory, and other
                 areas. This paper reduces the time needed to find the
                 modular decomposition of a graph from $\Omega(n^3)$ to
                 $O(n + 2)$. Together with a new algorithm for
                 transitive orientation given by J. Spinrad, this leads
                 to fast new algorithms for a number of problems in
                 graph recognition and isomorphism, including
                 recognition of comparability graphs and permutation
                 graphs. The new algorithm works by inserting each
                 vertex successively into the decomposition tree, using
                 $O(n)$ time to insert each vertex.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Atlanta, GA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Combinatorics and Graph Theory;
                 Comparability Graphs; Computer Programming ---
                 Algorithms; Graph Decomposition; Graph Isomorphism;
                 Graph Recognition; Graph Theory; Mathematical
                 Techniques; Modular Decomposition; modular
                 decomposition; Permutation Graphs; substitution
                 decomposition; theory; Verification; X-join",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms.",
}

@Article{Brzozowski:1989:UFR,
  author =       "J. A. Brzozowski and C.-J. Seger",
  title =        "A Unified Framework for Race Analysis of Asynchronous
                 Networks",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "20--45",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/58562.59301",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/59301.html",
  abstract =     "A unified framework is developed for the study of
                 asynchronous circuits of both gate and MOS type. A
                 basic network model consisting of a directed graph and
                 a set of vertex excitation functions is introduced. A
                 race analysis model, using three values ($0$, $1$, and
                 $\times$), is developed for studying state transitions
                 in the network. It is shown that the results obtained
                 using this model are equivalent to those using ternary
                 simulation. It is also proved that the set of state
                 variables can be reduced to a minimum size set of
                 feedback variables, and the analysis still yields both
                 the correct state transitions and output hazard
                 information. Finally, it is shown how the general
                 results above are applicable to both gate and MOS
                 circuits.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Waterloo, Ont, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "714; 721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; asynchronous circuits; Asynchronous
                 Networks; Computer Simulation; Computer Systems;
                 design; Directed Graphs; Gate Circuits; Hazards and
                 Race Conditions; Logic Design; Logic Devices --- Gates;
                 Mathematical Techniques --- Graph Theory; MOS Circuits;
                 Race Analysis; races; Semiconductor Devices, MOS;
                 switch-level models; Switching Theory; ternary
                 simulation; theory; verification; Vertex Excitation
                 Functions",
  subject =      "{\bf B.6.3}: Hardware, LOGIC DESIGN, Design Aids,
                 Simulation. {\bf B.6.3}: Hardware, LOGIC DESIGN, Design
                 Aids, Switching theory. {\bf B.7.1}: Hardware,
                 INTEGRATED CIRCUITS, Types and Design Styles. {\bf
                 B.7.2}: Hardware, INTEGRATED CIRCUITS, Design Aids,
                 Simulation.",
}

@Article{McCune:1989:MSC,
  author =       "William W. McCune and Lawrence J. Henschen",
  title =        "Maintaining State Constraints in Relational Databases:
                 {A} Proof Theoretic Basis",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "46--68",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "An early version appears as Argonne National
                 Laboratory Tech. Memo ANL/MCS-TM-94, 1987",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/59302.html",
  abstract =     "If a relational database is required to satisfy a set
                 of integrity constraints, then when the database is
                 updated, one must ensure it continues to satisfy the
                 constraints. It is desirable not to have to evaluate
                 each constraint after each update. A method is
                 described that takes a constraint C and a class of
                 updates, and either proves that an update in the class
                 cannot violate C, or produces a formula C\$PRM (a
                 complete test) that is satisfied before the update if
                 and only if C would continue to be satisfied were the
                 update to occur. C\$PRM is frequently much easier to
                 evaluate than C. In addition, a formula $D$ (a
                 sufficient test) is sometimes produced such that if $D$
                 is satisfied before the update, then C would continue
                 to be satisfied were the update to occur. The method is
                 proved correct. The method is substantially more
                 general than other reported techniques for this
                 problem. The method has been implemented, and a number
                 of experiments with the implementation are presented.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Argonne, IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Concurrency under consistency constraints; examples of
                 implementation; updates from 0.5 seconds to almost 10
                 minutes; strong theoretical basis for future work;
                 automatic theorem proving.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Automated Theorem Proving; automated
                 theorem proving; Database Systems; Database Theory;
                 Database Updates; dependency statement; First Order
                 Logic; first-order logic; Integrity Constraints;
                 integrity constraints; Relational; relational
                 databases; Reliability; Skolemizing; State Constraints;
                 theory; verification",
  subject =      "{\bf H.2.0}: Information Systems, DATABASE MANAGEMENT,
                 General. {\bf H.3.3}: Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Information Search and
                 Retrieval, Query formulation. {\bf I.1.1}: Computing
                 Methodologies, ALGEBRAIC MANIPULATION, Expressions and
                 Their Representation, Simplification of expressions.
                 {\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Answer/reason extraction. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic.",
}

@Article{Naughton:1989:MFF,
  author =       "Jeffrey F. Naughton",
  title =        "Minimizing Function-Free Recursive Inference Rules",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "69--91",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/59303.html",
  abstract =     "Recursive inference rules arise in recursive
                 definitions in logic programming systems and in
                 database systems with recursive query languages. Let D
                 be a recursive definition of a relation $t$. $D$ is
                 considered minimal if for any predicate p in a
                 recursive rule in $D$, $p$ must appear in a recursive
                 rule in any definition of $t$. It is shown that testing
                 for minimality is, in general, undecidable. However, an
                 efficient algorithm for a useful class of recursive
                 rules is presented, and it is used to transform a
                 recursive definition to a minimal recursive definition.
                 Evaluating the minimized definition avoids redundant
                 computation without the overhead of caching
                 intermediate results and run-time checking for
                 duplicate goals.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Computer Programming --- Algorithms;
                 Database Systems; Database Theory; deductive database;
                 knowledge-base; languages; Logic Programming;
                 Mathematical Techniques --- Graph Theory; optimization
                 of recursion; Query Languages; Recursive Inference
                 Rules; Recursive Query Languages; theory;
                 Verification",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Logic
                 programming. {\bf H.2.3}: Information Systems, DATABASE
                 MANAGEMENT, Languages, Query languages. {\bf F.4.1}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic, Recursive function
                 theory.",
}

@Article{Dill:1989:CES,
  author =       "Jens M. Dill",
  title =        "A Counter-Example for ``{A} Simpler Construction for
                 Showing the Intrinsically Exponential Complexity of the
                 Circularity Problem for Attribute Grammars''",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "92--96",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Jazayeri:1981:SCS}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77393.html",
  abstract =     "M. Jazayeri proposes a simpler construction for use in
                 the proof by M. Jazayeri et al. that the circularity
                 problem for attribute grammars has inherent exponential
                 time complexity. The simplification introduces a flaw
                 that invalidates the proof. The flaw can be corrected,
                 at the cost of eliminating some of the simplification
                 claimed for the new construction.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Ithaca, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; alternating Turing machines; attribute
                 grammar; Attribute Grammars; Automata Theory; circ;
                 Circularity Problem; circularity problem; Computational
                 Complexity; computational complexity; Computer
                 Metatheory; exponential time; Exponential Time
                 Complexity; Formal Languages; Grammars; languages;
                 performance; theory",
  note2 =        "Titre explicite. La construction de Jazayeri
                 s'ecroule, mais celle de [JOR 75] reste valide et, en
                 outre, plus parlante. (mj)",
  subject =      "{\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems. {\bf F.4.2}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Grammars and Other Rewriting Systems.",
}

@Article{Helman:1989:CSD,
  author =       "Paul Helman",
  title =        "A Common Schema for Dynamic Programming and Branch and
                 Bound Algorithms",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "97--128",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/59304.html",
  abstract =     "A new model for dynamic programming and branch and
                 bound algorithms is presented. The model views these
                 algorithms as utilizing computationally feasible
                 dominance relations to infer the orderings of
                 application objects, thereby implicitly enumerating a
                 finite solution space. The formalism is broad enough to
                 apply the computational strategies of dynamic
                 programming and branch and bound to problems with
                 nonassociative objects, and can model both oblivious
                 and nonoblivious algorithms, as well as parallel
                 algorithms. The model is used to classify computations
                 based, in part, on the types of computationally
                 feasible dominances that they employ. It is
                 demonstrated that the model is computationally precise
                 to support the derivation of lower bounds on the number
                 of operations required to solve various types of
                 problems.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Albuquerque, NM, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Branch and Bound Algorithms;
                 branch-and-bound; combinatorial optimization;
                 complexity analysis; Computational Complexity; Computer
                 Programming --- Algorithms; Computer Systems, Digital
                 --- Parallel Processing; Dominance Relations; dynamic
                 programming; formal models of algorithms; Lower Bounds;
                 Mathematical Programming, Dynamic; Operations Research;
                 Parallel Algorithms; parallel algorithms; search
                 strategies; theory; verification",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Dynamic programming. {\bf G.2.1}: Mathematics
                 of Computing, DISCRETE MATHEMATICS, Combinatorics,
                 Combinatorial algorithms. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures.",
}

@Article{Boyar:1989:ISP,
  author =       "Joan Boyar",
  title =        "Inferring Sequences Produced by Pseudo-Random Number
                 Generators",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "129--141",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/58562.59305",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/59305.html;
                 http://www.imada.sdu.dk/~joan/",
  abstract =     "In this paper, efficient algorithms are given for
                 inferring sequences produced by pseudo-random number
                 generators of a certain form. Using this general
                 method, specific examples of generators having this
                 form, the linear congruential method, linear
                 congruences with $n$ terms in the recurrence, and
                 quadratic congruences are shown to be cryptographically
                 insecure.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Chicago, IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Computer Programming --- Algorithms;
                 Cryptography; cryptography; inductive inference; linear
                 congruential method; Mathematical Statistics;
                 Pseudorandom Number Generators; Random Number
                 Generation; security; Sequence Inferring Algorithms;
                 Theory of Computation",
  remark =       "Early publications, including 1983 Berkeley Ph.D.
                 dissertation, as Joan B. Plumstead.",
  subject =      "{\bf E.3}: Data, DATA ENCRYPTION. {\bf F.2.1}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Numerical Algorithms and Problems. {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation.",
}

@Article{Kaminski:1989:NPV,
  author =       "Michael Kaminski",
  title =        "A Note on Probabilistically Verifying Integer and
                 Polynomial Products",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "142--149",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "The author describes probabilistic algorithms for
                 verifying the product of two $n$-bit integers in $O(n)$
                 bit operations, and for verifying the product of two
                 polynomials of degree $n$ over integral domains in
                 $4n+o(n)$ algebraic operations. The error probability
                 is $o(\frac{1}{n^{1-\epsilon}})$ for any
                 $\epsilon>0$.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214082.html",
  abstract =     "Probabilistic algorithms are presented for testing the
                 result of the product of two $n$-bit integers in $O(n)$
                 bit operations and for testing the result of the
                 product of two polynomials of degree $n$ over any
                 integral domain in $4 n + o(n)$ algebraic operations
                 with the error probability $o(1 / n + 1 MIN \epsilon)$
                 for any $\epsilon > 0$. The last algorithm does not
                 depend on the constants of the underlying domain.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Haifa, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; Computer Programming;
                 Cyclotomic Polynomials; cyclotomic polynomials; Integer
                 Products; Mathematical Techniques --- Polynomials;
                 polynomial and integer multiplication; Polynomial
                 Products; Probabilistic Algorithms; probabilistic
                 algorithms; Symbolic Algebra; theory; verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations on polynomials. {\bf F.2.1}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Numerical Algorithms and Problems,
                 Number-theoretic computations.",
}

@Article{Kaminski:1989:MCP,
  author =       "Michael Kaminski and Nader H. Bshouty",
  title =        "Multiplicative Complexity of Polynomial Multiplication
                 over Finite Fields",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "150--170",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/59306.html",
  abstract =     "Let $M_q(n)$ denote the number of multiplications
                 required to compute the coefficients of the product of
                 two polynomials of degree $n$ over a $q$-element field
                 by means of bilinear algorithms. It is shown that
                 $M_q(n) \geq 3n - o(n)$. In particular, if $q / 2 < n
                 \leq q + 1$, we establish a tight bound for
                 $M_q(n)$. The technique we use can be applied to
                 analysis of algorithms for multiplication of
                 polynomials modulo a polynomial as well.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Haifa, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; Bilinear Algorithms; bilinear
                 algorithms; Computer Programming; Finite Fields; Hankel
                 matrices; Linear Recurring Sequences; linear recurring
                 sequences; Mathematical Techniques --- Polynomials;
                 Multiplicative Complexity; Polynomial Multiplication;
                 polynomial multiplication; Symbolic Algebra; theory;
                 verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations in finite fields. {\bf
                 F.2.1}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Numerical Algorithms and
                 Problems, Computations on polynomials.",
}

@Article{deSouzaeSilva:1989:CAP,
  author =       "Edmundo {de Souza e Silva} and H. Richard Gail",
  title =        "Calculating Availability and Performability Measures
                 of Repairable Computer Systems Using Randomization",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "171--193",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Repairable computer systems are considered, the
                 availability behavior of which can be modeled as a
                 homogeneous Markov process. The randomization method is
                 used to calculate various measures over a finite
                 observation period related to availability modeling of
                 these systems. These measures include the distribution
                 of the number of events of a certain type, the
                 distribution of the length of time in a set of states,
                 and the probability of a near-coincident fault. The
                 method is then extended to calculate performability
                 distributions. The method relies on coloring
                 subintervals of the finite observation period based on
                 the particular application, and then calculating the
                 measure of interest using these colored intervals.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Rio de Janeiro, Braz",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; Availability; Computer Systems, Digital;
                 Markov reward models; near coincident faults;
                 performability distribution; Performance; Performance
                 Measures; performance/reliability measures; Probability
                 --- Random Processes; randomization technique;
                 Reliability; Reliability Measures; Repairable Computer
                 Systems; System Modeling and Analysis; transient
                 analysis",
}

@Article{deSouzaeSilva:1989:CJQ,
  author =       "Edmundo {de Souza e Silva} and S. S. Lavenberg",
  title =        "Calculating Joint Queue-Length Distributions in
                 Product-Form Queuing Networks",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "194--207",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A new computational algorithm called distribution
                 analysis by chain (DAC) is developed. This algorithm
                 computes joint queue-length distributions for
                 product-form queuing networks with single-server fixed
                 rate, infinite server, and queue-dependent service
                 centers. Joint distributions are essential in problems
                 such as the calculation of availability measures using
                 queuing network models. The algorithm is efficient
                 since the cost to evaluate joint queue-length
                 probabilities is of the same order as the number of
                 these probabilities. This contrast with the cost of
                 evaluating these probabilities using previous
                 algorithms. The DAC algorithm also computes mean queue
                 lengths and throughputs more efficiently than the
                 recently proposed RECAL and MVAC algorithms.
                 Furthermore, the algorithm is numerically stable and
                 its recursion is surprisingly simple.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Rio de Janeiro, Braz",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  descriptors =  "Queueing network; product form; analysis",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; availability modeling; computational
                 algorithm; Computer Programming --- Algorithms; Joint
                 Queue Length Distributions; MVAC Algorithm;
                 Performance; Probability; queueing network; Queueing
                 Networks; Queueing Theory; RECAL Algorithm;
                 Reliability; System Modeling and Analysis;
                 Verification",
}

@Article{Hobby:1989:RCC,
  author =       "John D. Hobby",
  title =        "Rasterizing Curves of Constant Width",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "2",
  pages =        "209--229",
  month =        apr,
  year =         "1989",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/138027.138040",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62045.html",
  abstract =     "This paper gives a fast, linear-time algorithm for
                 generating high-quality pixel representations of curved
                 lines. The results are similar to what is achieved by
                 selecting a circle whose diameter is the desired line
                 width, and turning on all pixels covered by the circle
                 as it moves along the desired curve. However, the
                 circle is replaced by a carefully chosen polygon whose
                 deviations from the circle represent subpixel
                 corrections designed to improve the aesthetic qualities
                 of the rasterized curve. For nonsquare pixels, equally
                 good results are obtained when an ellipse is used in
                 place of the circle. The class of polygons involved is
                 introduced, an algorithm for generating them is given,
                 and how to construct the set of pixels covered when
                 such a polygon moves along a curve is shown. The
                 results are analyzed in terms of a mathematical model
                 for the uniformity and accuracy of line width in the
                 rasterized image.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Murray Hill, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Computational Geometry; Computer Graphics;
                 Computer Programming --- Algorithms; Curve Generation;
                 curve generation; Curve Rasterization; image
                 approximation; Mathematical Models; Mathematical
                 Techniques --- Geometry; Scan Conversion; scan
                 conversion; Verification",
  subject =      "{\bf I.3.3}: Computing Methodologies, COMPUTER
                 GRAPHICS, Picture/Image Generation, Display algorithms.
                 {\bf I.3.5}: Computing Methodologies, COMPUTER
                 GRAPHICS, Computational Geometry and Object Modeling,
                 Curve, surface, solid, and object representations.",
}

@Article{Beeri:1989:MCN,
  author =       "Catriel Beeri and Philip A. Bernstein and Nathan
                 Goodman",
  title =        "A Model for Concurrency in Nested Transaction
                 Systems",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "2",
  pages =        "230--269",
  month =        apr,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62046.html",
  abstract =     "A model for database concurrency control permits
                 nested transactions. In this model, transactions may
                 execute subtransactions, giving rise to tree-structured
                 computations. A serializability theory is developed for
                 this model, which can be used to prove the correctness
                 of concurrency control algorithms for nested
                 transactions and for multilevel database systems. The
                 theory is based on an abstract model of computation
                 that allows arbitrary operations and parallel and even
                 nondeterministic programs. Axioms are presented that
                 express the basic properties that programs that manage
                 or access data need to satisfy and are used to derive
                 proof techniques. The proof techniques are illustrated
                 by applying them to several well-known concurrency
                 control problems.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Jerusalem, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A serializability theory for nested transactions and
                 for multi-level database systems.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computational forest; Computer Programming
                 --- Algorithms; Concurrency Control; concurrency
                 control; Concurrency Models; Correctness; Data
                 Management; Database Systems; Database Theory; design;
                 Distributed; Mathematical Techniques --- Graph Theory;
                 nested transactions; Nested Transactions Systems;
                 Serializability; serializability; theory;
                 verification",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Transaction processing. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Concurrency. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf H.2.2}:
                 Information Systems, DATABASE MANAGEMENT, Physical
                 Design, Deadlock avoidance.",
}

@Article{Cunto:1989:ACS,
  author =       "Walter Cunto and J. Ian Munro",
  title =        "Average Case Selection",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "2",
  pages =        "270--279",
  month =        apr,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62047.html",
  abstract =     "It is shown that $n + $k$ - {O}(1)$ comparisons are
                 necessary, on average, to find the $k$th smallest of
                 $n$ numbers ($k\leq n/2$). This lower bound matches the
                 behavior of the technique of Floyd and Rivest to within
                 a lower-order term. $7 n / 4 \pm o(n)$ comparisons, on
                 average, are shown to be necessary and sufficient to
                 find the maximum and median of a set. An upper bound of
                 $9n/4 + o(n)$ and a lower bound of $2n - o(n)$ are
                 shown for the max-min-median problem.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Caracas, Venez",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; average case; Average Case
                 Selection; Computer Programming; Computer Systems
                 Programming --- Sorting; Data Structures and
                 Algorithms; Lower Bounds; lower bounds; median;
                 Probabilistic Algorithms; Sampling; selection;
                 Selection Algorithms; theory; Upper Bounds;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo).",
}

@Article{Klein:1989:PLB,
  author =       "Rolf Klein and Derick Wood",
  title =        "On the Path Length of Binary Trees",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "2",
  pages =        "280--289",
  month =        apr,
  year =         "1989",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/62044.62048",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62048.html",
  abstract =     "The authors show that the external path length of a
                 binary tree is closely related to the ratios of means
                 of certain integers and establish the upper
                 bound\par

                 $${\rm External Path Length} \leq N(\log_2o N + \Delta
                 - \log_2 \Delta - 0.6623),$$\par

                 \noindent where $N$ denotes the number of external
                 nodes in the tree and $\Delta$ is the difference in
                 length between a longest and a shortest path. Then it
                 is proved that this bound is tight up to an $O(N)$ term
                 if $\Delta \leq \sqrt N$. If $\Delta > \sqrt N$, the
                 authors construct binary trees whose external path
                 length is at least as large as $N(\log_2 N + \phi(N,
                 \Delta) \Delta - \log_2 \Delta - 4)$, where $\phi(N,
                 \Delta) = 1 / (1 + 2 (\Delta / N))$.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Freiburg, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; binary search tree; Binary Trees;
                 comparison cost; Data Processing --- Data Structures;
                 Data Structures and Algorithms; External Path Length;
                 fringe thickness; Mathematical Techniques; node visit
                 cost; path length; performance; ratio of means; theory;
                 Trees; Upper Bounds; upper bounds; Verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 E.1}: Data, DATA STRUCTURES, Trees.",
}

@Article{Manacher:1989:OCS,
  author =       "G. K. Manacher and T. D. Bui and T. Mai",
  title =        "Optimum Combinations of Sorting and Merging",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "2",
  pages =        "290--334",
  month =        apr,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62049.html",
  abstract =     "G. K. Manacher showed that the Ford-Johnson sorting
                 algorithm (FJA), acting on t real numbers, can be
                 beaten for an infinite set of values $t$. These values
                 form a partial cover of constant density not close to 1
                 over an initial sequence of each band. It is shown here
                 that the FJA can be beaten for a set of integers of
                 asymptotic density 1 under greatly weakened
                 assumptions. All the results depend on a new technique
                 for obtaining optimum sort-merge sequences for
                 best-possible sorting given a merging method. The
                 technique turns out to be amenable to precise
                 asymptotic analysis. When the technique is applied
                 using the most powerful known merging algorithm, the
                 density mentioned above is still 1, but islands of
                 refractory points still remain.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Chicago, IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Computer Programming --- Algorithms;
                 Computer Systems Programming; Data Structures and
                 Algorithms; design; Ford-Johnson algorithm; Merging
                 Algorithms; optimum combinations; optimum sort and
                 merge; Sorting; Sorting Algorithms; theory;
                 verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics.",
}

@Article{Rabin:1989:EDI,
  author =       "Michael O. Rabin",
  title =        "Efficient Dispersal of Information for Security, Load
                 Balancing, and Fault Tolerance",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "2",
  pages =        "335--348",
  month =        apr,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62050.html",
  abstract =     "An information dispersal algorithm (IDA) is developed
                 that breaks a file $F$ of length $L = |F|$ into $n$
                 pieces $F_i$, $1 \leq i \leq n$, each of length
                 |F${}_i$| $=$ L/m, so that all $m$ pieces suffice for
                 reconstructing $F$. Dispersal and reconstruction are
                 computationally efficient. The sum of the lengths
                 $|F_i|$ is $(n / m) \cdot L$. Since $n / m$ can be
                 chosen to be close to $1$, the IDA is space efficient.
                 IDA has numerous applications to secure and reliable
                 storage of information in computer networks and even on
                 single disks, to fault-tolerant and efficient
                 transmission of information in networks, and to
                 communications between processors in parallel
                 computers. For the latter problem provably
                 time-efficient and highly fault-tolerant routing on the
                 $n$-cube is achieved, using just constant size
                 buffers.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cambridge, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Codes, Symbolic --- Encoding; Computer
                 Fault Tolerance; Computer Programming --- Algorithms;
                 Computer Security; Computer Systems, Digital; design;
                 Distributed; Distributed Computing; fault tolerance;
                 Information Dispersal Algorithm; Load Balancing;
                 parallel computers; performance; reliability; routing
                 of data; security; storage of data; theory;
                 Verification",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection. {\bf E.4}: Data, CODING AND INFORMATION
                 THEORY. {\bf E.3}: Data, DATA ENCRYPTION. {\bf D.4.3}:
                 Software, OPERATING SYSTEMS, File Systems Management,
                 Distributed file systems. {\bf D.4.5}: Software,
                 OPERATING SYSTEMS, Reliability, Fault-tolerance. {\bf
                 D.4.6}: Software, OPERATING SYSTEMS, Security and
                 Protection. {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Routing and layout.",
}

@Article{Rosenthal:1989:GAC,
  author =       "Arnon Rosenthal and Jos{\'e} A. Pino",
  title =        "A Generalized Algorithm for Centrality Problems on
                 Trees",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "2",
  pages =        "349--361",
  month =        apr,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62051.html",
  abstract =     "A general framework is presented for rapidly analyzing
                 tree networks to compute a measure of the centrality or
                 eccentricity of all vertices in the tree. Several
                 problems, which have been previously described in the
                 literature, fit this framework. Some of these problems
                 have no published solution better than performing a
                 separate traversal for each vertex whose eccentricity
                 is calculated. The method presented in this paper
                 performs just two traversals and yields the
                 eccentricities of all vertices in the tree. Natural
                 sufficient conditions for the algorithm to work in
                 linear time on any given problem are stated.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cambridge, MA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 912; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "$r$-domination problem; algorithms; Algorithms;
                 center; Centrality Problems; centralized network;
                 centroid; Computer Programming; eccentricity;
                 Eccentricity; facility location; generalized algorithm;
                 linear time; Lossy network; Mathematical Techniques ---
                 Trees; Operations Research; Optimization; Tree
                 Networks; tree traversal; uninterpolated function;
                 Verification",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Trees. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms.",
}

@Article{Bilardi:1989:STC,
  author =       "G. Bilardi and F. P. Preparata",
  title =        "Size-Time Complexity of {Boolean} Networks for Prefix
                 Computations",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "2",
  pages =        "362--382",
  month =        apr,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62052.html",
  abstract =     "The prefix problem consists of computing all the
                 products x${}_0$x${}_1$\ldots{}x${}_j$(j $=$ 0,
                 \ldots{},N-@1), given a sequence x $=$
                 (x${}_0$,x${}_1$, \ldots{},x\$-N-@1\$/) of elements in
                 a semigroup. In this paper we completely characterize
                 the size-time complexity of computing prefixes with
                 Boolean networks, which are synchronized
                 interconnections of Boolean gates and one-bit storage
                 devices. This complexity crucially depends upon two
                 properties of the underlying semigroup, which we call
                 cycle-freedom (no cycle of length greater than one in
                 the Cayley graph of the semigroup) and
                 memory-induciveness (arbitrarily long products of
                 semigroup elements are true functions of all their
                 factors). A nontrivial characterization is given of
                 non-memory-inducive semigroups. The results are
                 extended to the VLSI model of computation. Area-time
                 optimal circuits are obtained for both boundary and
                 nonboundary I/O protocols.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Ithaca, NY, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "714; 721; 723",
  comment =      "A complete time --- space characterization is given
                 for the prefix problem using the circuit model.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Boolean networks; Boolean Networks;
                 Computational Complexity; Computer Metatheory;
                 Integrated Circuits, VLSI; Logic Circuits; parallel
                 computation; prefix computation; Prefix Computations;
                 Semigroups; semigroups; size-time trade-offs; theory;
                 Theory of Computation",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Bounded-action
                 devices. {\bf F.2.3}: Theory of Computation, ANALYSIS
                 OF ALGORITHMS AND PROBLEM COMPLEXITY, Tradeoffs among
                 Complexity Measures. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf F.1.2}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation, Parallelism and concurrency.",
}

@Article{Pitt:1989:PII,
  author =       "L. Pitt",
  title =        "Probabilistic Inductive Inference",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "2",
  pages =        "383--433",
  month =        apr,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Inductive inference machines construct total recursive
                 functions $\phi(x)$ given examples of the input and
                 output of $\phi$. Probabilistic inductive inference
                 machines are permitted coin tosses while constructing
                 $\phi$, and are only required to construct $\phi$ with
                 probability $p$, $0 < p < 1$. This paper shows a
                 discrete hierarchy of inferability parameterized by
                 $p$, for $p \leq 1/2$. Any machine that can be
                 constructed by probabilistic inference with $p > 1/2$
                 can also be constructed deterministically.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62053.html",
  abstract =     "Inductive inference machines construct programs for
                 total recursive functions given only example values of
                 the functions. Probabilistic inductive inference
                 machines are defined, and for various criteria of
                 successful inference, it is asked whether a
                 probabilistic inductive inference machine can infer
                 larger classes of functions if the inference criterion
                 is relaxed to allow inference with probability at least
                 $p$, ($0 < p < 1$) as opposed to requiring certainty.
                 For the most basic criteria of success (EX and BC), it
                 is shown that any class of functions that can be
                 inferred from examples with probability exceeding \$HLF
                 can be inferred deterministically, and that for
                 probabilities $p \leq 1/2$ there is a discrete
                 hierarchy of inferability parameterized by $p$. The
                 power of probabilistic inference strategies is
                 characterized by equating the classes of
                 probabilistically inferable functions with those
                 classes that can be inferred by teams of inductive
                 inference machines (a parallel model of inference), or
                 by a third model called frequency inference.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Urbana, IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Artificial Intelligence; Computer
                 Metatheory; Computer Systems, Digital --- Parallel
                 Processing; Inductive Inference; inductive inference;
                 Probability; Program Synthesis; theory; Theory of
                 Computation",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Probabilistic
                 computation. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Mathematical induction. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Recursive function theory. {\bf
                 I.2.2}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Automatic Programming, Program synthesis.
                 {\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Induction.",
}

@Article{Gabor:1989:RCG,
  author =       "Csaba P. Gabor and Kenneth J. Supowit and Wen-Lian
                 Hsu",
  title =        "Recognizing Circle Graphs in Polynomial Time",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "435--473",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65951.html",
  abstract =     "The main result of this paper is an $O(|V| \times
                 |E|)$ time algorithm for deciding whether a given graph
                 is a circle graph, that is, the intersection graph of a
                 set of chords on a circle. The algorithm utilizes two
                 new graph-theoretic results, regarding necessary
                 induced subgraphs of graphs having neither articulation
                 points nor similar pairs of vertices. Furthermore, as a
                 substep of the algorithm, it is shown how to find in
                 $O(|V| \times |E|)$ time a decomposition of a graph
                 into prime graphs, thereby improving on a result of W.
                 H. Cunningham.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Princeton, NJ, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; circle graph; Circle Graphs; Combinatorics
                 and Graph Theory; Computer Programming --- Algorithms;
                 Graph Decomposition; graph decomposition; Graph Theory;
                 induced subgraph; intersection graph; Mathematical
                 Techniques; Polynomial Time Algorithms; polynomial-time
                 algorithms; theory; verification",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms.",
}

@Article{Lengauer:1989:HPT,
  author =       "Thomas Lengauer",
  title =        "Hierarchical Planarity Testing Algorithms",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "474--509",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65952.html",
  abstract =     "Using hierarchical definitions, one can describe very
                 large graphs in small space. The blow-up from the
                 length of the hierarchical description to the size of
                 the graph can be as large as exponential. If the
                 efficiency of graph algorithms is measured in terms of
                 the length of the hierarchical description rather than
                 in terms of the graph size, algorithms that do not
                 exploit the hierarchy become hopelessly inefficient.
                 Whether the hierarchy can be exploited to speed up the
                 solution of graph problems depends on the hierarchical
                 graph model. In this paper, a hierarchical graph model
                 that permits taking advantage of the hierarchy is
                 presented. For this model algorithms are given that
                 test planarity of a hierarchically described graph in
                 linear time in the length of the hierarchical
                 description.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Paderborn, West Ger",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Combinatorics and Graph Theory; Computer
                 Programming --- Algorithms; Graph Theory; Hierarchical
                 Graph Algorithms; hierarchical graph algorithms;
                 Hierarchical Planarity Testing Algorithms; Mathematical
                 Techniques; performance; planarity; Verification",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures.",
}

@Article{Peleg:1989:TBS,
  author =       "David Peleg and Eli Upfal",
  title =        "A Trade-Off between Space and Efficiency for Routing
                 Tables",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "510--530",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65953.html",
  abstract =     "Two conflicting goals play a crucial role in the
                 design of routing schemes for communication networks. A
                 routing scheme should use paths that are as short as
                 possible for routing messages in the network, while
                 keeping the routing information stored in the
                 processors' local memory as succinct as possible. The
                 efficiency of a routing scheme is measured in terms of
                 its stretch factor --- the maximum ratio between the
                 length of a route computed by the scheme and that of a
                 shortest path connecting the same pair of vertices.
                 Most previous work has concentrated on finding good
                 routing schemes (with a small fixed stretch factor) for
                 special classes of network topologies. In this paper
                 the problem for general networks is studied, and the
                 entire range of possible stretch factors is examined.
                 The results exhibit a trade-off between the efficiency
                 of a routing scheme and its space requirements. Almost
                 tight upper and lower bounds for this trade-off are
                 presented.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Stanford, CA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Computer Networks; Computer Systems;
                 design; Hierarchical Routing; hierarchical routing;
                 lower bound; Lower Bounds; Mathematical Techniques ---
                 Graph Theory; performance; Random Graphs; random
                 graphs; routing schemes; Routing Tables; routing
                 tables; stretch factor; theory; Verification",
  subject =      "{\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network communications. {\bf F.2.2}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Routing and layout. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory. {\bf
                 C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network topology.",
}

@Article{Pippenger:1989:ICM,
  author =       "Nicholas Pippenger",
  title =        "Invariance of Complexity Measures for Networks with
                 Unreliable Gates",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "531--539",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77248.html",
  abstract =     "A new probabilistic failure model for networks of
                 gates is formulated. Although this model has not been
                 used previously, it supports the proofs of both the
                 positive and negative results appearing in the
                 literature. Furthermore, with respect to this new
                 model, the complexity measures of both size and depth
                 are affected by at most constant multiplicative factors
                 when the set of functions that can be computed by gates
                 is changed from one finite and complete basis to
                 another, or when the bound on the failure probability
                 of the gates is changed (within the limits allowed by
                 the basis), or when the bound on the error probability
                 of the network is changed (within the limits allowed by
                 the basis and the failure probability of the gates).",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Vancouver, BC, Can",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "721; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Complexity Measures; Computer Metatheory --- Boolean
                 Functions; Computer Systems; design; Error Probability;
                 Logic Design; Logic Devices --- Gates; reliability;
                 self-correcting networks; size and depth; theory;
                 Unreliable Gates; verification",
  subject =      "{\bf B.6.2}: Hardware, LOGIC DESIGN, Reliability and
                 Testing, Error-checking. {\bf B.6.2}: Hardware, LOGIC
                 DESIGN, Reliability and Testing, Redundant design. {\bf
                 B.6.1}: Hardware, LOGIC DESIGN, Design Styles, Cellular
                 arrays and automata. {\bf B.6.3}: Hardware, LOGIC
                 DESIGN, Design Aids. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity
                 measures.",
}

@Article{Gabow:1989:EIG,
  author =       "Harold N. Gabow and Zvi Galil and Thomas H. Spencer",
  title =        "Efficient Implementation of Graph Algorithms Using
                 Contraction",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "540--572",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65954.html",
  abstract =     "The (component) merging problem is a new graph
                 problem. Versions of this problem appear as bottlenecks
                 in various graph algorithms. A new data structure
                 solves this problem efficiently, and two special cases
                 of the problem have even more efficient solutions based
                 on other data structures. The performance of the data
                 structures is sped up by introducing a new algorithmic
                 tool called packets. The algorithms that use these
                 solutions to the component merging problem also exploit
                 new properties of two existing data
                 structures. Specifically, $B$-trees can be used
                 simultaneously as a priority queue and a concatenable
                 queue. Similarly, $F$-heaps support some kinds of split
                 operations with no loss of efficiency. An immediate
                 application of the solution to the simplest version of
                 the merging problem is an $O(t(m, n))$ algorithm for
                 finding minimum spanning trees in undirected graphs
                 without using $F$-heaps.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Boulder, CO, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; amortization; Component
                 Merging Problem; Computer Programming; Data Processing
                 --- Data Structures; Data Structures and Algorithms;
                 Graph Algorithms; matching in graphs; Mathematical
                 Techniques --- Graph Theory; Minimum Spanning Trees;
                 minimum spanning trees; priority queue; theory;
                 Undirected Graphs; Verification; worst-case bound",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf E.1}:
                 Data, DATA STRUCTURES, Graphs. {\bf E.1}: Data, DATA
                 STRUCTURES, Trees.",
}

@Article{Kapoor:1989:OLB,
  author =       "Sanjiv Kapoor and Edward M. Reingold",
  title =        "Optimum Lopsided Binary Trees",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "573--590",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/65950.65955",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65955.html",
  abstract =     "Binary search trees with costs $\alpha$ and $\beta$,
                 respectively, on the left and right edges (lopsided
                 search trees) are considered. The exact shape, minimum
                 worst-case cost, and minimum average cost of lopsided
                 trees of $n$ internal nodes are determined for
                 nonnegative $\alpha$ and $\beta$; the costs are both
                 roughly $\log_\rho (n + 1)$ where $\rho$ is the unique
                 real number in the interval $(1, 2]$ satisfying $1 /
                 \rho^\alpha / + 1 / \rho^\beta = 1$. Search procedures
                 are given that come within a small additive constant of
                 the lower bounds. Almost-optimum algorithms for the
                 lopsided case of unbounded searching are also obtained.
                 Some extensions to nonconstant costs are briefly
                 sketched.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Urbana, IL, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 921",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithmic analysis; algorithms; binary search;
                 Binary Search Trees; binary search trees; binary trees;
                 coding theory; Data Processing; data structure; Data
                 Structures; Data Structures and Algorithms; Discrete
                 Mathematics; edge-weighted trees; Fibonacci numbers;
                 Fibonacci trees; information theory; Kraft's
                 inequality; Lopsided Binary Trees; Mathematical
                 Techniques --- Trees; minimax recurrence relations;
                 optimal trees; path lengths; prefix-free codes; theory;
                 unbounded search; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 G.2.2}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Trees.",
}

@Article{Chor:1989:SCT,
  author =       "Benny Chor and Michael Merritt and David B. Shmoys",
  title =        "Simple Constant-Time Consensus Protocols in Realistic
                 Failure Models",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "591--614",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/CCR.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "{\bf Review: Computing Reviews}, June 1990.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65956.html",
  abstract =     "Using simple protocols, it is shown how to achieve
                 consensus in constant expected time, within a variety
                 of fail-stop and omission failure models.
                 Significantly, the strongest models considered are
                 completely asynchronous. All of the results are based
                 on distributively flipping a coin, which is usable by a
                 significant majority of the processors. Finally, a
                 nearly matching lower bound is also given for
                 randomized protocols for consensus.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Haifa, Isr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "agreement problem; algorithms; Computer Systems,
                 Digital; consensus problem; Consensus Protocols;
                 cryptography; Distributed; Distributed Computing;
                 Distributed Systems; Failure Analysis; Failure Models;
                 fault tolerance; Lower Bounds; performance; Randomized
                 Protocols; reliability; security; theory",
  subject =      "{\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.",
}

@Article{Baccelli:1989:AFJ,
  author =       "Fran{\c{c}}ois Baccelli and William A. Massey and Don
                 Towsley",
  title =        "Acyclic Fork-Join Queueing Networks",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "615--642",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/65950.65957",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65957.html",
  abstract =     "The class of acyclic fork-join queuing networks that
                 arise in various applications, including parallel
                 processing and flexible manufacturing are studied. In
                 such queuing networks, a fork describes the
                 simultaneous creation of several new customers, which
                 are sent to different queues. The corresponding join
                 occurs when the services of all these new customers are
                 completed. The evolution equations that govern the
                 behavior of such networks are derived. From this, the
                 stability conditions are obtained and upper and lower
                 bounds on the network response times are developed.
                 These bounds are based on various stochastic ordering
                 principles and on the notion of association of random
                 variables.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Valbonne, Fr",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Associated Random Variables; associated random
                 variables; Computer Systems, Digital --- Performance;
                 design; ergodic theory; Industrial Plants --- Flexible
                 Manufacturing Systems; Lower Bounds; multiprogramming
                 and multitasking; Network Response Times; Parallelism;
                 performance; performance evaluation; precedence graph;
                 Probability; Queueing Theory; stability condition;
                 Stochastic Ordering; stochastic ordering; System
                 Modeling and Analysis; theory; Upper Bounds;
                 verification",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS. {\bf C.1.2}: Computer Systems Organization,
                 PROCESSOR ARCHITECTURES, Multiple Data Stream
                 Architectures (Multiprocessors), Parallel processors.
                 {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory.",
}

@Article{Beame:1989:OBD,
  author =       "Paul Beame and Johan H{\aa}stad",
  title =        "Optimal Bounds for Decision Problems on the {CRCW}
                 {PRAM}",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "643--670",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65958.html",
  abstract =     "Optimal $\Omega(\log n/\log \log n)$ lower bounds on
                 the time for CRCW PRAMs with polynomially bounded
                 numbers of processors or memory cells to compute parity
                 and a number of related problems are proven. A strict
                 time hierarchy of explicit Boolean functions of $n$
                 bits on such machines that holds up to $O(\log n/\log
                 \log n)$ time is also exhibited. That is, for every
                 time bound T within this range a function is exhibited
                 that can be easily computed using polynomial resources
                 in time T but requires more than polynomial resources
                 to be computed in time $T - 1$. Finally, it is shown
                 that almost all Boolean functions of $n$ bits require
                 $\log n {\rm MIN} \log \log n + \Omega(1)$ time when
                 the number of processors is at most polynomial in $n$.
                 The bounds do not place restrictions on the uniformity
                 of the algorithms nor on the instruction sets of the
                 machines.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Seattle, WA, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "722; 723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Computer Metatheory --- Boolean Functions; Computer
                 Systems, Digital; Concurrent Read; Concurrent Write;
                 concurrent-write; CRCW PRAM; Decision Theory and
                 Analysis; Lower Bounds; lower bounds; Parallel
                 Processing; Parallel Random Access Machines; parallel
                 random-access machines; parity; sorting; theory; Theory
                 of Computation; Verification",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf F.1.3}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Classes,
                 Complexity hierarchies. {\bf F.2.3}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Tradeoffs among Complexity Measures. {\bf
                 F.1.1}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Bounded-action
                 devices.",
}

@Article{Li:1989:NLB,
  author =       "Ming Li and Yaacov Yesha",
  title =        "New Lower Bounds for Parallel Computation",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "671--680",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65959.html",
  abstract =     "Lower bounds are proved on the parallel-time
                 complexity of several basic functions on the most
                 powerful concurrent-read concurrent-write PRAM with
                 unlimited shared memory and unlimited power of
                 individual processors (denoted by PRIORITY($\infty$)).
                 Some of the bounds remain valid for probabilistic or
                 nondeterministic concurrent-read concurrent-write
                 PRAMs.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Columbus, OH, USA",
  ajournal =     "J. Assoc. Comput. Mach.",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "addition; algorithms; Computational Complexity;
                 computational complexity; Computer Systems, Digital;
                 Concurrent Read; Concurrent Write; CRCW PRAM; Lower
                 Bounds; lower bounds; Parallel Processing; parallel
                 random access machine; Parallel Random Access Machines;
                 parity; Probability --- Random Processes; theory;
                 Theory of Computation; verification",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Bounded-action devices. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes.",
}

@Article{Dean:1989:UTH,
  author =       "Thomas Dean",
  title =        "Using Temporal Hierarchies to Efficiently Maintain
                 Large Temporal Databases",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "687--718",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76360.html",
  abstract =     "Many real-world applications involve the management of
                 large amounts of time-dependent information. Temporal
                 database systems maintain this information in order to
                 support various sorts of inference (e.g., answering
                 questions involving propositions that are true over
                 some intervals and false over others). For any given
                 proposition, there are typically many different
                 occasions on which that proposition becomes true and
                 persists for some length of time. In this paper, these
                 occasions are referred to as time tokens. Many routine
                 database operations must search through the database
                 for time tokens satisfying certain temporal
                 constraints. To expedite these operations, this paper
                 describes a set of techniques for organizing temporal
                 information by exploiting the local and global
                 structure inherent in a wide class of temporal
                 reasoning problems. The global structure of time is
                 exemplified in conventions for partitioning time
                 according to the calendar and the clock. This global
                 structure is used to partition the set of time tokens
                 to facilitate retrieval. The local structure of time is
                 exemplified in the causal relationships between events
                 and the dependencies between planned activities. This
                 local structure is used as part of a strategy for
                 reducing the computation required during constraint
                 propagation. The organizational techniques described in
                 this paper are quite general, and have been used to
                 support a variety of powerful inference mechanisms.
                 Integrating these techniques into an existing temporal
                 database system has increased, by an order of magnitude
                 or more in most applications, the number of time tokens
                 that can be efficiently handled.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Artificial Intelligence; design;
                 discrimination trees; Performance; reason maintenance;
                 temporal reasoning",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf H.3.3}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Information
                 Search and Retrieval, Search process. {\bf I.2.8}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Problem Solving, Control Methods, and Search, Heuristic
                 methods. {\bf H.2.1}: Information Systems, DATABASE
                 MANAGEMENT, Logical Design. {\bf H.2.2}: Information
                 Systems, DATABASE MANAGEMENT, Physical Design.",
}

@Article{Platzman:1989:SCP,
  author =       "Loren K. Platzman and John J. {Bartholdi, III}",
  title =        "Spacefilling Curves and the Planar Travelling Salesman
                 Problem",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "719--737",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 18:40:49 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76361.html",
  abstract =     "To construct a short tour through points in the plane,
                 the points are sequenced as they appear along a
                 spacefilling curve. This heuristic consists essentially
                 of sorting, so it is easily coded and requires only
                 $O(N)$ memory and $O(N\log N)$ operations. Its
                 performance is competitive with that of other fast
                 methods.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Combinatorics and Graph Theory; fractal
                 geometry; performance; spacefilling curves;
                 Verification",
  subject =      "{\bf G.2.1}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Combinatorics, Combinatorial algorithms.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sequencing and scheduling.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching.",
}

@Article{Dowd:1989:PBS,
  author =       "Martin Dowd and Yehoshua Perl and Larry Rudolph and
                 Michael Saks",
  title =        "The Periodic Balanced Sorting Network",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "738--757",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76362.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Batcher's networks; comparators network;
                 Computer Systems; design; parallel sorting; periodic
                 networks; shell sort; shuffle-exchange interconnection;
                 sorting networks; theory; Verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 F.1.1}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Unbounded-action
                 devices. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Combinatorial
                 algorithms. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Recurrences and
                 difference equations. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics,
                 Permutations and combinations.",
}

@Article{Abiteboul:1989:TBA,
  author =       "Serge Abiteboul and Victor Vianu",
  title =        "A Transaction-Based Approach to Relational Database
                 Specification",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "758--789",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 11:14:15 1991",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76363.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "database is updated only by a fixed set of
                 encapsulated transactions defined in the schema;
                 constraints can be automatically maintained; preserve
                 constraints and soundness; preservation and soundness
                 are unsolvable for arbitrary first-order constraints.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Database Theory; design; dynamic and
                 static constraints; languages; Management; methods;
                 object-oriented databases; operational specification;
                 performance; theory; transactional schema;
                 Verification",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Schema and subschema. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Transaction processing. {\bf H.2.0}: Information
                 Systems, DATABASE MANAGEMENT, General, Security,
                 integrity, and protection. {\bf H.2.3}: Information
                 Systems, DATABASE MANAGEMENT, Languages.",
}

@Article{Gyssens:1989:UAT,
  author =       "Marc Gyssens and Jan Paredaens and Dirk {Van Gucht}",
  title =        "A Uniform Approach toward Handling Atomic and
                 Structured Information in the Nested Relational
                 Database Model",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "790--825",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76364.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "specification of operators, basic are: set, project,
                 nest, unnest, copy; also: rename. Toggell unnesting,
                 incomplete projection.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algebra; atomic and nonatomic values; copying;
                 Database Theory; design; expressiveness; languages;
                 nested and flat relations and databases; performance;
                 prime values; relation classes; theory; Verification",
  subject =      "{\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Query languages. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Data
                 models.",
}

@Article{vandeSnepscheut:1989:DSS,
  author =       "Jan L. A. van de Snepscheut and Johan B. Swenker",
  title =        "On the Design of Some Systolic Algorithms",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "826--840",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:26:03 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76365.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Computer Systems Organization; concurrent
                 assignment statement; design; Distributed Computing;
                 heuristics; programming methods; Software; systolic
                 algorithms; systolic arrays; theory; Theory of
                 Computation",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation,
                 Unbounded-action devices. {\bf F.3.2}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS, Semantics
                 of Programming Languages. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf F.3.1}:
                 Theory of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Invariants.",
}

@Article{Engelfriet:1989:PSV,
  author =       "Joost Engelfriet and Gilberto Fil{\'e}",
  title =        "Passes, Sweeps, and Visits in Attribute Grammars",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "841--869",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76366.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; attribute evaluator; attribute grammar;
                 class; computational complexity; design; Formal
                 Languages; languages; theory; Verification",
  subject =      "{\bf F.4.2}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Grammars and Other Rewriting
                 Systems, Grammar types. {\bf D.3.4}: Software,
                 PROGRAMMING LANGUAGES, Processors, Translator writing
                 systems and compiler generators. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf F.3.2}:
                 Theory of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Semantics of Programming Languages.",
}

@Article{Kortelainen:1989:CFC,
  author =       "Juha Kortelainen",
  title =        "The Conjecture of {Fliess} on Commutative Context-Free
                 Languages",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "870--872",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "commutative languages; context-free languages; Formal
                 Languages; Languages",
}

@Article{Goldberg:1989:FMC,
  author =       "Andrew V. Goldberg and Robert E. Tarjan",
  title =        "Finding Minimum-Cost Circulations by Canceling
                 Negative Cycles",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "873--886",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Preliminary version in Proc. 20th Annual ACM Symposium
                 on the Theory of Computing, pages 388--397, 1987",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76368.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; cycle canceling; dynamic tree; languages;
                 minimum-cost flow; network optimization; Operations
                 Research; theory; transportation problem; transshipment
                 problem",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 G.1.6}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization, Linear programming. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms.",
}

@Article{Castellani:1989:DB,
  author =       "Ilaria Castellani and Matthew Hennessy",
  title =        "Distributed Bisimulations",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "887--911",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Oct 21 23:26:52 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76369.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algebraic; concurrent processes; languages;
                 noninterleaving; observational equivalence; Programming
                 Languages and Methodology; theory; verification",
  subject =      "{\bf F.3.2}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages, Operational semantics. {\bf F.1.2}: Theory
                 of Computation, COMPUTATION BY ABSTRACT DEVICES, Modes
                 of Computation, Alternation and nondeterminism. {\bf
                 F.4.3}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Formal Languages, Algebraic language
                 theory.",
}

@Article{Allender:1989:UCC,
  author =       "Eric W. Allender",
  title =        "${P}$-Uniform Circuit Complexity",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "912--928",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:43:47 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76370.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "alternating Turing machine; auxiliary pushdown
                 automata; circuit complexity; exponential time;
                 languages; NC; P; precomposition; PSPACE; sparse sets;
                 tally sets; theory; Theory of Computation; uniformity;
                 verification",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation.
                 {\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Reducibility and
                 completeness.",
}

@Article{Blumer:1989:LVC,
  author =       "Anselm Blumer and Andrzej Ehrenfeucht and David
                 Haussler and Manfred K. Warmuth",
  title =        "Learnability and the {Vapnik--Chervonenkis}
                 Dimension",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "4",
  pages =        "929--965",
  month =        oct,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/76371.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  comment =      "An earlier version is available as U. C. Santa Cruz
                 Computer Science Laboratory Tech.\ Report
                 UCSC-CRL-87-20 (Nov.\ 1987). A shorter version appeared
                 in STOC86.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; capacity; design; learnability theory;
                 learning from examples; Occam's razor; PAC learning;
                 performance; sample complexity; theory; Theory of
                 Computation; Vapnik--Chervonenkis classes;
                 Vapnik--Chervonenkis dimension; verification",
  subject =      "{\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning. {\bf I.5.0}: Computing
                 Methodologies, PATTERN RECOGNITION, General. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Probabilistic algorithms (including Monte Carlo). {\bf
                 F.1.3}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Complexity Classes, Reducibility and
                 completeness. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics.",
}

@Article{Kolaitis:1990:SCA,
  author =       "Phokion G. Kolaitis and Christos H. Papadimitriou",
  title =        "Some Computational Aspects of Circumscription",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "1",
  pages =        "1--14",
  month =        jan,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/78936.html",
  abstract =     "The effects of circumscribing first-order formulas are
                 explored from a computational standpoint. First,
                 extending work of V. Lifschitz, it is Shown that the
                 circumscription of any existential first-order formula
                 is equivalent to a first-order formula. After this, it
                 is established that a set of universal Horn clauses has
                 a first-order circumscription if and only if it is
                 bounded (when considered as a logic program); thus it
                 is undecidable to tell whether such formulas have
                 first-order circumscription. Finally, it is shown that
                 there are first-order formulas whose circumscription
                 has a co-NP-complete model-checking problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Artificial Intelligence; circumscription;
                 design; first-order logic; Horn clauses; model
                 checking; nonmonotonic reasoning; NP-completeness;
                 performance; Theory; undecidability",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Nonmonotonic reasoning and belief revision. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Logic programming.",
}

@Article{Cosmadakis:1990:PTI,
  author =       "Stavros S. Cosmadakis and Paris C. Kanellakis and
                 Moshe Y. Vardi",
  title =        "Polynomial-Time Implication Problems for Unary
                 Inclusion Dependencies",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "1",
  pages =        "15--46",
  month =        jan,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/78937.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "subset dependency and constraints interacts with FDs",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; complementary view; complete
                 axiomatizations; Database Theory; decidability; design;
                 embedded implicational dependencies; finite
                 implication; functional dependencies; implication;
                 lossless join; polynomial-time algorithms; theory;
                 unary inclusion dependencies",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Normal forms. {\bf H.2.0}: Information
                 Systems, DATABASE MANAGEMENT, General, Security,
                 integrity, and protection. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Schema
                 and subschema. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Model theory.",
}

@Article{Jaffar:1990:MCW,
  author =       "Joxan Jaffar",
  title =        "Minimal and Complete Word Unification",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "1",
  pages =        "47--85",
  month =        jan,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/78938.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Formal Languages; languages; theory;
                 unification; word problems",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.4.3}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Formal
                 Languages, Decision problems. {\bf I.1.0}: Computing
                 Methodologies, ALGEBRAIC MANIPULATION, General. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Complexity of proof procedures.",
}

@Article{Halpern:1990:CRR,
  author =       "Joseph Y. Halpern and John H. Williams and Edward L.
                 Wimmers",
  title =        "Completeness of Rewrite Rules and Rewrite Strategies
                 for {FP}",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "1",
  pages =        "86--143",
  month =        jan,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/78939.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "completeness of rewriting rules; functional semantics;
                 languages; Programming Languages and Methodology;
                 strategies for rewriting; theory",
  subject =      "{\bf F.4.2}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Grammars and Other Rewriting
                 Systems. {\bf F.3.2}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages, Operational semantics. {\bf F.4.1}: Theory
                 of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic, Lambda calculus and
                 related systems. {\bf F.3.2}: Theory of Computation,
                 LOGICS AND MEANINGS OF PROGRAMS, Semantics of
                 Programming Languages, Denotational semantics. {\bf
                 D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, FP.",
}

@Article{Knessl:1990:AEL,
  author =       "Charles Knessl and Charles Tier",
  title =        "Asymptotic Expansions for Large Closed Queueing
                 Networks",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "1",
  pages =        "144--174",
  month =        jan,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/78940.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A new asymptotic method is developed for analyzing
                 closed BCMP queueing networks with a single class
                 (chain) consisting of a large number of customers, a
                 single infinite server queue, and a large number of
                 single server queues with fixed (state independent)
                 service rates.",
  descriptors =  "Closed queueing network; BCMP; analysis;
                 approximation",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; asymptotics; performance; singular
                 perturbations; System Modeling and Analysis; theory",
  subject =      "{\bf G.m}: Mathematics of Computing, MISCELLANEOUS,
                 Queueing theory. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Unbounded-action devices. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Routing and layout.",
}

@Article{Mate:1990:NPT,
  author =       "Atilla M{\'a}t{\'e}",
  title =        "Nondeterministic Polynomial-Time Computations and
                 Models of Arithmetic",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "1",
  pages =        "175--193",
  month =        jan,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/78941.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Diophantine sets; nondeterministic Turing
                 machine; nonstandard models of arithmetic; NP-complete;
                 the P =? NP problem; theory; Theory of Computation",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Model theory.
                 {\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Relations among
                 complexity classes.",
}

@Article{Davis:1990:CER,
  author =       "Henry W. Davis",
  title =        "Cost-Error Relationships in {A*} Tree-Searching",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "195--199",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77595.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Artificial Intelligence; theory",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Graph and tree search strategies. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Trees. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Computations on
                 discrete structures. {\bf I.2.8}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search, Heuristic
                 methods.",
}

@Article{Chazelle:1990:LBOa,
  author =       "Bernard Chazelle",
  title =        "Lower Bounds for Orthogonal Range Searching: {I}. The
                 Reporting Case",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "200--212",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77614.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Computational Geometry; measurement;
                 theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 E.1}: Data, DATA STRUCTURES.",
}

@Article{Ahuja:1990:FAS,
  author =       "Ravindra K. Ahuja and Kurt Mehlhorn and James B. Orlin
                 and Robert E. Tarjan",
  title =        "Faster Algorithms for the Shortest Path Problem",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "213--223",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77615.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Data Structure and Algorithms; design;
                 heap; priority queue; shortest paths; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf E.1}:
                 Data, DATA STRUCTURES. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sorting and searching.",
}

@Article{Bollobas:1990:CDC,
  author =       "B{\'e}la Bollob{\'a}s and Andrei Z. Broder and Istvan
                 Simon",
  title =        "The Cost Distribution of Clustering in Random
                 Probing",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "224--237",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77619.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; clustering; Data Structure and Algorithms;
                 hashing; open addressing; random probing; theory;
                 uniform hashing",
  subject =      "{\bf H.3.3}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Information Search and Retrieval, Search
                 process. {\bf H.3.3}: Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Information Search and
                 Retrieval, Clustering. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sorting and searching. {\bf E.2}: Data, DATA STORAGE
                 REPRESENTATIONS, Hash-table representations.",
}

@Article{Awerbuch:1990:TBI,
  author =       "Baruch Awerbuch and Oded Goldreich and David Peleg and
                 Ronen Vainish",
  title =        "A Trade-Off between Information and Communication in
                 Broadcast Protocols",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "238--256",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77618.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; broadcast; Distributed Computing; lower
                 bounds; measurement; Multicast; resource trade-offs;
                 theory",
  subject =      "{\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf C.4}:
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS,
                 Modeling techniques. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems.",
}

@Article{Herlihy:1990:CAD,
  author =       "Maurice Herlihy",
  title =        "Concurrency and Availability as Dual Properties of
                 Replicated Atomic Data",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "257--278",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Oct 21 19:57:33 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Object/Ooos.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77616.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; distributed computing; distributed
                 systems; quorum consensus; reliability; replication",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Distributed systems. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Concurrency.
                 {\bf D.4.2}: Software, OPERATING SYSTEMS, Storage
                 Management, Distributed memories. {\bf D.4.3}:
                 Software, OPERATING SYSTEMS, File Systems Management,
                 Distributed file systems.",
}

@Article{Abadi:1990:NDF,
  author =       "Mart{\'\i}n Abadi and Zohar Manna",
  title =        "Nonclausal Deduction in First-Order Temporal Logic",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "279--317",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77617.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "automated deduction; concurrent-program verification;
                 first-order temporal logic; Logic; nonclausal
                 resolution; theorem proving; theory; verification",
  subject =      "{\bf F.3.1}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Logics of programs. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving.",
}

@Article{Shahrokhi:1990:MCF,
  author =       "Farhad Shahrokhi and D. W. Matula",
  title =        "The Maximum Concurrent Flow Problem",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "318--334",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77620.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; concurrent network flow; cut saturation;
                 duality theorems; experimentation; multicommodity flow;
                 network partitioning; Operations Research;
                 polynomial-time approximation scheme; primal-dual
                 algorithms; routing in networks; theory; throughput",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Routing and layout. {\bf G.2.2}: Mathematics
                 of Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Computations on
                 discrete structures.",
}

@Article{Bergstra:1990:MA,
  author =       "J. A. Bergstra and J. Heering and P. Klint",
  title =        "Module Algebra",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "335--372",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Oct 21 19:58:50 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/algebraic.spec.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77621.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "abstraction; algebraic specification module; Craig
                 interpolation lemma; export; first-order specification
                 module; information hiding; languages; module algebra;
                 module composition; module expression; Programming
                 Languages and Methodology; renaming; signature;
                 signature expression; theory; union of modules; visible
                 signature",
  subject =      "{\bf F.3.3}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Studies of Program Constructs.
                 {\bf F.3.2}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Semantics of Programming Languages,
                 Algebraic approaches to semantics. {\bf F.3.1}: Theory
                 of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Logics of programs.",
}

@Article{Baccelli:1990:EPP,
  author =       "Fran{\c{c}}ois Baccelli and Zhen Liu",
  title =        "On the Execution of Parallel Programs on
                 Multiprocessor Systems --- a Queuing Theory Approach",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "373--414",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/77600.77622",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jan 6 09:50:45 2012",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77622.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "The new class of queueing models, called Synchronized
                 Queueing Networks, is proposed for evaluating the
                 performance of multiprogrammed and multitasked
                 multiprocessor systems, where workloads consist of
                 parallel programs of similar structure and where the
                 scheduling discipline is FIFO.",
  descriptors =  "Multiprocessor system; queueing network; scheduling;
                 performance evaluation",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; associated random variables; design;
                 ergodic theory; multiprogramming and multitasking;
                 Parallelism; performance; performance evaluation;
                 response times; stability condition; stochastic
                 ordering; System Modeling and Analysis; task graph;
                 theory; waiting times",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Parallel processors. {\bf D.4.1}:
                 Software, OPERATING SYSTEMS, Process Management,
                 Synchronization. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Queueing theory. {\bf D.4.8}:
                 Software, OPERATING SYSTEMS, Performance, Stochastic
                 analysis. {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance, Modeling and prediction. {\bf G.m}:
                 Mathematics of Computing, MISCELLANEOUS, Queueing
                 theory. {\bf C.4}: Computer Systems Organization,
                 PERFORMANCE OF SYSTEMS, Modeling techniques.",
}

@Article{Ko:1990:SCR,
  author =       "Ker-I Ko",
  title =        "Separating and Collapsing Results on the Relativized
                 Probabilistic Polynomial-Time Hierarchy",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "2",
  pages =        "415--438",
  month =        apr,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/77623.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Complexity; polynomial-time hierarchy;
                 probabilistic computation; relativization; theory;
                 Theory of Computation",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes,
                 Machine-independent complexity. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Complexity hierarchies. {\bf
                 F.1.1}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation.",
}

@Article{Chazelle:1990:LBOb,
  author =       "Bernard Chazelle",
  title =        "Lower Bounds for Orthogonal Range Searching: {II}. The
                 Arithmetic Model",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "439--463",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/90.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/79149.html",
  abstract =     "Lower bounds on the complexity of orthogonal range
                 searching in the static case are established.
                 Specifically, we consider the following dominance
                 search problem: Given a collection of $n$ weighted
                 points in $d$-space and a query point $q$, compute the
                 cumulative weight of the points dominated (in all
                 coordinates) by $q$. It is assumed that the weights are
                 chosen in a commutative semigroup and that the query
                 time measures only the number of arithmetic operations
                 needed to compute the answer. It is proved that if $m$
                 units of storage are available, then the query time is
                 at least proportional to $(\log n/\log(2m/n))^{d-1}$ in
                 both the worst and average cases. This lower bound is
                 provably tight for $m = \Omega(n(\log n)^
                 {d-1+\epsilon})$ and any fixed $\epsilon > 0$. A lower
                 bound of $\Omega(n/\log \log n)^{d}$ on the time
                 required for executing $n$ inserts and queries is also
                 established.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Larmore:1990:FAO,
  author =       "Lawrence L. Larmore and Daniel S. Hirschberg",
  title =        "A Fast Algorithm for Optimal Length-Limited {Huffman}
                 Codes",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "464--473",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/79150.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; binary tree; data compaction and
                 compression; Data Structure and Algorithms; design;
                 Huffman coding; performance; Theory",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY, Data
                 compaction and compression. {\bf F.4.3}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Formal Languages, Algebraic language theory. {\bf E.1}:
                 Data, DATA STRUCTURES, Trees.",
}

@Article{Graham:1990:EES,
  author =       "Marc H. Graham and Ke Wang",
  title =        "On the Equivalence of an {Egd} to a Set of {Fd}'s",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "474--490",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/79151.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "algorithm for a given equality-generating dependency
                 equivalent to a set of functional dependencies.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; data dependencies; Database Theory;
                 languages; theory; weak instances",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design. {\bf H.2.0}: Information Systems,
                 DATABASE MANAGEMENT, General. {\bf H.2.3}: Information
                 Systems, DATABASE MANAGEMENT, Languages, Data
                 description languages (DDL).",
}

@Article{Ryu:1990:ADP,
  author =       "In Kyung Ryu and Alexander Thomasian",
  title =        "Analysis of Database Performance with Dynamic
                 Locking",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "491--523",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/79152.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "the analysis estimates the probability of lock
                 conflicts based on the mean number of locks held by
                 transactions of various classes; main conclusions:
                 system performance is affected more by transaction
                 blocking than by transaction restarts; high transaction
                 arrival rates result in thrashing; for moderate lock
                 contention levels degradation is proportional to
                 transaction size; lock contention with variable-size
                 transactions is higher than with fixed-size
                 transactions; read-only shared locks reduce conflicts
                 and improve performance.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "concurrency control; data contention; database
                 locking; Database Theory; decomposition; design;
                 performance; queuing network models; Theory",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Transaction processing. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Concurrency. {\bf C.4}: Computer Systems Organization,
                 PERFORMANCE OF SYSTEMS, Modeling techniques.",
}

@Article{Attiya:1990:RAE,
  author =       "Hagit Attiya and Amotz Bar-Noy and Danny Dolev and
                 David Peleg and R{\"u}diger Reishuk",
  title =        "Renaming in an Asynchronous Environment",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "524--548",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/79158.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; asynchronous environment; asynchrony;
                 Distributed Computing; distributed systems; lower
                 bounds; processor renaming; Reliability; symmetry
                 breaking; theory; unreliable systems",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.",
}

@Article{Halpern:1990:KCK,
  author =       "Joseph Y. Halpern and Yoram Moses",
  title =        "Knowledge and Common Knowledge in a Distributed
                 Environment",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "549--587",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "A preliminary version appeared in {\em Proc. 3rd ACM
                 Symposium on Principles of Distributed Computing},
                 1984",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/79161.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; common knowledge; Distributed Computing;
                 distributed knowledge; knowledge; knowledge and action;
                 reliability; theory; variants of common knowledge;
                 verification",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods. {\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol verification. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about
                 Programs.",
}

@Article{Uresin:1990:PAA,
  author =       "Aydin {\"U}resin and Michel Dubois",
  title =        "Parallel Asynchronous Algorithms for Discrete Data",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "588--606",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/79162.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; asynchronous algorithms; consistent
                 labeling; design; fixed point; iterative algorithms;
                 Numerical Computation; synchronization; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.1.0}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, General, Parallel
                 algorithms. {\bf I.2.8}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Problem Solving, Control
                 Methods, and Search, Dynamic programming. {\bf C.1.2}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors).",
}

@Article{Orda:1990:SPM,
  author =       "Ariel Orda and Raphael Rom",
  title =        "Shortest-Path and Minimum Delay Algorithms in Networks
                 with Time-Dependent Edge-Length",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "607--625",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214078.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; functional complexity; network algorithms;
                 Operations Research; performance; shortest paths; time
                 dependency; waiting times",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Path and circuit problems.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Graph algorithms.",
}

@Article{Han:1990:EFP,
  author =       "Yijie Han and Robert A. Wagner",
  title =        "An Efficient and Fast Parallel-Connected Component
                 Algorithm",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "626--642",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214077.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; connectivity; design; optimal algorithms;
                 Parallel Algorithms; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf E.1}:
                 Data, DATA STRUCTURES, Graphs. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures.",
}

@Article{Pattipati:1990:AMV,
  author =       "K. R. Pattipati and M. M. Kostreva and J. L. Teele",
  title =        "Approximate Mean Value Analysis Algorithms for
                 Queueing Networks: {Existence}, Uniqueness, and
                 Convergence Results",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "643--673",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214074.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; closed product-form queuing networks;
                 convex programming; mean value analysis; performance;
                 primal-dual methods; Schweitzer-Bard approximation;
                 System Modeling and Analysis; throughput bounds",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Modeling techniques.",
}

@Article{Gurevich:1990:NLT,
  author =       "Yuri Gurevich and Saharon Shelah",
  title =        "Nondeterministic Linear-Time Tasks May Require
                 Substantially Nonlinear Deterministic Time in the Case
                 of Sublinear Work Space",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "3",
  pages =        "674--687",
  month =        jul,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214070.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; clique problem; lower bounds;
                 nondeterminism; nonlinear time; performance; Theory of
                 Computation; time-space trade-off",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Relations among
                 complexity measures. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Automata. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Bounded-action devices. {\bf F.1.3}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity classes.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.2.3}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Tradeoffs among Complexity Measures. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Counting problems. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms.",
}

@Article{Szpankowski:1990:PTA,
  author =       "Wojciech Szpankowski",
  title =        "{Patricia} Tries Again Revisited",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "4",
  pages =        "691--711",
  month =        oct,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/214080.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; balanced trees; Data Structure and
                 Algorithms; data structures; digital search trees;
                 Patricia tries; performance; probabilistic analysis of
                 algorithms; random shape of trees; successful search;
                 unsuccessful search",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Sorting and
                 searching. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Generating
                 functions. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Recurrences and
                 difference equations. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Trees.
                 {\bf H.3.3}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Information Search and Retrieval, Search
                 process.",
}

@Article{Briggs:1990:CTC,
  author =       "David A. Briggs",
  title =        "A Correction of the Termination Conditions of the
                 {Henschen-Naqvi} Technique",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "4",
  pages =        "712--719",
  month =        oct,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/96562.html",
  abstract =     "Henschen and Naqvi described a technique for
                 translating queries on recursively defined relations of
                 a Datalog database into iterative programs that invoke
                 a query processor for conventional select-project-join
                 queries of the relational algebra. Although the
                 technique has been cited as one of the most efficient
                 available, it will in some cases fail to produce all
                 answers defined by the usual semantics for such
                 databases. The technique is reviewed, a recursive query
                 is exhibited where it fails, the cause of failure is
                 noted, and a correction is described. A graphical
                 representation of the computation based on a formal
                 representation of rule expansions is employed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Datalog database, it in some cases fails to produce
                 all answers on recursively defined relations; the cause
                 of failure is noted and a correction is described.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; cyclic relations; Database Theory;
                 Languages; logic and databases; logic program
                 compilation; recursively defined relations; Theory",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf H.2.3}: Information
                 Systems, DATABASE MANAGEMENT, Languages, Query
                 languages. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic. {\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Logic
                 programming.",
}

@Article{Dolev:1990:ESB,
  author =       "Danny Dolev and Ruediger Reischuk and H. Raymond
                 Strong",
  title =        "Early Stopping in {Byzantine} Agreement",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "4",
  pages =        "720--741",
  month =        oct,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/96565.html",
  abstract =     "Two different kinds of Byzantine Agreement for
                 distributed systems with processor faults are defined
                 and compared. The first is required when coordinated
                 actions may be performed by each participant at
                 different times. This kind is called Simultaneous
                 Byzantine Agreement (SBA).\par

                 This paper deals with the number of rounds of message
                 exchange required to reach Byzantine Agreement of
                 either kind (BA). If an algorithm allows its
                 participants to reach Byzantine agreement in every
                 execution in which at most $t$ participants are faulty,
                 then the algorithm is said to tolerate $t$ faults. It
                 is well known that any BA algorithm that tolerates $t$
                 faults (with $t < n - 1$ where $n$ denotes the total
                 number of processors) must run at least $t$ + 1 rounds
                 in some execution. However, it might be supposed that
                 in executions where the number $f$ of actual faults is
                 small compared to $t$, the number of rounds could be
                 correspondingly small. A corollary of our first result
                 states that (when $t < n - 1$) any algorithm for SBA
                 must run $t + 1$ rounds in some execution where there
                 are no faults. For EBA (with $t < n - 1$), a lower
                 bound of $\min(t + 1,f + 2)$ rounds is proved. Finally,
                 an algorithm for EBA is presented that achieves the
                 lower bound, provided that $t$ is on the order of the
                 square root of the total number of processors.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "agreement problem; Algorithms; asynchronous system;
                 Byzantine Generals problem; commit problem; consensus
                 problem; Distributed Computing; early stopping; fault
                 tolerance; performance; Reliability; Theory;
                 Verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sequencing and scheduling.
                 {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Unbounded-action devices. {\bf C.2.2}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Network Protocols.",
}

@Article{Nipkow:1990:UPA,
  author =       "Tobias Nipkow",
  title =        "Unification in Primal Algebras, Their Powers and Their
                 Varieties",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "4",
  pages =        "742--776",
  month =        oct,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/96569.html",
  abstract =     "This paper examines the unification problem in the
                 class of {\em primal algebras\/} and the varieties they
                 generate. An algebra is called primal if every function
                 on its carrier can be expressed just in terms of the
                 basic operations of the algebra. The two-element
                 Boolean algebra is the simplest nontrivial example:
                 Every truth-function can be realized in terms of the
                 basic connectives, for example, negation and
                 conjunction.\par

                 It is shown that unification in primal algebras is
                 unitary, that is, if an equation has a solution, it has
                 a single most general one. Two unification algorithms,
                 based on equation-solving techniques for Boolean
                 algebras due to Boole and L{\"o}wenheim, are studied in
                 detail. Applications include certain finite Post
                 algebras and matrix rings over finite fields. The
                 former are algebraic models for many-valued logics, the
                 latter cover in particular modular arithmetic.\par

                 Then unification is extended from primal algebras to
                 their direct powers, which leads to unitary unification
                 algorithms covering finite Post algebras, finite,
                 semisimple Artinian rings, and finite, semisimple
                 nonabelian groups.\par

                 Finally the fact that the variety generated by a primal
                 algebra coincides with the class of its subdirect
                 powers is used. This yields unitary unification
                 algorithms for the equational theories of Post algebras
                 and $p$-rings.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Boolean algebra; Boolean rings; equational
                 reasoning; Logic; Post algebra; primal algebras;
                 Theory; unification; Verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems. {\bf I.1.2}:
                 Computing Methodologies, ALGEBRAIC MANIPULATION,
                 Algorithms, Algebraic algorithms. {\bf I.1.1}:
                 Computing Methodologies, ALGEBRAIC MANIPULATION,
                 Expressions and Their Representation, Simplification of
                 expressions.",
}

@Article{Nadathur:1990:HOH,
  author =       "Gopalan Nadathur and Dale Miller",
  title =        "Higher-Order {Horn} Clauses",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "4",
  pages =        "777--814",
  month =        oct,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/96570.html",
  abstract =     "A generalization of Horn clauses to a higher-order
                 logic is described and examined as a basis for logic
                 programming. In qualitative terms, these higher-order
                 Horn clauses are obtained from the first-order ones by
                 replacing first-order terms with simply typed
                 $\lambda$-terms and by permitting quantification over
                 all occurrences of function symbols and some
                 occurrences of predicate symbols. Several
                 proof-theoretic results concerning these extended
                 clauses are presented. One result shows that although
                 the substitutions for predicate variables can be quite
                 complex in general, the substitutions necessary in the
                 context of higher-order Horn clauses are tightly
                 constrained. This observation is used to show that
                 these higher-order formulas can specify computations in
                 a fashion similar to first-order Horn clauses. A
                 complete theorem-proving procedure is also described
                 for the extension. This procedure is obtained by
                 interweaving higher-order unification with backchaining
                 and goal reductions, and constitutes a higher-order
                 generalization of SLD-resolution. These results have a
                 practical realization in the higher-order logic
                 programming language called $\lambda$Prolog.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "higher-order logic; higher-order unification; Horn
                 clauses; languages; Logic Programming; Prolog;
                 SLD-resolution; theory",
  subject =      "{\bf D.3.1}: Software, PROGRAMMING LANGUAGES, Formal
                 Definitions and Theory. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Logic programming.",
}

@Article{Cockett:1990:DTR,
  author =       "J. R. B. Cockett and J. A. Herrera",
  title =        "Decision Tree Reduction",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "4",
  pages =        "815--842",
  month =        oct,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/96576.html",
  abstract =     "The reduction algorithm is a technique for improving a
                 decision tree in the absence of a precise cost
                 criterion. The result of applying the algorithm is an
                 irreducible tree that is no less efficient than the
                 original, and may be more efficient. Irreducible trees
                 arise in discrete decision theory as an algebraic form
                 for decision trees. This form has significant
                 computational properties. In fact, every irreducible is
                 optimal with respect to some expected testing cost
                 criterion and is strictly better than any given
                 distinct tree with respect to some criterion.\par

                 Many irreducibles are decision equivalent to a given
                 tree; only some of these are {\em reductions\/} of the
                 tree. The reduction algorithm is a particular way of
                 finding one of these. It tends to preserve the overall
                 structure of the tree by reducing the subtrees
                 first.\par

                 A bound on the complexity of this algorithm with input
                 tree $t$ is $O(\mbox{hgt}(t)^2) - \mbox{usize}(t)$ is
                 the {\em uniform\/} size of the tree (the number of
                 leaves less one) and hgt($t$) is the height of the
                 tree. This means that decision tree reduction has the
                 same worst-case order of complexity as most heuristic
                 methods for building suboptimal trees. While the
                 purpose of using heuristics is often rather different,
                 such comparisons are an indication of the efficiency of
                 the reduction algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; control decisions; Design; discrete
                 decision theory; essential decisions; expected testing
                 cost; irreducible decision trees; Operations Research;
                 Performance; reasonable cost criteria; rebust
                 optimization of decision trees; redundant decisions;
                 stable optimization of decision trees; syntactic
                 optimization; Theory",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Dynamic programming. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic. {\bf I.2.8}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search, Graph and tree
                 search strategies. {\bf F.4.3}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Formal
                 Languages, Decision problems. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems.",
}

@Article{Hochbaum:1990:CSO,
  author =       "Dorit S. Hochbaum and J. George Shanthikumar",
  title =        "Convex Separable Optimization Is Not Much Harder than
                 Linear Optimization",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "4",
  pages =        "843--862",
  month =        oct,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/96597.html",
  abstract =     "The polynomiality of nonlinear separable convex
                 (concave) optimization problems, on linear constraints
                 with a matrix with ``small'' subdeterminants, and the
                 polynomiality of such integer problems, provided the
                 integer linear version of such problems is polynomial,
                 is proven. This paper presents a general-purpose
                 algorithm for converting procedures that solves linear
                 programming problems. The conversion is polynomial for
                 constraint matrices with polynomially bounded
                 subdeterminants. Among the important corollaries of the
                 algorithm is the extension of the polynomial
                 solvability of integer linear programming problems with
                 totally unimodular constraint matrix, to
                 integer-separable convex programming. An algorithm for
                 finding a $\epsilon$-accurate optimal continuous
                 solution to the nonlinear problem that is polynomial in
                 $\log(1/\epsilon)$ and the input size and the largest
                 subdeterminant of the constraint matrix is also
                 presented. These developments are based on proximity
                 results between the continuous and integral optimal
                 solutions for problems with any nonlinear separable
                 convex objective function. The practical feature of our
                 algorithm is that is does not demand an explicit
                 representation of the nonlinear function, only a
                 polynomial number of function evaluations on a
                 prespecified grid.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Decision; nonlinear optimization;
                 Operations Research; proximity results; scaling
                 algorithms; Theory",
  subject =      "{\bf G.1.6}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Optimization, Linear programming. {\bf
                 G.1.6}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization, Integer programming. {\bf F.2.0}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, General.",
}

@Article{Harrison:1990:RMI,
  author =       "Peter G. Harrison and Naresh M. Patel",
  title =        "The Representation of Multistage Interconnection
                 Networks in Queuing Models of Parallel Systems",
  journal =      j-J-ACM,
  volume =       "37",
  number =       "4",
  pages =        "863--898",
  month =        oct,
  year =         "1990",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/96599.html",
  abstract =     "A major component of a parallel machine is its
                 interconnection network (IN), which provides concurrent
                 communication between the processing elements. It is
                 common to use a multistage interconnection network
                 (MIN) that is constructed using crossbar switches and
                 introduces contention not only for destination
                 addresses but also for internal links. Both types of
                 contention are increased when nonlocal communication
                 across a MIN becomes concentrated on a certain
                 destination address, the {\em hot-spot}. This paper
                 considers analytical models of asynchronous,
                 circuit-switched INs in which partial paths are held
                 during path building, beginning with a single crossbar
                 and extending recursively to MINs. Since a path must be
                 held between source and destination processors before
                 data can be transmitted, switching networks are passive
                 resources and queuing networks that include them do not
                 therefore have product-form solutions. Using
                 decomposition techniques, the flow-equivalent server
                 (FES) that represents a bank of devices transmitting
                 through a switching network is determined, under mild
                 approximating assumptions. In the case of a full
                 crossbar, the FES can be solved directly and the result
                 can be applied recursively to model the MIN. Two cases
                 are considered: one in which there is uniform routing
                 and the other where there is a hot-spot at one of the
                 output pins. Validation with respect to simulation for
                 MINs with up to six stages (64-way switching) indicated
                 a high degree of accuracy in the models.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "This paper considers analytical models of
                 asynchronous, circuit-switched INs in which partial
                 paths are held during path building, beginning with a
                 single crossbar and extending recursively to MINs.
                 Since a path must be held between source and
                 destination processors before data can be transmitted,
                 switching networks are passive resources and queueing
                 networks that include them do not therefore have
                 product-form solutions. \ldots{}",
  descriptors =  "Closed queueing network; crossbar; delta network; flow
                 equivalent server; decomposition; Markov process;
                 performance evaluation; multistage interconnection
                 network",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "closed queuing network; crossbar switch; delta
                 network; Design; flow-equivalent server; Markov
                 process; multistage interconnection network;
                 Parallelism; Performance; performance evaluation;
                 System Modeling and Analysis; theory",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Modeling techniques. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf C.1.2}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors),
                 Interconnection architectures. {\bf C.1.2}: Computer
                 Systems Organization, PROCESSOR ARCHITECTURES, Multiple
                 Data Stream Architectures (Multiprocessors), Parallel
                 processors. {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance, Queueing theory. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Unbounded-action devices.",
}

@Article{Dyer:1991:RPT,
  author =       "Martin Dyer and Alan Frieze and Ravi Kannan",
  title =        "A Random Polynomial Time Algorithm for Approximating
                 the Volume of Convex Bodies",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "1",
  pages =        "1--17",
  month =        jan,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "A constant time oracle is assumed for determining if a
                 point in space is inside or outside a convex body in
                 $n$-dimensional Euclidean space. The algorithm runs in
                 time bounded by a polynomial in $n$, the dimension of
                 the body, and $1/\epsilon$, where $\epsilon$ is the
                 relative error bound. With probability $3/4$, it finds
                 an approximation satisfying the error bound.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/102783.html",
  abstract =     "A randomized polynomial-time algorithm for
                 approximating the volume of a convex body $K$ in
                 $n$-dimensional Euclidean space is presented. The proof
                 of correctness of the algorithm relies on recent theory
                 of rapidly mixing Markov chains and isoperimetric
                 inequalities to show that a certain random walk can be
                 used to sample nearly uniformly from within $K$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; approximation; Computational Geometry;
                 convex; convex sets; random walks; sampling; theory;
                 volume",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf G.3}: Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Probabilistic algorithms
                 (including Monte Carlo).",
}

@Article{Mitchell:1991:WRP,
  author =       "Joseph S. B. Mitchell and Christos H. Papadimitriou",
  title =        "The Weighted Region Problem: {Finding} Shortest Paths
                 Through a Weighted Planar Subdivision",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "1",
  pages =        "18--73",
  month =        jan,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/102784.html",
  abstract =     "The problem of determining shortest paths through a
                 weighted planar polygonal subdivision with $n$ vertices
                 is considered. Distances are measured according to a
                 weighted Euclidean metric: The length of a path is
                 defined to be the weighted sum of (Euclidean) lengths
                 of the subpaths within each region. An algorithm that
                 constructs a (restricted) ``shortest path map'' with
                 respect to a given source point is presented. The
                 output is a partitioning of each edge of the
                 subdivision into intervals of $\epsilon$-optimality,
                 allowing an $\epsilon$-optimal path to be traced from
                 the source to any query point along any edge. The
                 algorithm runs in worst-case time $O(ES)$ and requires
                 $O(E)$ space, where $E$ is the number of ``events'' in
                 our algorithm and $S$ is the time it takes to run a
                 numerical search procedure. In the worst case, $E$ is
                 bounded above by $O(n^{4})$ (and we give an
                 $\Omega(n^{4})$ lower bound), but it is likely that $E$
                 will be much smaller in practice. We also show that $S$
                 is bounded by $O(n^{4}L)$, where $L$ is the precision
                 of the problem instance (including the number of bits
                 in the user-specified tolerance $\epsilon$). Again, the
                 value of $S$ should be smaller in practice. The
                 algorithm applies the ``continuous Dijkstra'' paradigm
                 and exploits the fact that shortest paths obey Snell's
                 Law of Refraction at region boundaries, a local
                 optimality property of shortest paths that is well
                 known from the analogous optics model. The algorithm
                 generalizes to the multi-source case to compute Voronoi
                 diagrams.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Computational Geometry; continuous
                 Dijkstra; Dijkstra's algorithm; geodesic distance;
                 measurement; path planning; shortest paths; terrain
                 navigation; Theory; Voronoi diagrams; weighted;
                 weighted distance functions",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Path and circuit
                 problems. {\bf I.2.8}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Problem Solving, Control
                 Methods, and Search, Graph and tree search
                 strategies.",
}

@Article{Mulmuley:1991:FPP,
  author =       "Ketan Mulmuley",
  title =        "A Fast Planar Partition Algorithm, {II}",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "1",
  pages =        "74--103",
  month =        jan,
  year =         "1991",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/102782.102785",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 22 07:42:24 2011",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/102785.html",
  abstract =     "Randomized, optimal algorithms to find a partition of
                 the plane induced by a set of algebraic segments of a
                 bounded degree, and a set of linear chains of a bounded
                 degree, are given. This paper also provides a new
                 technique for clipping, called {\em virtual clipping},
                 whose overhead per window $W$ depends logarithmically
                 on the number if intersections between the borders of
                 $W$ and the input segments. In contrast, the overhead
                 of the conventional clipping technique depends linearly
                 on this number of intersections. As an application of
                 virtual clipping, a new simple and efficient algorithm
                 for plannar point location is given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; computational complexity; Computational
                 Geometry; hidden surface removal; planar subdivision;
                 randomized geometric algorithms; Theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Computations on
                 discrete structures. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics,
                 Combinatorial algorithms. {\bf G.1.6}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Optimization. {\bf
                 I.3.5}: Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Geometric
                 algorithms, languages, and systems.",
}

@Article{Willard:1991:OSC,
  author =       "Dan E. Willard",
  title =        "Optimal Sample Cost Residues for Differential Database
                 Batch Query Problems",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "1",
  pages =        "104--119",
  month =        jan,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/102786.html",
  abstract =     "In many computing applications, there are several
                 equivalent algorithms capable of performing a
                 particular task, and no one is the most efficient under
                 all statistical distributions of the data. In such
                 contexts, a good heuristic is to take a sample of the
                 database and use it to guess which procedure is likely
                 to be the most efficient. This paper defines the very
                 general notion of a differentiable query problem and
                 shows that the ideal sample size for guessing the
                 optimal choice of algorithm is $O(N^{2/3})$ for all
                 differential problems involving approximately $N$
                 executing steps.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Data Structure and Algorithms; databases;
                 measurement; Measurements; Performance; sampling;
                 theory",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf H.3.2}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Information
                 Storage. {\bf H.3.3}: Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Information Search and
                 Retrieval. {\bf F.2.2}: Theory of Computation, ANALYSIS
                 OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems.",
}

@Article{Sagiv:1991:EQI,
  author =       "Yehoshua Sagiv",
  title =        "Evaluation of Queries in Independent Database
                 Schemes",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "1",
  pages =        "120--161",
  month =        jan,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/102787.html",
  abstract =     "A simple characterization of independent database
                 schemes is proved. An algorithm is given for
                 translating a tableau $T$, posed as a query on a
                 representative instance, to a union of tableaux that is
                 equivalent to $T$, but can be applied directly to
                 database relations. The algorithm may take exponential
                 time (in the size of $T$ and the database scheme), and
                 it is applicable only to independent database schemes.
                 If $T$ is a just a projection of a representative
                 instance, then the algorithm has a simpler form (which
                 is still exponential in the worst case) and is
                 polynomial in some cases.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "tableau $T$ is posed as a query on a representative
                 instance as a union of equivalent tableaux",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; chase; Database Theory; Design; expanded
                 cover; extension join; functional dependency;
                 independent database scheme; join dependency; lossless
                 join; null value; query evaluation; relational algebra;
                 relational database; representative instance;
                 restricted projection; tableau; Theory; union of
                 tableaux",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Schema
                 and subschema. {\bf H.2.1}: Information Systems,
                 DATABASE MANAGEMENT, Logical Design, Normal forms. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Model theory.",
}

@Article{Frederickson:1991:PGD,
  author =       "Greg N. Frederickson",
  title =        "Planar Graph Decomposition and All Pairs Shortest
                 Paths",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "1",
  pages =        "162--204",
  month =        jan,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; all pairs shortest paths; approximation
                 algorithm; compact routing table; graph embedding;
                 Graph Theory; NP-completeness; outerplanar graph;
                 planar graph; succinct encoding; Theory",
}

@Article{Chandru:1991:EHS,
  author =       "V. Chandru and J. N. Hooker",
  title =        "Extended {Horn} Sets In Propositional Logic",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "1",
  pages =        "205--221",
  month =        jan,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/102789.html",
  abstract =     "The class of Horn clause sets in propositional logic
                 is extended to a larger class for which the
                 satisfiability problem can still be solved by unit
                 resolution in linear time. It is shown that to every
                 arborescence there corresponds a family of extended
                 Horn sets, where ordinary Horn sets correspond to stars
                 with a root at the center. These results derive from a
                 theorem of Chandresekaran that characterizes when an
                 integer solution of a system of inequalities can be
                 found by rounding a real solution in a certain way. A
                 linear-time procedure is provided for identifying
                 ``hidden'' extended Horn sets (extended Horn but for
                 complementation of variables) that correspond to a
                 specified arborescence. Finally, a way to interpret
                 extended Horn sets in applications is suggested.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Horn clauses; Logic Programming;
                 propositional logic; Theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Computational
                 logic. {\bf F.4.1}: Theory of Computation, MATHEMATICAL
                 LOGIC AND FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem
                 Proving.",
}

@Article{Kissin:1991:ULB,
  author =       "Gloria Kissin",
  title =        "Upper and Lower Bounds on Switching Energy in {VLSI}",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "1",
  pages =        "222--254",
  month =        jan,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/102790.html",
  abstract =     "A technology-independent framework is established for
                 measuring the switching energy consumed by very large
                 scale integrated (VLSI) circuits. Techniques are
                 developed for analyzing functional energy consumption,
                 and for designing energy-efficient VLSI circuits. A
                 wire (or gate) in a circuit uses switching energy when
                 it changes state from 1 to 0 or vice versa. This paper
                 develops the Uniswitch Model (USM) of energy
                 consumption, which measures the differences between
                 pairs of states of an embedded circuit.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "1-switchable functions; addition; Algorithms; AND
                 function; average-case analysis; CID VLSI circuit;
                 circuit scheme; compare functions; Design; embedding;
                 energy consumption; energy-efficient; layout;
                 Measurement; multiswitch models; OR function; parity
                 function; Performance; switching energy; Theory; Theory
                 of Computation; uniswitch energy; upper and lower
                 bounds; USM",
  subject =      "{\bf B.7.1}: Hardware, INTEGRATED CIRCUITS, Types and
                 Design Styles, VLSI (very large scale integration).
                 {\bf B.7.3}: Hardware, INTEGRATED CIRCUITS, Reliability
                 and Testing. {\bf B.7.2}: Hardware, INTEGRATED
                 CIRCUITS, Design Aids, Layout.",
}

@Article{Arkin:1991:MCP,
  author =       "E. M. Arkin and C. H. Papadimitriou and M.
                 Yannakakis",
  title =        "Modularity of Cycles and Paths in Graphs",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "2",
  pages =        "255--274",
  month =        apr,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/103517.html",
  abstract =     "Certain problems related to the length of cycles and
                 paths modulo a given integer are studied. Linear-time
                 algorithms are presented that determine whether all
                 cycles in an undirected graph are of length $P$ mod $Q$
                 and whether all paths between two specified nodes are
                 of length $P$ mod $Q$, for fixed integers $P$.$Q$.
                 These results are compared to those for directed
                 graphs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Combinatorics and Graph Theory; cycles and
                 paths; graphs; modularity; Theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Path and circuit problems.
                 {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems.",
}

@Article{Dobkin:1991:MGE,
  author =       "David Dobkin and Subhash Suri",
  title =        "Maintenance of Geometric Extrema",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "2",
  pages =        "275--298",
  month =        apr,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/103518.html",
  abstract =     "Let $S$ be a set, $f: S \times S \rightarrow R^{+}$ a
                 bivariate function, and $f(x,S)$ the {\em maximum\/}
                 value of $f(x,y)$ over all elements $y \in S$. We say
                 that $f$ is {\em decomposable\/} with respect with the
                 maximum if $f(x,S) = \max \{f(x,S_1),f(x,
                 S_2),\ldots,f(x,S_k)\}$ for any decomposition $S =
                 \cup_{i=1}^{i=k} S_i$. Computing the maximum (minimum)
                 value of a decomposable function is inherent in many
                 problems of computational geometry and robotics. In
                 this paper, a general technique is presented for
                 updating the maximum (minimum) value of a decomposable
                 function as elements are inserted into and deleted from
                 the set $S$. Our result holds for a {\em semi-online\/}
                 model of dynamization: When an element is inserted, we
                 are told how long it will stay. Applications of this
                 technique include efficient algorithms for {\em
                 dynamically\/} computing the diameter or closest pair
                 of a set of points, minimum separation among a set of
                 rectangles, smallest distance between a set of points
                 and a set of hyperplanes, and largest or smallest area
                 (perimeter) rectangles determined by a set of points.
                 These problems are fundamental to application areas
                 such as robotics, VLSI masking, and optimization.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; amortized analysis; Computational
                 Geometry; decomposability; dynamization; geometric
                 algorithms; semi-online model; Theory; Voronoi
                 diagram",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Routing and
                 layout.",
}

@Article{Bryant:1991:MHV,
  author =       "Randal E. Bryant",
  title =        "A Methodology for Hardware Verification Based on Logic
                 Simulation",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "2",
  pages =        "299--328",
  month =        apr,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/103519.html",
  abstract =     "A logic simulator can prove the correctness of a
                 digital circuit if it can be shown that only circuits
                 fulfilling the system specification will produce a
                 particular response to a sequence of simulation
                 commands.This style of verification has advantages over
                 the other proof methods in being readily automated and
                 requiring less attention on the part of the user to the
                 low-level details of the design. It has advantages over
                 other approaches to simulation in providing more
                 reliable results, often at a comparable cost.\par

                 This paper presents the theoretical foundations of
                 several related approaches to circuit verification
                 based on logic simulation. These approaches exploit the
                 three-valued modeling capability found in most logic
                 simulators, where the third-value $X$ indicates a
                 signal with unknown digital value. Although the circuit
                 verification problem is NP-hard as measured in the size
                 of the circuit description, several techniques can
                 reduce the simulation complexity to a manageable level
                 for many practical circuits.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Computer Systems; design; hardware verification; logic
                 simulation; performance; ternary simulation; Theory;
                 Verification",
  subject =      "{\bf B.6.3}: Hardware, LOGIC DESIGN, Design Aids,
                 Verification. {\bf B.6.3}: Hardware, LOGIC DESIGN,
                 Design Aids, Simulation.",
}

@Article{Ioannidis:1991:TAT,
  author =       "Yannis E. Ioannidis and Eugene Wong",
  title =        "Towards an Algebraic Theory of Recursion",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "2",
  pages =        "329--381",
  month =        apr,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/103521.html",
  abstract =     "An algebraic framework for the study of recursion has
                 been developed. For immediate linear recursion, a Horn
                 clause is represented by a relational algebra operator.
                 It is shown that the set of all such operators forms a
                 closed semiring. In this formalism, query answering
                 corresponds to solving a linear equation. For the first
                 time, the query answer is able to be expressed in an
                 explicit algebraic form within an algebraic structure.
                 The manipulative power thus afforded has several
                 implications on the implementation of recursive query
                 processing algorithms. Several possible decompositions
                 of a given operator are presented that improve the
                 performance of the algorithms, as well as several
                 transformations that give the ability to take into
                 account any selections or projections that are present
                 in a given query. In addition, it is shown that mutual
                 linear recursion can also be studied within a closed
                 semiring, by using relation vectors and operator
                 matrices. Regarding nonlinear recursion, it is first
                 shown that Horn clauses always give rise to multilinear
                 recursion, which can always be reduced to bilinear
                 recursion. Bilinear recursion is then shown to form a
                 nonassociative closed semiring. Finally, several
                 sufficient and necessary-and-sufficient conditions for
                 bilinear recursion to be equivalent to a linear one of
                 a specific form are given. One of the sufficient
                 conditions is derived by embedding to bilinear
                 recursion in an algebra.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; closed semirings; Database Theory;
                 deductive databases; Languages; performance; query
                 optimization; recursion; Theory",
  subject =      "{\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages. {\bf H.2.4}: Information Systems, DATABASE
                 MANAGEMENT, Systems, Query processing. {\bf I.1.2}:
                 Computing Methodologies, ALGEBRAIC MANIPULATION,
                 Algorithms, Algebraic algorithms. {\bf I.1.3}:
                 Computing Methodologies, ALGEBRAIC MANIPULATION,
                 Languages and Systems. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Logic programming.",
}

@Article{Fagin:1991:MTA,
  author =       "Ronald Fagin and Joseph Y. Halpern and Moshe Y.
                 Vardi",
  title =        "A Model-Theoretic Analysis of Knowledge",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "2",
  pages =        "382--428",
  month =        apr,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "A preliminary version appeared in {\em Proc. 25th IEEE
                 Symposium on Foundations of Computer Science}, 1984",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/128680.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "common knowledge; Distributed Computing; distributed
                 systems; epistemology; knowledge; knowledge structures;
                 Kripke structure; modal logic; possible worlds;
                 reasoning about knowledge; theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic. {\bf I.2.4}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Knowledge Representation Formalisms and Methods.",
}

@Article{Bambos:1991:SPP,
  author =       "Nicholas Bambos and Jean Walrand",
  title =        "On Stability and Performance of Parallel Processing
                 Systems",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "2",
  pages =        "429--452",
  month =        apr,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/103520.html",
  abstract =     "The general problem of parallel (concurrent)
                 processing is investigated from a queuing theoretic
                 point of view.\par

                 As a basic simple model, consider infinitely many
                 processors that can work simultaneously, and a stream
                 of arriving jobs, each carrying a processing time
                 requirement. Upon arrival, a job is allocated to a
                 processor and starts being executed, unless it is
                 blocked by another one already in the system. Indeed,
                 any job can be randomly blocked by any preceding one,
                 in the sense that it cannot start being processed
                 before the one that blocks it leaves. After execution,
                 the job leaves the system. The arrival times, the
                 processing times and the blocking structures of the
                 jobs form a stationary and ergodic sequence.\par

                 The random precedence constraints capture the essential
                 operational characteristic of parallel processing and
                 allow a unified treatment of concurrent processing
                 systems from such diverse areas as parallel
                 computation, database concurrency control, queuing
                 networks, flexible manufacturing systems. The above
                 basic model includes the $G/G/1$ and $G/G/\infty$
                 queuing systems as special extreme cases.\par

                 Although there is an infinite number of processors, the
                 precedence constraints induce a queuing phenomenon,
                 which, depending on the loading conditions, can lead to
                 stability or instability of the system.\par

                 In this paper, the condition for stability of the
                 system is first precisely specified. The asymptotic
                 behavior, at large times, of the quantities associated
                 with the performance of the system is then studied, and
                 the degree of parallelism, expressed as the asymptotic
                 average number of processors that work concurrently, is
                 computed. Finally, various design and simulation
                 aspects concerning parallel processing systems are
                 considered, and the case of finite number of processors
                 is discussed.\par

                 The results proved for the basic model are then
                 extended to cover more complex and realistic parallel
                 processing systems, where each job has a random
                 internal structure of subtasks to be executed according
                 to some internal precedence constraints.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Very general model assumptions, $G/G/1$ and
                 $G/G/\infty$ being marginal cases.",
  descriptors =  "Parallel computing; performance evaluation; queueing
                 network",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "database concurrency control; Design; parallel
                 processing; Performance; queuing networks; queuing
                 theory; stability theory; subadditive ergodic theory;
                 System Modeling and Analysis; Theory",
  subject =      "{\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Parallel processors. {\bf C.4}:
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS,
                 Modeling techniques. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Queueing theory. {\bf D.4.8}:
                 Software, OPERATING SYSTEMS, Performance, Stochastic
                 analysis.",
}

@Article{Mansour:1991:LBI,
  author =       "Yishay Mansour and Baruch Schieber and Prasoon
                 Tiwari",
  title =        "A Lower Bound for Integer Greatest Common Divisor
                 Computations",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "2",
  pages =        "453--471",
  month =        apr,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/103522.html",
  abstract =     "It is proved that no finite computation tree with
                 operations \{ +, -, *, /, mod, $<$ \} can decide
                 whether the greatest common divisor (gcd) of $a$ and
                 $b$ is one, for all pairs of integers $a$ and $b$. This
                 settles a problem posed by Gr{\"o}tschel et al.
                 Moreover, if the constants explicitly involved in any
                 operation performed in the tree are restricted to be
                 ``0'' and ``1'' (and any other constant must be
                 computed), then we prove an $\Omega(\log \log n)$ lower
                 bound on the depth of any computation tree with
                 operations \{ +, -, *, /, mod, $<$ \} that decides
                 whether the gcd of $a$ and $b$ is one, for all pairs of
                 $n$-bit integers $a$ and $b$.\par

                 A novel technique for handling the truncation operation
                 is implicit in the proof of this lower bound. In a
                 companion paper, other lower bounds for a large class
                 of problems are proved using a similar technique.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; floor operation; greatest common divisor;
                 lower bound; mod operation; theory; Theory of
                 Computation; truncation",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Number-theoretic computations.",
}

@Article{Condon:1991:SBP,
  author =       "Anne Condon",
  title =        "Space-Bounded Probabilistic Game Automata",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "2",
  pages =        "472--494",
  month =        apr,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/128681.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Arthur--Merlin games; interactive proof systems;
                 probabilistic game automata; theory; Theory of
                 Computation",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation. {\bf F.1.2}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes.",
}

@Article{Alon:1991:ESF,
  author =       "Noga Alon and A. K. Dewdney and Teunis J. Ott",
  title =        "Efficient Simulation of Finite Automata by Neural
                 Nets",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "2",
  pages =        "495--514",
  month =        apr,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/103523.html",
  abstract =     "Let $K$($m$) denote the smallest number with the
                 property that every $m$-state finite automaton can be
                 built as a neural net using $K$($m$) or fewer neurons.
                 A counting argument shows that $K(m)$ is at least
                 $\Omega((m \log m)^{1/3})$, and a construction shows
                 that $K( m)$ is at most $O(m^{3/4})$. The counting
                 argument and the construction allow neural nets with
                 arbitrarily complex local structure and thus may
                 require neurons that themselves amount to complicated
                 networks. Mild, and in practical situations almost
                 necessary, constraints on the local structure of the
                 network give, again by a counting argument and a
                 construction, lower and upper bounds for $K(m)$ that
                 are both linear in $m$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Finite Automata; Mealy machines; Neural Nets; theory;
                 Theory of Computation",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 F.1.1}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Self-modifying
                 machines.",
}

@Article{Leighton:1991:LE,
  author =       "Tom Leighton",
  title =        "Letter from the Editor",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "515--515",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "editorial",
}

@Article{Atallah:1991:OPA,
  author =       "Mikhail J. Atallah and Danny Z. Chen and Hubert
                 Wagener",
  title =        "An Optimal Parallel Algorithm for the Visibility of a
                 Simple Polygon from a Point",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "516--533",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116827.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Computational Geometry; intersections of
                 polygonal chains; parallel computational complexity;
                 simple polygons; theory; visible regions",
  subject =      "{\bf I.3.5}: Computing Methodologies, COMPUTER
                 GRAPHICS, Computational Geometry and Object Modeling,
                 Geometric algorithms, languages, and systems. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Geometrical problems and computations. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.1.0}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 General, Parallel algorithms.",
}

@Article{Imielinski:1991:AQP,
  author =       "Tomasz Imielinski",
  title =        "Abstraction in Query Processing",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "534--558",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 22:17:03 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116832.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "chase procedure; data dependencies; Database Theory;
                 incomplete information; languages; Management; theory;
                 verification",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf H.2.3}: Information
                 Systems, DATABASE MANAGEMENT, Languages, Query
                 languages. {\bf I.2.4}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Knowledge Representation
                 Formalisms and Methods, Predicate logic.",
}

@Article{Hsiang:1991:PRC,
  author =       "Jieh Hsiang and Micha{\"e}l Rusinowitch",
  title =        "Proving Refutational Completeness of Theorem-Proving
                 Strategies: {The} Transfinite Semantic Tree Method",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "559--587",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116833.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "complete simplification orderings; completeness;
                 first-order logic with equality; functional reflexive
                 axioms; Logic; paramodulation; refutational theorem
                 proving strategies; resolution; theory; transfinite
                 ordinals; transfinite semantic trees; verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Proof theory. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Deduction. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Resolution.",
}

@Article{Marek:1991:AL,
  author =       "Wiktor Marek and Miroslaw Truszczynski",
  title =        "Autoepistemic Logic",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "588--619",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116836.html",
  abstract =     "Autoepistemic logic is one of the principal modes of
                 nonmonotonic reasoning. It unifies several other modes
                 of nonmonotonic reasoning and has important application
                 in logic programming. In the paper, a theory of
                 autoepistemic logic is developed. This paper starts
                 with a brief survey of some of the previously known
                 results. Then, the nature of nonmonotonicity is studied
                 by investigating how membership of autoepistemic
                 statements in autoepistemic theories depends on the
                 underlying objective theory. A notion similar to
                 set-theoretic forcing is introduced. Expansions of
                 autoepistemic theories are also investigated.
                 Expansions serve as sets of consequences of an
                 autoepistemic theory and they can also be used to
                 define semantics for logic programs with negation.
                 Theories that have expansions are characterized, and a
                 normal form that allows the description of all
                 expansions of a theory is introduced. Our results imply
                 algorithms to determine whether a theory has a unique
                 expansion. Sufficient conditions (stratification) that
                 imply existence of a unique expansion are discussed.
                 The definition of stratified theories is extended and
                 (under some additional assumptions) efficient
                 algorithms for testing whether a theory is stratified
                 are proposed. The theorem characterizing expansions is
                 applied to two classes of theories, $K_{1}$-theories
                 and ae-programs. In each case, simple hypergraph
                 characterization of expansions of theories from each of
                 these classes is given. Finally, connections with
                 stable model semantics for logic programs with negation
                 is discussed. In particular, it is proven that the
                 problem of existence of stable models is NP-complete.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; autoepistemic logic; expansion; Logic;
                 logic programming; NP-completeness; stratification;
                 Theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Nonmonotonic reasoning and belief revision. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Logic programming. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Logic programming.",
}

@Article{vanGelder:1991:WFS,
  author =       "Allen {van Gelder} and Kenneth Ross and John S.
                 Schlipf",
  title =        "The Well-Founded Semantics for General Logic
                 Programs",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "620--650",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:25:13 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Preliminary abstract appeared in Seventh {ACM}
                 Symposium on Principles of Database Systems, March
                 1988, pp. 221--230.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116838.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "design; fixpoints; Languages; Logic Programming;
                 negation as failure; stable models; theory;
                 three-valued logic; unfounded sets; well-founded
                 models",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Logic
                 programming. {\bf H.2.4}: Information Systems, DATABASE
                 MANAGEMENT, Systems, Query processing. {\bf D.3.1}:
                 Software, PROGRAMMING LANGUAGES, Formal Definitions and
                 Theory, Semantics. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Nonmonotonic reasoning and belief
                 revision. {\bf H.2.1}: Information Systems, DATABASE
                 MANAGEMENT, Logical Design, Data models.",
}

@Article{Crochemore:1991:TWS,
  author =       "Maxime Crochemore and Dominique Perrin",
  title =        "Two-Way String Matching",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "651--675",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 22:24:43 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116845.html",
  abstract =     "A new string matching algorithm is presented, which
                 can be viewed as an intermediate between the classical
                 algorithms of Knuth, Morris, and Pratt on the one hand
                 and Boyer and Moore, on the other hand. The algorithm
                 is linear in time and uses constant space as the
                 algorithm of Galil and Seiferas. It presents the
                 advantage of being remarkably simple which consequently
                 makes its analysis possible. The algorithm relies on a
                 previously-known result in combinatorics on words,
                 called the {\em Critical Factorization Algorithm},
                 which relates the global period of a word to its local
                 repetitions of blocks.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; analysis of algorithms; combinatorial
                 algorithms; critical factorization theorem; Design;
                 pattern matching; String Processing; text processing;
                 theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Pattern matching.",
}

@Article{Ross:1991:OLB,
  author =       "Keith W. Ross and David D. Yao",
  title =        "Optimal Load Balancing and Scheduling in a Distributed
                 Computer System",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "676--690",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116847.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; load balancing; Management;
                 performance; queuing theory; scheduling; System
                 Modeling and Analysis; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sequencing and scheduling.
                 {\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Modeling techniques. {\bf C.2.4}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems.",
}

@Article{Goldreich:1991:PYN,
  author =       "Oded Goldreich and Silvio Micali and Avi Wigderson",
  title =        "Proofs that Yield Nothing But Their Validity or All
                 Languages in {NP} Have Zero-Knowledge Proof Systems",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "691--729",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Oct 25 11:41:42 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "They show that for a language $L$ in {\em NP\/} and a
                 string $w$ in $L$, there exists a probabilistic
                 interactive proof that efficiently demonstrates
                 membership of $x$ in $L$ without conveying additional
                 information. Previously, zero-knowledge proofs were
                 known only for some problems that were in both {\em
                 NP\/} and {\em co-NP}. A preliminary version of this
                 paper appeared in {\em Proc. 27th Ann. IEEE Symp. on
                 Foundations of Computer Science}, 1986, under the title
                 ``Proofs that yield nothing but their validity and a
                 methodology of cryptographic protocol design.''",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116852.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "cryptographic protocols; Design; fault-tolerant
                 distributed computing; graph isomorphism; interactive
                 proofs; languages; methodological design of protocols;
                 NP; one-way functions; proof systems; Security; theory;
                 Theory of Computation; Verification; zero-knowledge",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Proof theory.
                 {\bf E.4}: Data, CODING AND INFORMATION THEORY.",
}

@Article{Ozveren:1991:SSD,
  author =       "C{\"u}neyt M. {\"O}zveren and Alan S. Willsky and
                 Panos J. Antsaklis",
  title =        "Stability and Stabilizability of Discrete Event
                 Dynamic Systems",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "730--752",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116855.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Design; Languages; Reliability;
                 self-stabilizing systems; stability; stabilizability;
                 state feedback; theory; Theory of Computation",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sequencing and scheduling.",
}

@Article{Toran:1991:CCD,
  author =       "Jacobo Tor{\'a}n",
  title =        "Complexity Classes Defined by Counting Quantifiers",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "3",
  pages =        "753--774",
  month =        jul,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/116858.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; counting complexity classes; theory;
                 Theory of Computation",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Relations among
                 complexity classes. {\bf F.1.3}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Classes,
                 Complexity hierarchies. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Relativized computation.",
}

@Article{Stewart:1991:M,
  author =       "Bradley S. Stewart and Chelsea C. {White, III}",
  title =        "Multiobjective {A*}",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "4",
  pages =        "775--814",
  month =        oct,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/115368.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "A* multiobjective decision making; algorithms;
                 Artificial Intelligence; theory",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Heuristic methods. {\bf I.2.8}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search. {\bf I.2.8}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Problem Solving, Control Methods, and Search, Dynamic
                 programming. {\bf I.2.8}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Problem Solving, Control
                 Methods, and Search, Graph and tree search strategies.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Routing and
                 layout. {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Network
                 problems. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Path and circuit
                 problems.",
}

@Article{Gabow:1991:FSA,
  author =       "Harold N. Gabow and Robert E. Tarjan",
  title =        "Faster Scaling Algorithms for General Graph-Matching
                 Problems",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "4",
  pages =        "815--853",
  month =        oct,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/115366.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; augmenting path; blossom; Combinatorics
                 and Graph Theory; design; matching; network
                 optimization; performance; scaling; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 G.2.2}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Network problems. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures.",
}

@Article{Chan:1991:IRD,
  author =       "Edward P. F. Chan and H{\'e}ctor J. Hern{\'a}ndez",
  title =        "Independence-Reducible Database Schemes",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "4",
  pages =        "854--886",
  month =        oct,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/115362.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; chase; constant-time maintainable schemes;
                 Database Theory; design; functional dependencies;
                 independent database scheme; query evaluation;
                 representative instance; theory",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Normal forms. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Query
                 processing.",
}

@Article{Bloom:1991:FHL,
  author =       "Stephen L. Bloom and Zolt{\'a}n {\'E}sik",
  title =        "{Floyd-Hoare} Logic in Iteration Theories",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "4",
  pages =        "887--934",
  month =        oct,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/115352.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; correction assertions; Hoare logic; Logic;
                 theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming. {\bf F.3.1}: Theory of Computation, LOGICS
                 AND MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Assertions. {\bf I.1.2}:
                 Computing Methodologies, ALGEBRAIC MANIPULATION,
                 Algorithms, Algebraic algorithms.",
}

@Article{Halpern:1991:PML,
  author =       "Joseph Y. Halpern and Yoav Shoham",
  title =        "A Propositional Modal Logic of Time Intervals",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "4",
  pages =        "935--962",
  month =        oct,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/115351.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "axiomatizability; Logic; modal logic; temporal logic;
                 temporal reasoning; theory; time intervals",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic. {\bf I.2.4}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Knowledge Representation Formalisms and Methods,
                 Representation languages. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Complexity of proof procedures. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Logics of programs.",
}

@Article{Tiomkin:1991:NDM,
  author =       "Michael Tiomkin and Michael Kaminski",
  title =        "Nonmonotonic Default Modal Logics",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "4",
  pages =        "963--984",
  month =        oct,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/115350.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "deduction theorem for modal logic; Logic; modal logic;
                 theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Nonmonotonic reasoning and belief revision. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic. {\bf I.2.4}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Knowledge Representation Formalisms and Methods.",
}

@Article{Balas:1991:PSA,
  author =       "Egon Balas and Donald Miller and Joseph Pekny and
                 Paolo Toth",
  title =        "A Parallel Shortest Augmenting Path Algorithm for the
                 Assignment Problem",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "4",
  pages =        "985--1004",
  month =        oct,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1991.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/115349.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "A parallel version of the shortest augmenting path
                 algorithm for the assignment problem is described.",
  descriptors =  "Routing; shortest path; parallel computing; speedup",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; assignment; design; experimentation;
                 matching; Operations Research; performance; shortest
                 augmenting paths; traveling salesman problem",
  subject =      "{\bf G.1.0}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, General, Parallel algorithms. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory. {\bf G.1.6}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, Optimization, Linear programming.
                 {\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations on matrices. {\bf I.1.2}:
                 Computing Methodologies, ALGEBRAIC MANIPULATION,
                 Algorithms, Analysis of algorithms. {\bf G.1.3}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, Numerical
                 Linear Algebra, Sparse and very large systems. {\bf
                 C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Parallel processors. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics.",
}

@Article{Glasserman:1991:SCP,
  author =       "Paul Glasserman",
  title =        "Structural Conditions for Perturbation Analysis of
                 Queuing Systems",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "4",
  pages =        "1005--1025",
  month =        oct,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/115348.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; gradient estimation; networks of
                 queues; performance; Performance Analysis; perturbation
                 analysis; sensitivity analysis; simulation; theory",
  subject =      "{\bf G.m}: Mathematics of Computing, MISCELLANEOUS,
                 Queueing theory. {\bf I.6.1}: Computing Methodologies,
                 SIMULATION AND MODELING, Simulation Theory. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS.
                 {\bf I.6.6}: Computing Methodologies, SIMULATION AND
                 MODELING, Simulation Output Analysis.",
}

@Article{Berger:1991:SWI,
  author =       "Bonnie Berger and John Rompel",
  title =        "Simulating ($\log^{c}n$)-Wise Independence in ${NC}$",
  journal =      j-J-ACM,
  volume =       "38",
  number =       "4",
  pages =        "1026--1046",
  month =        oct,
  year =         "1991",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 22:29:59 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/115347.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; discrepancy; removing randomness; theory;
                 Theory of Computation",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Probabilistic
                 computation. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency. {\bf G.3}: Mathematics of
                 Computing, PROBABILITY AND STATISTICS, Probabilistic
                 algorithms (including Monte Carlo). {\bf F.2.2}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms.",
}

@Article{Chazelle:1992:OAI,
  author =       "Bernard Chazelle and Herbert Edelsbrunner",
  title =        "An Optimal Algorithm for Intersecting Line Segments in
                 the Plane",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "1",
  pages =        "1--54",
  month =        jan,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/147511.html",
  abstract =     "The main contribution of this work is an $O(n \log n +
                 k)$-time algorithm for computing all $k$ intersections
                 among $n$ line segments in the plane. This time
                 complexity is easily shown to be optimal. Within the
                 same asymptotic cost, our algorithm can also construct
                 the subdivision of the plane defined by the segments
                 and compute which segment (if any) lies right above (or
                 below) each intersection and each endpoint. The
                 algorithm has been implemented and performs very well.
                 The storage requirement is on the order of $n$ + $k$ in
                 the worst case, but it is considerably lower in
                 practice. To analyze the complexity of the algorithm,
                 an amortization argument based on a new combinatorial
                 theorem on line arrangements is used.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Computational Geometry; intersection;
                 segments; Theory; topological sweep",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics.",
}

@Article{Upfal:1992:DPR,
  author =       "Eli Upfal",
  title =        "An ${O}(\log{N})$ Deterministic Packet-Routing
                 Scheme",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "1",
  pages =        "55--70",
  month =        jan,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 22:31:56 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/147517.html",
  abstract =     "A deterministic $O(\log N)$-time algorithm for the
                 problem of routing an arbitrary permutation on an
                 $N$-processor bounded-degree network with bounded
                 buffers is presented.\par

                 Unlike all previous deterministic solutions to this
                 problem, our routing scheme does not reduce the routing
                 problem to sorting and does not use the sorting network
                 of Ajtai, et al. [1]. Consequently, the constant in the
                 run time of our routing scheme is substantially
                 smaller, and the network topology is significantly
                 simpler.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Computer Systems; design; deterministic
                 routing; network routing; parallel computer;
                 performance; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Circuit switching networks. {\bf C.2.1}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Network Architecture and Design, Distributed
                 networks. {\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network communications. {\bf C.2.1}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Network Architecture and Design, Network
                 topology. {\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Packet networks. {\bf G.2.2}: Mathematics
                 of Computing, DISCRETE MATHEMATICS, Graph Theory,
                 Network problems. {\bf C.1.2}: Computer Systems
                 Organization, PROCESSOR ARCHITECTURES, Multiple Data
                 Stream Architectures (Multiprocessors), Interconnection
                 architectures.",
}

@Article{Demolombe:1992:SCS,
  author =       "Robert Demolombe",
  title =        "Syntactical Characterization of a Subset of
                 Domain-Independent Formulas",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "1",
  pages =        "71--94",
  month =        jan,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/147520.html",
  abstract =     "A domain-independent formula of first-order predicate
                 calculus is a formula whose evaluation in a given
                 interpretation does not change when we add a new
                 constant to the interpretation domain. The formulas
                 used to express queries, integrity constraints or
                 deductive rules in the database field that have an
                 intuitive meaning are domain independent. That is the
                 reason why this class is of great interest in practice.
                 Unfortunately, this class is not decidable, and the
                 problem is to characterize new subclasses, as large as
                 possible, which are decidable. A syntactic
                 characterization of a class of formulas, the Evaluable
                 formulas, which are proved to be domain independent are
                 provided. This class is defined only for function-free
                 formulas. It is also proved that the class of evaluable
                 formulas contains the other classes of syntactically
                 characterized domain-independent formulas usually found
                 in the literature, namely, range-separable formulas and
                 range-restricted formulas. Finally, it is shown that
                 the expressive power of evaluable formulas is the same
                 as that of domain-independent formulas. That is, each
                 domain-independent formula admits an equivalent
                 evaluable one. An important advantage of this
                 characterization is that, to check if a formula is
                 evaluable, it is not necessary to transform it to a
                 normal form, as is the case for range-restricted
                 formulas.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Database Theory; Languages; relational model; Theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Model theory.
                 {\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Query languages. {\bf H.3.3}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Information
                 Search and Retrieval, Query formulation.",
}

@Article{Goguen:1992:IAM,
  author =       "Joseph A. Goguen and Rod M. Burstall",
  title =        "Institutions: {Abstract} Model Theory for
                 Specification and Programming",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "1",
  pages =        "95--146",
  month =        jan,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/algebraic.spec.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Draft, as Report ECS-LFCS-90-106, Computer Science
                 Department, University of Edinburgh, January 1990; an
                 ancestor is ``Introducing Institutions,'' in {\em
                 Proceedings, Logics of Programming Workshop}, Edward
                 Clarke and Dexter Kozen, editors, Springer Lecture
                 Notes in Computer Science, Volume 164, pages 221--256,
                 1984",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/147524.html",
  abstract =     "There is a population explosion among the logical
                 systems used in computing science. Examples include
                 first-order logic, equational logic, Horn-clause logic,
                 higher-order logic, infinitary logic, dynamic logic,
                 intuitionistic logic, order-sorted logic, and temporal
                 logic; moreover, there is a tendency for each theorem
                 prover to have its own idiosyncratic logical system.
                 The concept of {\em institution\/} is introduced to
                 formalize the informal notion of ``logical system.''
                 The major requirement is that there is a satisfaction
                 relation between models and sentences that is
                 consistent under change of notation. Institutions
                 enable abstracting away from syntactic and semantic
                 detail when working on language structure
                 ``in-the-large''; for example, we can define language
                 features for building large logical system. This
                 applies to both specification languages and programming
                 languages. Institutions also have applications to such
                 areas as database theory and the semantics of
                 artificial and natural languages. A first main result
                 of this paper says that any institution such that
                 signatures (which define notation) can be glued
                 together, also allows gluing together theories (which
                 are just collections of sentences over a fixed
                 signature). A second main result considers when theory
                 structuring is preserved by institution morphisms. A
                 third main result gives conditions under which it is
                 sound to use a theorem prover for one institution on
                 theories from another. A fourth main result shows how
                 to extend institutions so that their theories may
                 include, in addition to the original sentences, various
                 kinds of constraint that are useful for defining
                 abstract data types, including both ``data'' and
                 ``hierarchy'' constraints. Further results show how to
                 define institutions that allow sentences and
                 constraints from two or more institutions. All our
                 general results apply to such ``duplex'' and
                 ``multiplex'' institutions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Language; languages; Programming Languages and
                 Methodology; Theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Model theory.
                 {\bf F.3.2}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Semantics of Programming Languages. {\bf
                 F.3.3}: Theory of Computation, LOGICS AND MEANINGS OF
                 PROGRAMS, Studies of Program Constructs. {\bf F.4.1}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic.",
}

@Article{Aceto:1992:TDD,
  author =       "L. Aceto and M. Hennessy",
  title =        "Termination, Deadlock, and Divergence",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "1",
  pages =        "147--187",
  month =        jan,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/147527.html",
  abstract =     "In this paper, a process algebra that incorporates
                 explicit representations of successful termination,
                 deadlock, and divergence is introduced and its semantic
                 theory is analyzed. Both an operational and a
                 denotational semantics for the language is given and it
                 is shown that they agree. The operational theory is
                 based upon a suitable adaptation of the notion of
                 bisimulation preorder. The denotational semantics for
                 the language is given in terms of the initial
                 continuous algebra that satisfies a set of equations
                 $E, CI^{E}$. It is shown that $CI^{E}$ is fully
                 abstract with respect to our choice of behavioral
                 preorder. Several results of independent interest are
                 obtained; namely, the finite approximability of the
                 behavioral preorder and a partial completeness result
                 for the set of equations $E$ with respect to the
                 preorder.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  issue =        "1",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Languages; Programming Languages and Methodology;
                 Theory",
  subject =      "{\bf F.3.2}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages, Operational semantics. {\bf D.4.1}:
                 Software, OPERATING SYSTEMS, Process Management,
                 Deadlocks.",
}

@Article{Dowdy:1992:SCB,
  author =       "Lawrence W. Dowdy and Brian M. Carlson and Alan T.
                 Krantz and Satish K. Tripathi",
  title =        "Single-Class Bounds of Multi-Class Queuing Networks",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "1",
  pages =        "188--213",
  month =        jan,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/147530.html",
  abstract =     "In a closed, separable, queuing network model of a
                 computer system, the number of customer classes is an
                 input parameter. The number of classes and the class
                 compositions are assumptions regarding the
                 characteristics of the system's workload. Often, the
                 number of customer classes and their associated device
                 demands are unknown or are unmeasurable parameters of
                 the system. However, when the system is viewed as
                 having a single composite customer class, the aggregate
                 single-class parameters are more easily
                 obtainable.\par

                 This paper addresses the error made when constructing a
                 single-class model of a multi-class system. It is shown
                 that the single-class model pessimistically bounds, the
                 performance of the multi-class system. Thus, given a
                 multi-class system, the corresponding single-class
                 model can be constructed with the assurance that the
                 actual system performance is better than that given by
                 the single-class model. In the worst case, it is shown
                 that the throughput given by the single-class model
                 underestimates the actual multi-class throughput by, at
                 most, 50\%. Also, lower bounds are provided for the
                 number of necessary customer classes, given observed
                 device utilizations. This information is useful to
                 clustering analysis techniques as well as to analysts
                 who must obtain class-specific device demands.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  descriptors =  "Queueing network; product form",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "bounding analysis; performance; product-form networks;
                 queuing networks; System Modeling and Analysis;
                 theory",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Modeling and prediction. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Queueing theory. {\bf
                 C.4}: Computer Systems Organization, PERFORMANCE OF
                 SYSTEMS, Modeling techniques. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Modeling and
                 prediction.",
}

@Article{Bellare:1992:HSG,
  author =       "Mihir Bellare and Silvio Micali",
  title =        "How to Sign Given Any Trapdoor Permutation",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "1",
  pages =        "214--233",
  month =        jan,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/147537.html",
  abstract =     "A digital signature scheme is presented, which is
                 based on the existence of any trapdoor permutation. The
                 scheme is secure in the strongest possible natural
                 sense: namely, it is secure against existential forgery
                 under adaptive chosen message attack.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; cryptography; digital signatures;
                 randomness; Security; Theory; Theory of Computation;
                 trapdoor functions",
  subject =      "{\bf F.2.m}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Miscellaneous. {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection. {\bf D.4.6}: Software, OPERATING SYSTEMS,
                 Security and Protection, Authentication. {\bf D.4.6}:
                 Software, OPERATING SYSTEMS, Security and Protection,
                 Cryptographic controls. {\bf E.3}: Data, DATA
                 ENCRYPTION.",
}

@Article{Allender:1992:LBL,
  author =       "Eric Allender and Lane A. Hemachandra",
  title =        "Lower Bounds for the Low Hierarchy",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "1",
  pages =        "234--251",
  month =        jan,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/147546.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "low hierarchy; lower bounds; sparse sets; theory;
                 Theory of Computation",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Complexity
                 hierarchies. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism.",
}

@Article{Dillencourt:1992:GAC,
  author =       "Michael B. Dillencourt and Hanan Samet and Markku
                 Tamminen",
  title =        "A General Approach to Connected-Component Labelling
                 for Arbitrary Image Representations",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "2",
  pages =        "253--280",
  month =        apr,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See also \cite{Dillencourt:1992:CGA}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/128750.html",
  abstract =     "An improved and general approach to
                 connected-component labeling of images is presented.
                 The algorithm presented in this paper processes images
                 in {\em predetermined order}, which means that the
                 processing order depends only on the image
                 representation scheme and not on specific properties of
                 the image. The algorithm handles a wide variety of
                 image representation schemes (rasters, run lengths,
                 quadrees, bintrees, etc.). How to adapt the standard
                 UNION-FIND algorithm to permit reuse of temporary
                 labels is shown. This is done using a technique called
                 {\em age balancing}, in which, when two labels are
                 merged, the older label becomes the father of the
                 younger label. This technique can be made to coexist
                 with the more conventional rule of {\em weight
                 balancing}, in which the label with more descendants
                 becomes the father of the label with fewer descendants.
                 Various image scanning orders are examined and
                 classified. It is also shown that when the algorithm is
                 specialized to a pixel array scanned in raster order,
                 the total processing time is linear in the number of
                 pixels. The linear-time processing time follows from a
                 special property of the UNION-FIND algorithm, which may
                 be of independent interest. This property states that
                 under certain restrictions on the input, UNION-FIND
                 runs in time linear in the number of FIND and UNION
                 operations. Under these restrictions, linear-time
                 performance can be achieved without resorting to the
                 more complicated Gabow-Tarjan algorithm for disjoint
                 set union.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Data Structures and Algorithms;
                 performance; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf I.4.10}: Computing Methodologies,
                 IMAGE PROCESSING, Image Representation. {\bf I.3.5}:
                 Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Curve,
                 surface, solid, and object representations. {\bf
                 G.2.2}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Graph algorithms.",
}

@Article{Katajainen:1992:ALM,
  author =       "Jyrki Katajainen and Timo Raita",
  title =        "An Analysis of the Longest Match and the Greedy
                 Heuristics in Text Encoding",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "2",
  pages =        "281--294",
  month =        apr,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/128751.html",
  abstract =     "Text compression is often done using a fixed,
                 previously formed dictionary (code book) that expresses
                 which substrings of the text can be replaced by code
                 words. There always exists an optimal solution for
                 text-encoding problem. Due to the long processing times
                 of the various optimal algorithms, several heuristics
                 have been proposed in the literature. In this paper,
                 the worst-case compression gains obtained by the
                 longest match and the greedy heuristics for various
                 types of dictionaries is studied. For general
                 dictionaries, the performance of the heuristics can be
                 almost the weakest possible. In practice, however, the
                 dictionaries have usually properties that lead to a
                 space-optimal or near-space-optimal coding result with
                 the heuristics.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Data Structures and Algorithms; optimal
                 and heuristic encoding; performance; shortest paths;
                 textual substitution; Theory",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY, Data
                 compaction and compression. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Path and
                 circuit problems.",
}

@Article{Ramesh:1992:NPM,
  author =       "R. Ramesh and I. V. Ramakrishnan",
  title =        "Nonlinear Pattern Matching in Trees",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "2",
  pages =        "295--316",
  month =        apr,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/128752.html",
  abstract =     "Tree pattern matching is a fundamental operation that
                 is used in a number of programming tasks such as
                 mechanical theorem proving, term rewriting, symbolic
                 computation, and nonprocedural programming languages.
                 In this paper, we present new sequential algorithms for
                 nonlinear pattern matching in trees. Our algorithm
                 improves upon know tree pattern matching algorithms in
                 important aspects such as time performance, ease of
                 integration with several reduction strategies and
                 ability to avoid unnecessary computation steps on match
                 attempts that fail. The expected time complexity of our
                 algorithm is linear in the sum of the sizes of the two
                 trees.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Data Structures and Algorithms; languages;
                 nonlinear pattern matching; normalization; performance;
                 rewriting; theorem proving; Theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Pattern matching. {\bf F.4.1}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic, Mechanical theorem
                 proving. {\bf F.4.2}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Grammars and
                 Other Rewriting Systems. {\bf E.1}: Data, DATA
                 STRUCTURES, Trees.",
}

@Article{Sprugnoli:1992:GBT,
  author =       "Renzo Sprugnoli",
  title =        "The Generation of Binary Trees as a Numerical
                 Problem",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "2",
  pages =        "317--327",
  month =        apr,
  year =         "1992",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/128749.128753",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 22 07:42:24 2011",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/128753.html",
  abstract =     "The problem of generating random, uniformly
                 distributed, binary trees is considered. A closed
                 formula that counts the number of trees having a left
                 subtree with $k-1$ nodes $ (k=1,2, \ldots{},n)$ is
                 found. By inverting the formula, random trees with $n$
                 nodes are generated according to the appropriate
                 probability distribution, determining the number of
                 nodes in the left and right subtrees that can be
                 generated recursively. The procedure is shown to run in
                 time $O(n)$, occupying an extra space in the order of
                 $O(\sqrt{n})$",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; binary trees; Data Structures and
                 Algorithms; generation of binary trees; performance;
                 theory",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms.",
}

@Article{Fagin:1992:WCM,
  author =       "Ronald Fagin and Joseph Y. Halpern and Moshe Y.
                 Vardi",
  title =        "What Can Machines Know? {On} the Properties of
                 Knowledge in Distributed Systems",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "2",
  pages =        "328--376",
  month =        apr,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/150945.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "axioms; distributed knowledge; Logic; properties of
                 knowledge; reasoning about knowledge; theory",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf D.2.4}: Software, SOFTWARE ENGINEERING, Program
                 Verification. {\bf D.2.10}: Software, SOFTWARE
                 ENGINEERING, Design, Methodologies. {\bf F.3.1}: Theory
                 of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs.
                 {\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods.",
}

@Article{Gallier:1992:TPU,
  author =       "Jean Gallier and Paliath Narendran and Stan Raatz and
                 Wayne Snyder",
  title =        "Theorem Proving Using Equational Matings and Rigid
                 ${E}$--Unification",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "2",
  pages =        "377--429",
  month =        apr,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/128754.html",
  abstract =     "In this paper, it is shown that the method of matings
                 due to Andrews and Bibel can be extended to
                 (first-order) languages with equality. A decidable
                 version of $E$-unification called rigid $E$-unification
                 is introduced, and it is shown that the method of
                 equational matings remains complete when used in
                 conjunction with rigid $E$-unification. Checking that a
                 family of mated sets is an equational mating is
                 equivalent to the following restricted kind of
                 $E$-unification.\par

                 Problem Given $\vec E = \{E_{i}| 1<=i<=n\}$ a family of
                 $n$ finite sets of equations and $S=\{\langle
                 u_{i},v_{i} \rangle | 1<=i<=n\}$ a set of $n$ pairs of
                 terms, is there a substitution $ \theta$ such that,
                 treating each set $ \theta(E_{i})$ as a set of ground
                 equations (i.e., holding the variables in $
                 \theta(E_{i})$ ``rigid''), $ \theta(u_{i})$, and $
                 \theta(v_{i})$ are provably equal from $ \theta(E_{i})$
                 for $ i=1, \ldots{},n$?\par

                 Equivalently, is there a substitution $ \theta$ such
                 that $ \theta(u_{i})$ and $ \theta(v_{i})$ can be shown
                 congruent from $ \theta(E_{i})$ by the congruence
                 closure method for $ i=1, \ldots{},n$?\par

                 A substitution $ \theta$ solving the above problem is
                 called a rigid $ \vec E$-unifier of $S$, and a pair
                 $\langle \vec E,S \rangle$ such that $S$ has some rigid
                 $ \vec E$-unifier is called an equational premating. It
                 is show that deciding whether a pair $ \vec E,S$ is an
                 equational premating is an NP-complete problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; automated theorem proving; equational
                 reasoning; Knuth--Bendix procedure; Languages; Logic;
                 matings; NP-completeness; performance; Theory;
                 unification",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Reducibility and
                 completeness. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Complexity of
                 proof procedures. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Computational logic. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Mechanical theorem proving. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Proof theory.
                 {\bf I.1.3}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Languages and Systems, Special-purpose
                 algebraic systems. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Deduction. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Metatheory. {\bf I.1.2}: Computing
                 Methodologies, ALGEBRAIC MANIPULATION, Algorithms,
                 Algebraic algorithms.",
}

@Article{Myers:1992:FRA,
  author =       "Gene Myers",
  title =        "A Four {Russians} Algorithm for Regular Expression
                 Pattern Matching",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "2",
  pages =        "430--448",
  month =        apr,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 22:42:43 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/128755.html",
  abstract =     "Given a regular expression $R$ of length $P$ and a
                 word $A$ of length $N$, the membership problem is to
                 determine if $A$ is in the language denoted by $R$. An
                 $O(PN/\lg N)$ time algorithm is presented that is based
                 on a $\lg N$ speedup of the standard $O(PN)$ time
                 simulation of $R$'s nondeterministic finite automaton
                 on $A$ using a combination of the node-listing and
                 ``Four-Russians'' paradigms. This result places a new
                 worst-case upper bound on regular expression pattern
                 matching. Moreover, in practice the method provides an
                 implementation that is faster than existing software
                 for small regular expressions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; finite automaton; Four Russians paradigm;
                 note listing; performance; regular expression; String
                 Processing; Theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Pattern matching. {\bf I.1.2}:
                 Computing Methodologies, ALGEBRAIC MANIPULATION,
                 Algorithms, Analysis of algorithms. {\bf I.5.0}:
                 Computing Methodologies, PATTERN RECOGNITION, General.
                 {\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation.",
}

@Article{Halpern:1992:LKG,
  author =       "Joseph Y. Halpern and Lenore D. Zuck",
  title =        "A Little Knowledge Goes a Long Way: {Knowledge-Based}
                 Derivations and Correctness Proofs for a Family of
                 Protocols",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "449--478",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146638.html",
  abstract =     "A high-level, knowledge-based approach for deriving a
                 family of protocols for the {\em sequence
                 transmission\/} problem is presented. The protocols of
                 Aho et al. [2, 3], the Alternating Bit protocol [5],
                 and Stenning's protocol [44] are all instances of one
                 knowledge-based protocol that is derived. The
                 derivation in this paper leads to transparent and
                 uniform correctness proofs for all these protocols.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; design; Distributed Computing; reasoning
                 about knowledge; Reliability; Theory; Verification",
  subject =      "{\bf F.3.1}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs. {\bf D.2.4}: Software,
                 SOFTWARE ENGINEERING, Program Verification, Correctness
                 proofs. {\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol verification. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems. {\bf D.2.1}: Software, SOFTWARE
                 ENGINEERING, Requirements/Specifications. {\bf D.2.2}:
                 Software, SOFTWARE ENGINEERING, Tools and Techniques.
                 {\bf D.2.10}: Software, SOFTWARE ENGINEERING, Design,
                 Methodologies.",
}

@Article{Heath:1992:PGG,
  author =       "Lenwood S. Heath and Sorin Istrail",
  title =        "The Pagenumber of Genus $g$ Graphs is ${O}(g)$",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "479--501",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146643.html",
  abstract =     "In 1979, Bernhart and Kainen conjectured that graphs
                 of fixed genus $g \geq 1$ have unbounded pagenumber. In
                 this paper, it is proven that genus $g$ graphs can be
                 embedded in $O(g)$ pages, thus disproving the
                 conjecture. An $\Omega( g^{1/2})$ lower bound is also
                 derived. The first algorithm in the literature for
                 embedding an arbitrary graph in a book with a
                 non-trivial upper bound on the number of pages is
                 presented. First, the algorithm computes the genus $g$
                 of a graph using the algorithm of Filotti, Miller, Reif
                 (1979), which is polynomial-time for fixed genus.
                 Second, it applies an optimal-time algorithm for
                 obtaining an $O(g)$-page book embedding. Separate book
                 embedding algorithms are given for the cases of graphs
                 embedded in orientable and nonorientable surfaces. An
                 important aspect of the construction is a new
                 decomposition theorem, of independent interest, for a
                 graph embedded on a surface. Book embedding has
                 application in several areas, two of which are directly
                 related to the results obtained: fault-tolerant VLSI
                 and complexity theory.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; book embeddings; graph genus; Graph
                 Theory; homotopy classes; planar-nonplanar
                 decomposition; surface embeddings; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 I.1.2}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Algorithms, Analysis of algorithms. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Routing and layout.",
}

%% Page 160 is title page
@Article{Billionnet:1992:EAT,
  author =       "A. Billionnet and M. C. Costa and A. Sutter",
  title =        "An Efficient Algorithm for a Task Allocation Problem",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "502--518",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146646.html",
  abstract =     "This paper presents an efficient algorithm to solve
                 one of the task allocation problems. Task assignment in
                 an heterogeneous multiple processors system is
                 investigated. The cost function is formulated in order
                 to measure the intertask communication and processing
                 costs in an uncapacited network. A formulation of the
                 problem in terms of the minimization of a submodular
                 quadratic pseudo-Boolean function with assignment
                 constraints is then presented. The use of a
                 branch-and-bound algorithm using a Lagrangean
                 relaxation of these constraints is proposed. The lower
                 bound is the value of an approximate solution to the
                 Lagrangean dual problem. A zero-duality gap, that is, a
                 saddle point, is characterized by checking the
                 consistency of a pseudo-Boolean equation. A solution is
                 found for large-scale problems (e.g., 20 processors, 50
                 tasks, and 200 task communications or 10 processors,
                 100 tasks, and 300 task communications). Excellent
                 experimental results were obtained which are due to the
                 weak frequency of a duality gap and the efficient
                 characterization of the zero-gap (for practical
                 purposes, this is achieved in linear time). Moreover,
                 from the saddle point, it is possible to derive the
                 optimal task assignment.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; branch-and-bound algorithm; Design;
                 interprocessor communication; Lagrangian relaxation;
                 Measurement; Operations Research; Performance;
                 quadratic $0$--$1$ optimization; task allocation",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Modeling
                 techniques. {\bf D.4.1}: Software, OPERATING SYSTEMS,
                 Process Management, Multiprocessing/multiprogramming.
                 {\bf D.4.7}: Software, OPERATING SYSTEMS, Organization
                 and Design, Distributed systems. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms.",
}

@Article{Eppstein:1992:SDPa,
  author =       "David Eppstein and Zvi Galil and Raffaele Giancarlo
                 and Giuseppe F. Italiano",
  title =        "Sparse Dynamic Programming {I}: {Linear} Cost
                 Functions",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "519--545",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146650.html",
  abstract =     "Dynamic programming solutions to a number of different
                 recurrence equations for sequence comparison and for
                 RNA secondary structure prediction are considered.
                 These recurrences are defined over a number of points
                 that is quadratic in the input size; however only a
                 sparse set matters for the result. Efficient algorithms
                 for these problems are given, when the weight functions
                 used in the recurrences are taken to be linear. The
                 time complexity of the algorithms depends almost
                 linearly on the number of points that need to be
                 considered; when the problems are sparse this results
                 in a substantial speed-up over known algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; dynamic programming; recurrence; sequence
                 alignment; sparsity; String Processing; theory; time
                 complexity",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures.",
}

@Article{Eppstein:1992:SDPb,
  author =       "David Eppstein and Zvi Galil and Raffaele Giancarlo
                 and Giuseppe F. Italiano",
  title =        "Sparse Dynamic Programming {II}: {Convex} and Concave
                 Cost Functions",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "546--567",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146656.html",
  abstract =     "Dynamic programming solutions to two recurrence
                 equations, used to compute a sequence alignment from a
                 set of matching fragments between two strings, and to
                 predict RNA secondary structure, are considered. These
                 recurrences are defined over a number of points that is
                 quadratic in the input size; however, only a sparse set
                 matters for the result. Efficient algorithms are given
                 for solving these problems, when the cost of a gap in
                 the alignment or a loop in the secondary structure is
                 taken as a convex or concave function of the gap or
                 loop length. The time complexity of our algorithms
                 depends almost linearly on the number of points that
                 need to be considered; when the problems are sparse,
                 this results in a substantial speed-up over known
                 algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; dynamic programming; recurrence; sequence
                 alignment; sparsity; String Processing; theory; time
                 complexity",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures.",
}

@Article{Greenberg:1992:HFF,
  author =       "Albert G. Greenberg and Neal Madras",
  title =        "How Fair is Fair Queuing?",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "568--598",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1992.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146658.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "In this paper, we consider two variants of the fair
                 queuing discipline, and rigorously establish their
                 fairness via sample path comparisons with the
                 head-of-line processor sharing discipline, a
                 mathematical idealization that provides a fairness
                 paradigm. An efficient implementation of one of the
                 fair queuing disciplines is presented. In passing, a
                 new, fast method for simulating processor sharing is
                 derived. Simulation results are presented.",
  descriptors =  "Queueing theory; design; performance evaluation;
                 verification; network operating system; process
                 management",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Design; Management; Performance; System Modeling and
                 Analysis; theory; Verification",
  subject =      "{\bf G.m}: Mathematics of Computing, MISCELLANEOUS,
                 Queueing theory.",
}

@Article{Beaudry:1992:MPA,
  author =       "M. Beaudry and P. McKenzie and D. Th{\'e}rien",
  title =        "The Membership Problem in Aperiodic Transformation
                 Monoids",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "599--616",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146661.html",
  abstract =     "The problem of testing membership in aperiodic or
                 ``group-free'' transformation monoids is the natural
                 counterpart to the well-studied membership problem in
                 permutation groups. The class {\bf A} of all finite
                 aperiodic monoids and the class {\bf G} of all finite
                 groups are two examples of {\em varieties}, the
                 fundamental complexity units in terms of which finite
                 monoids are classified. The collection of all varieties
                 {\bf V} forms an infinite lattice under the inclusion
                 ordering, with the subfamily of varieties that are
                 contained in {\bf A} forming an infinite sublattice.
                 For each $\mbox{\bf V} \subseteq \mbox{\bf A}$, the
                 associated problem MEMB({\bf V}) of testing membership
                 in transformation monoids that belong to {\bf V}, is
                 considered. Remarkably, the computational complexity of
                 each such problem turns out to look familiar. Moreover,
                 only five possibilities occur as {\bf V} ranges over
                 the whole aperiodic sublattice: With one family of
                 NP-hard exceptions whose exact status is still
                 unresolved, any such MEMB({\bf V}) is either
                 PSPACE-complete, NP-complete, P-complete or in
                 $AC^{0}$. These results thus uncover yet another
                 surprisingly tight link between the theory of monoids
                 and computational complexity theory.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory; Theory of Computation",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Complexity
                 hierarchies. {\bf F.1.3}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Classes,
                 Reducibility and completeness. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity classes.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Automata. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Bounded-action devices. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Unbounded-action devices.",
}

@Article{Ben-Amram:1992:PVA,
  author =       "Amir M. Ben-Amram and Zvi Galil",
  title =        "On Pointers versus Addresses",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "617--648",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146666.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; incompressibility; pointer structures;
                 random access memory; theory; Theory of Computation",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation. {\bf E.1}:
                 Data, DATA STRUCTURES.",
}

@Article{Gasarch:1992:LQ,
  author =       "William I. Gasarch and Carl H. Smith",
  title =        "Learning via Queries",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "649--674",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "A shorter version is in 29th FOCS conference, 1988,
                 pp. 130-137",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146670.html",
  abstract =     "Traditional work in inductive inference has been to
                 model a learner receiving data about a function $f$ and
                 trying to learn the function. The data is usually just
                 the values $f(0), f(1), \ldots$. The scenario is
                 modeled so that the learner is also allowed to ask
                 questions about the data (e.g., $\forall x [x > 17
                 \Rightarrow f(x) = 0]$?). An important parameter is the
                 language that the learner may use to formulate queries.
                 We show that for most languages a learner can learn
                 more by asking questions than by passively receiving
                 data. Mathematical tools used include the solution to
                 Hilbert's tenth problem, the decidability of
                 Presuburger arithmetic, and $\omega$-automata.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "\omega automata; Inductive Inference; learning by
                 example; learning via a teacher; Machine Learning;
                 theory; Theory of Computation",
  subject =      "{\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Induction. {\bf F.1.1}: Theory
                 of Computation, COMPUTATION BY ABSTRACT DEVICES, Models
                 of Computation, Automata. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Relations among models. {\bf F.1.1}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Models of Computation, Unbounded-action devices. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Recursive
                 function theory. {\bf I.2.6}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Learning, Induction.",
}

@Article{German:1992:RAS,
  author =       "Steven M. German and A. Prasad Sistla",
  title =        "Reasoning about Systems with Many Processes",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "675--735",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146681.html",
  abstract =     "Methods are given for automatically verifying temporal
                 properties of concurrent systems containing an
                 arbitrary number of finite-state processes that
                 communicate using CCS actions. TWo models of systems
                 are considered. Systems in the first model consist of a
                 unique {\em control\/} process and an arbitrary number
                 of {\em user\/} processes with identical definitions.
                 For this model, a decision procedure to check whether
                 all the executions of a process satisfy a given
                 specification is presented. This algorithm runs in time
                 double exponential in the sizes of the control and the
                 user process definitions. It is also proven that it is
                 decidable whether all the fair executions of a process
                 satisfy a given specification. The second model is a
                 special case of the first. In this model, all the
                 processes have identical definitions. For this model,
                 an efficient decision procedure is presented that
                 checks if every execution of a process satisfies a
                 given temporal logic specification. This algorithm runs
                 in time polynomial in the size of the process
                 definition. It is shown how to verify certain global
                 properties such as mutual exclusion and absence of
                 deadlocks. Finally, it is shown how these decision
                 procedures can be used to reason about certain systems
                 with a communication network.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Performance; Theory; Theory of
                 Computation; Verification",
  subject =      "{\bf I.2.2}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Automatic Programming, Program
                 verification. {\bf D.4.1}: Software, OPERATING SYSTEMS,
                 Process Management, Concurrency. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Automata. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency.",
}

@Article{Raz:1992:MCM,
  author =       "Ran Raz and Avi Wigderson",
  title =        "Monotone Circuits for Matching Require Linear Depth",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "3",
  pages =        "736--744",
  month =        jul,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146684.html",
  abstract =     "It is proven that monotone circuits computing the
                 perfect matching function on $n$-vertex graphs require
                 $\Omega(n)$ depth. This implies an exponential gap
                 between the depth of monotone and nonmonotone
                 circuits.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "circuit depth; monotone computation; perfect matching;
                 Theory; Theory of Computation",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation,
                 Unbounded-action devices.",
}

@Article{Borodin:1992:OLA,
  author =       "Allan Borodin and Nathan Linial and Michael E. Saks",
  title =        "An Optimal On-Line Algorithm for Metrical Task
                 System",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "745--763",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146588.html",
  abstract =     "In practice, almost all dynamic systems require
                 decisions to be made on-line, without full knowledge of
                 their future impact on the system. A general model for
                 the processing of sequences of tasks is introduced, and
                 a general on-line decision algorithm is developed. It
                 is shown that, for an important class of special cases,
                 this algorithm is optimal among all on-line
                 algorithms.\par

                 Specifically, a task system $(S,d)$ for processing
                 sequences of tasks consists of a set $S$ of states and
                 a cost matrix $d$ where $d(i, j)$ is the cost of
                 changing from state $i$ to state $j$ (we assume that
                 $d$ satisfies the triangle inequality and all diagonal
                 entries are 0). The cost of processing a given task
                 depends on the state of the system. A schedule for a
                 sequence $T^{1}, T^{2}, \ldots{}, T^{k}$ of tasks is a
                 sequence $s_{1}, s_{2}, \ldots{}, s_{k}$ of states
                 where $s_{i}$ is the state in which $T^{i}$ is
                 processed; the cost of a schedule is the sum of all
                 task processing costs and the state transition costs
                 incurred.\par

                 An on-line scheduling algorithm is one that chooses
                 $s_{i}$ only knowing $T^{1}, T^{2}, \ldots{}, T^{i}$.
                 Such an algorithm is $w$-competitive if, on any input
                 task sequence, its cost is within an additive constant
                 of $w$ times the optimal offline schedule cost. The
                 competitive ratio $w(S, d)$ is the infimum $w$ for
                 which there is a $w$-competitive on-line scheduling
                 algorithm for $(S,d)$. It is shown that $w(S, d) =
                 2|S|-1$ {\em for every task system\/} in which $d$ is
                 symmetric, and $w(S, d) = O(|S|^{2})$ for every task
                 system. Finally, randomized on-line scheduling
                 algorithms are introduced. It is shown that for the
                 uniform task system (in which $d(i,j) = 1$ for all
                 $i,j$), the expected competitive ratio $\bar{w}(S,d) =
                 O(\log|S|)$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Analysis of Algorithms; competitive
                 analysis; on-line algorithms; performance; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sequencing and scheduling.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo).",
}

@Article{Fiat:1992:NH,
  author =       "Amos Fiat and Moni Naor and Jeanette P. Schmidt and
                 Alan Siegel",
  title =        "Nonoblivious Hashing",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "764--782",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146591.html",
  abstract =     "Nonoblivious hashing, where information gathered from
                 unsuccessful probes is used to modify subsequent probe
                 strategy, is introduced and used to obtain the
                 following results for static lookup on full
                 tables:

                 \begin{enumerate}

                 \item An $O(1)$-time worst-case scheme that uses only
                 logarithmic additional memory, (and no memory when the
                 domain size is linear in the table size), which
                 improves upon previously linear space
                 requirements.

                 \item An almost sure $O(1)$-time probabilistic
                 worst-case scheme, which uses no additional memory and
                 which improves upon previously logarithmic time
                 requirements.

                 \item Enhancements to hashing: (1) and (2) are solved
                 for multikey records, where search can be performed
                 under any key in time $O(1)$; these schemes also permit
                 properties, such as nearest neighbor and rank, to be
                 determined in logarithmic time.

                 \end{enumerate}",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "$O(1)$ probe search; Algorithms; Analysis of
                 Algorithms; dictionary problem; model of computation;
                 oblivious and nonoblivious search; perfect hashing;
                 Theory; upper and lower bounds",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Routing and layout. {\bf E.1}:
                 Data, DATA STRUCTURES, Tables. {\bf E.2}: Data, DATA
                 STORAGE REPRESENTATIONS, Hash-table representations.
                 {\bf E.4}: Data, CODING AND INFORMATION THEORY,
                 Nonsecret encoding schemes. {\bf H.3.3}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Information
                 Search and Retrieval, Search process.",
}

@Article{Mansour:1992:IBP,
  author =       "Yishay Mansour and Baruch Schieber",
  title =        "The Intractability of Bounded Protocols for On-Line
                 Sequence Transmission over Non-{FIFO} Channels",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "783--799",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146596.html",
  abstract =     "The efficiency of data-link protocols for reliable
                 transmission of a sequence of messages over non-FIFO
                 physical channels is discussed. The transmission has to
                 be on-line; i.e., a message cannot be accessed by the
                 transmitting station before the preceding message has
                 been received. Three resources are considered: The
                 number of packets that have to be sent, the number of
                 headers, and the amount of space required by the
                 protocol. Three lower bounds are proved. First, the
                 space required by any protocol for delivering $n$
                 messages that uses less than $n$ headers cannot be
                 bounded by any function of $n$. Second, the number of
                 packets that have to be sent by any protocol that uses
                 a fixed number of headers in order to deliver a message
                 is linear in the number of packets that are delayed on
                 the channel at the time the message is sent. Finally,
                 the notion of a probabilistic physical channel, in
                 which a packet can be delayed on the channel with
                 probability $q$, is introduced. An exponential lower
                 bound, with overwhelming probability, is proved on the
                 number of packets that have to be sent by any data-link
                 protocol using a fixed number of headers when it is
                 implemented over a probabilistic physical channel.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; Channels; Communication Protocols; data
                 link; design; lower bound; non-FIFO channels;
                 performance; Protocols; sequence transmission; theory",
  subject =      "{\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf B.4.2}: Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Input/Output Devices, Channels and
                 controllers. {\bf B.4.4}: Hardware, INPUT/OUTPUT AND
                 DATA COMMUNICATIONS, Performance Analysis and Design
                 Aids, Worst-case analysis. {\bf C.2.2}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Network Protocols.",
}

@Article{Dwork:1992:FSVa,
  author =       "Cynthia Dwork and Larry Stockmeyer",
  title =        "Finite State Verifiers {I}: {The} Power of
                 Interaction",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "800--828",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146599.html",
  abstract =     "An investigation of interactive proof systems (IPSs)
                 where the verifier is a 2-way probabilistic finite
                 state automaton (2pfa) is initiated. In this model, it
                 is shown:\par

                 \begin{enumerate}

                 \item IPSs in which the verifier uses private
                 randomization are strictly more powerful than IPSs in
                 which the random choices of the verifier are made
                 public to the prover.

                 \item IPSs in which the verifier uses public
                 randomization are strictly more powerful than 2pfa's
                 alone, that is, without a prover.

                 \item Every language which can be accepted by some
                 deterministic Turing machine in exponential time can be
                 accepted by some IPS.

                 \end{enumerate}

                 Additional results concern two other classes of
                 verifiers: 2pfa's that halt in polynomial expected
                 time, and 2-way probabilistic pushdown automata that
                 halt in polynomial time. In particular, IPSs with
                 verifiers in the latter class are as powerful as IPSs
                 where verifiers are polynomial-time probabilistic
                 Turing machines. In a companion paper [7], zero
                 knowledge IPSs with 2pfa verifiers are investigated.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Arthur--Merlin games; Complexity Theory; finite state
                 automata; interactive proof systems; probabilistic
                 automata; theory; verification; zero knowledge",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 F.1.2}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Modes of Computation, Alternation and
                 nondeterminism. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Interactive computation. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Probabilistic computation. {\bf F.1.3}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity classes.
                 {\bf F.4.3}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Formal Languages, Classes defined
                 by grammars or automata.",
}

@Article{Dwork:1992:FSVb,
  author =       "Cynthia Dwork and Larry Stockmeyer",
  title =        "Finite State Verifiers {II}: {Zero} Knowledge",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "829--858",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146601.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Arthur--Merlin games; Complexity Theory; finite state
                 automata; interactive proof systems; probabilistic
                 automata; theory; verification; zero knowledge",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 F.1.2}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Modes of Computation, Alternation and
                 nondeterminism. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Interactive computation. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Probabilistic computation. {\bf F.1.3}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity classes.
                 {\bf F.4.3}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Formal Languages, Classes defined
                 by grammars or automata.",
}

@Article{Lund:1992:AMI,
  author =       "Carsten Lund and Lance Fortnow and Howard Karloff and
                 Noam Nisan",
  title =        "Algebraic Methods for Interactive Proof Systems",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "859--868",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146605.html",
  abstract =     "A new algebraic technique for the construction of
                 interactive proof systems is presented. Our technique
                 is used to prove that every language in the
                 polynomial-time hierarchy has an interactive proof
                 system. This technique played a pivotal role in the
                 recent proofs that IP = PSPACE [28] and that MIP = NEXP
                 [4].",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Complexity Theory; interactive proof systems; Theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Interactive
                 computation. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Probabilistic computation. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Relations among modes. {\bf F.1.2}: Theory
                 of Computation, COMPUTATION BY ABSTRACT DEVICES, Modes
                 of Computation, Relativized computation. {\bf F.1.3}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Complexity hierarchies. {\bf
                 F.1.3}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Complexity Classes, Relations among complexity
                 classes.",
}

@Article{Shamir:1992:IP,
  author =       "Adi Shamir",
  title =        "{IP} = {PSPACE}",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "869--877",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "This paper shows that the set of problems for which
                 interactive protocols exist is precisely the set of
                 problems which are solvable within polynomial space on
                 a Turing machine.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146609.html",
  abstract =     "In this paper, it is proven that when both
                 randomization and interaction are allowed, the proofs
                 that can be verified in polynomial time are exactly
                 those proofs that can be generated with polynomial
                 space.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Complexity Theory; interactive proofs; IP;
                 PSPACE; Theorem; theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Interactive
                 computation. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Bounded-action devices. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Interactive computation. {\bf F.1.2}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation, Probabilistic computation. {\bf
                 F.1.3}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Complexity Classes, Complexity hierarchies.
                 {\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Relations among
                 complexity classes.",
}

@Article{Shen:1992:IPS,
  author =       "A. Shen",
  title =        "{IP} = {PSPACE}: {Simplified} Proof",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "878--880",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146613.html",
  abstract =     "Lund et al. [1] have proved that PH is contained in
                 IP. Shamir [2] improved this technique and proved that
                 PSPACE = IP. In this note, a slightly simplified
                 version of Shamir's proof is presented, using degree
                 reductions instead of simple QBFs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Complexity Theory; interactive proofs; PSPACE;
                 theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Interactive
                 computation. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Probabilistic computation. {\bf F.1.3}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Relations among complexity classes.
                 {\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Proof
                 theory.",
}

@Article{Herlihy:1992:COM,
  author =       "Maurice Herlihy and Nancy Lynch and Michael Merritt
                 and William Weihl",
  title =        "On the Correctness of Orphan Management Algorithms",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "881--930",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146616.html",
  abstract =     "In a distributed system, node failures, network
                 delays, and other unpredictable occurrences can result
                 in {\em orphan\/} computations---subcomputations that
                 continue to run but whose results are no longer needed.
                 Several algorithms have been proposed to prevent such
                 computations from seeing inconsistent states of the
                 shared data. In this paper, two such orphan management
                 algorithms are analyzed. The first is an algorithm
                 implemented in the Argus distributed-computing system
                 at MIT, and the second is an algorithm proposed at
                 Carnegie-Mellon. The algorithms are described formally,
                 and complete proofs of their correctness are
                 given.\par

                 The proofs show that the fundamental concepts
                 underlying the two algorithms are very similar in that
                 each can be regarded as an implementation of the same
                 high-level algorithm. By exploiting properties of
                 information flow within transaction management systems,
                 the algorithms ensure that orphans only see states of
                 the shared data that they could also see if they were
                 not orphans. When the algorithms are used in
                 combination with any correct concurrency control
                 algorithm, they guarantee that all computations, orphan
                 as well as nonorphan, see consistent states of the
                 shared data.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; argus; atomic actions; avalon; camelot;
                 Distributed Computing; input-output automata;
                 Languages; recovery; Reliability; serializability;
                 Theory; Verification",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Concurrency. {\bf D.1.3}: Software,
                 PROGRAMMING TECHNIQUES, Concurrent Programming,
                 Distributed programming. {\bf D.3.2}: Software,
                 PROGRAMMING LANGUAGES, Language Classifications,
                 Concurrent, distributed, and parallel languages. {\bf
                 D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Concurrency. {\bf D.4.5}: Software,
                 OPERATING SYSTEMS, Reliability, Fault-tolerance. {\bf
                 F.3.1}: Theory of Computation, LOGICS AND MEANINGS OF
                 PROGRAMS, Specifying and Verifying and Reasoning about
                 Programs, Assertions. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Invariants. {\bf F.3.1}: Theory of Computation, LOGICS
                 AND MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Specification techniques.
                 {\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Database (persistent) programming languages.
                 {\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Concurrency. {\bf H.2.4}: Information Systems,
                 DATABASE MANAGEMENT, Systems, Distributed systems. {\bf
                 H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Transaction processing.",
}

@Article{Collins:1992:VDD,
  author =       "Oliver Collins and Sam Dolinar and Robert McEliece and
                 Fabrizio Pollara",
  title =        "A {VLSI} Decomposition of the {deBruijn} Graph",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "931--948",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146620.html",
  abstract =     "The deBruijn graph $B^{n}$ is the state diagram for an
                 $n$-stage binary shift register. It has $2^n$ vertices
                 and $2^{n + 1}$ edges. In this papers, it is shown that
                 $B_{n}$ can be built by appropriately ``wiring
                 together'' (i.e., connecting together with extra edges)
                 many isomorphic copies of a fixed graph, which is
                 called a {\em building block\/} for $B_n$. The
                 efficiency of such a building block is refined as the
                 fraction of the edges of $B^n$ which are present in the
                 copies of the building block. It is then shown, among
                 other things, that for any $\alpha < 1$, there exists a
                 graph $G$ which is a building block for $B^n$ of
                 efficiency $> \alpha$ for all sufficiently large $n$.
                 These results are illustrated by describing how a
                 special hierarchical family of building blocks has been
                 used to construct a very large Viterbi decoder (whose
                 floor plan is the graph $B^{13}$) which will be used on
                 NASA's {\em Galileo\/} mission.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; deBruijn graphs; Design; graph
                 decomposition; Interconnection Networks; Theory",
  subject =      "{\bf B.7.1}: Hardware, INTEGRATED CIRCUITS, Types and
                 Design Styles, VLSI (very large scale integration).
                 {\bf B.6.1}: Hardware, LOGIC DESIGN, Design Styles,
                 Sequential circuits. {\bf B.7.1}: Hardware, INTEGRATED
                 CIRCUITS, Types and Design Styles, Algorithms
                 implemented in hardware. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Network
                 problems. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Path and circuit
                 problems.",
}

@Article{Debray:1992:EDA,
  author =       "Saumya K. Debray",
  title =        "Efficient Dataflow Analysis of Logic Programs",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "949--984",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/146624.html",
  abstract =     "A framework for efficient dataflow analyses of logic
                 programs is investigated. A number of problems arise in
                 this context: aliasing effects can make analysis
                 computationally expensive for sequential logic
                 programming languages; synchronization issues can
                 complicate the analysis of parallel logic programming
                 languages; and finiteness restrictions to guarantee
                 termination can limit the expressive power of such
                 analyses. Our main result is to give a simple
                 characterization of a family of flow analyses where
                 these issues can be ignored without compromising
                 soundness. This results in algorithms that are simple
                 to verify and implement, and efficient in execution.
                 Based on this approach, we describe an efficient
                 algorithm for flow analysis of sequential logic
                 programs, extend this approach to handle parallel
                 executions, and finally describe how infinite chains in
                 the analysis domain can be accommodated without
                 compromising termination.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Languages; Performance; program analysis;
                 Programming Languages; PROLOG",
  subject =      "{\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Optimization. {\bf D.1.6}: Software,
                 PROGRAMMING TECHNIQUES, Logic Programming. {\bf D.3.4}:
                 Software, PROGRAMMING LANGUAGES, Processors, Compilers.
                 {\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Optimization.",
}

@Article{Dillencourt:1992:CGA,
  author =       "Michael B. Dillencourt and Hanan Samet and Markku
                 Tamminen",
  title =        "Corrigenda: ``{A} General Approach to
                 Connected-Component Labelling for Arbitrary Image
                 Representations''",
  journal =      j-J-ACM,
  volume =       "39",
  number =       "4",
  pages =        "985--986",
  month =        oct,
  year =         "1992",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 22:51:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Dillencourt:1992:GAC}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gallier:1993:AFC,
  author =       "Jean Gallier and Paliath Narendran and David Plaisted
                 and Stan Raatz and Wayne Snyder",
  title =        "An Algorithm for Finding Canonical Sets of Ground
                 Rewrite Rules in Polynomial Time",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "1",
  pages =        "1--16",
  month =        jan,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/138032.html",
  abstract =     "In this paper, it is shown that there is an algorithm
                 that, given by finite set $E$ of ground equations,
                 produces a reduced canonical rewriting system $R$
                 equivalent to $E$ in polynomial time. This algorithm
                 based on congruence closure performs simplification
                 steps guided by a total simplification ordering on
                 ground terms, and it runs in time $O(n^{3})$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; completion procedures; congruence closure;
                 Deductive Systems and Equational Reasoning; design;
                 equational logic; languages; term rewriting; theory",
  subject =      "{\bf F.4.2}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Grammars and Other Rewriting
                 Systems, Decision problems. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf F.4.1}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic, Mechanical theorem
                 proving. {\bf F.4.3}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Formal
                 Languages, Classes defined by grammars or automata.
                 {\bf F.3.3}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Studies of Program Constructs, Functional
                 constructs.",
}

%% NB: From Volume 40, JACM has 5 issues per year, in January, April,
%% July, September, and November.
@Article{Dolev:1993:PSM,
  author =       "Danny Dolev and Cynthia Dwork and Orli Waarts and Moti
                 Yung",
  title =        "Perfectly Secure Message Transmission",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "1",
  pages =        "17--47",
  month =        jan,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/138036.html",
  abstract =     "This paper studies the problem of perfectly secure
                 communication in general network in which processors
                 and communication lines may be faulty. Lower bounds are
                 obtained on the connectivity required for successful
                 secure communication. Efficient algorithms are obtained
                 that operate with this connectivity and rely on no
                 complexity-theoretic assumptions. These are the first
                 algorithms for secure communication in a general
                 network to simultaneously achieve the three goals of
                 perfect secrecy, perfect resiliency, and worst-case
                 time linear in the diameter of the network.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Distributed Communication; distributed
                 computing; fault-tolerance; perfectly secure
                 communication; Reliability; Security",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection. {\bf K.6.5}: Computing Milieux, MANAGEMENT
                 OF COMPUTING AND INFORMATION SYSTEMS, Security and
                 Protection.",
}

@Article{Hobby:1993:GAT,
  author =       "John D. Hobby",
  title =        "Generating Automatically Tuned Bitmaps from Outlines",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "1",
  pages =        "48--94",
  month =        jan,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/138040.html",
  abstract =     "Consider the problem of generating bitmaps from
                 character shapes given as outlines. The obvious
                 scan-conversion process does not produce acceptable
                 results unless important features such as stem widths
                 are carefully controlled during the scan-conversion
                 process. This paper describes a method for
                 automatically extracting the necessary feature
                 information and generating high-quality bitmaps without
                 resorting to hand editing. Almost all of the work is
                 done in a preprocessing step, the result of which is an
                 intermediate form that can be quickly converted into
                 bitmaps once the font size and device resolution are
                 known.\par

                 A heuristically defined system of linear equations
                 describes how the ideal outlines should be distorted in
                 order to produce the best possible results when scan
                 converted in a straightforward manner. The Lov{\'a}sz
                 basis reduction algorithm then reduces the system of
                 equations to a form that makes it easy to find an
                 approximate solution subject to the constraint that
                 some variables must be integers.\par

                 The heuristic information is of such a general nature
                 that it applies equally well to Roman fonts and
                 Japanese Kanji.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; feature recognition; fonts; Graphics;
                 Lovasz basis reduction; performance; scan-conversion",
  subject =      "{\bf I.3.3}: Computing Methodologies, COMPUTER
                 GRAPHICS, Picture/Image Generation, Bitmap and
                 framebuffer operations. {\bf I.3.3}: Computing
                 Methodologies, COMPUTER GRAPHICS, Picture/Image
                 Generation, Digitizing and scanning. {\bf I.5.4}:
                 Computing Methodologies, PATTERN RECOGNITION,
                 Applications, Text processing.",
}

@Article{Pitt:1993:MCD,
  author =       "Leonard Pitt and Manfred K. Warmuth",
  title =        "The Minimum Consistent {DFA} Problem Cannot be
                 Approximated within any Polynomial",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "1",
  pages =        "95--142",
  month =        jan,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 9 07:57:29 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/138042.html",
  abstract =     "The minimum consistent DFA problem is that of finding
                 a DFA with as few states as possible that is consistent
                 with a given sample (a finite collection of words, each
                 labeled as to whether the DFA found should accept or
                 reject). Assuming that P $\ne$ NP, it is shown that for
                 any constant $k$, no polynomial-time algorithm can be
                 guaranteed to find a consistent DFA with fewer than
                 $\mbox{\em opt\/}^{k}$ states, where $\mbox{\em opt\/}$
                 is the number of states in the minimum state DFA
                 consistent with the sample. This result holds even if
                 the alphabet is of constant size two, and if the
                 algorithm is allowed to produce an NFA, a regular
                 expression, or a regular grammar that is consistent
                 with the sample. A similar nonapproximability result is
                 presented for the problem of finding small consistent
                 linear grammars. For the case of finding minimum
                 consistent DFAs when the alphabet is not of constant
                 size but instead is allowed to vary with the problem
                 specification, the slightly stronger lower bound on
                 approximability of $\mbox{\em opt\/}{(1-\epsilon)\log
                 \log\mbox{\em opt\/}}$ is shown for any $\epsilon >
                 0$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Earlier version in STOC89 and Univ of Ill TR 1499 in
                 1989",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; approximation algorithms; Languages;
                 Learning Theory; minimization of finite state machines;
                 nonapproximability; Theory",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 F.1.3}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Complexity Classes, Reducibility and
                 completeness. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Computations on
                 discrete structures. {\bf F.4.2}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Grammars and Other Rewriting Systems, Decision
                 problems.",
}

@Article{Harper:1993:FDL,
  author =       "Robert Harper and Furio Honsell and Gordon Plotkin",
  title =        "A Framework for Defining Logics",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "1",
  pages =        "143--184",
  month =        jan,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Preliminary version appeared in Proc. 2nd IEEE
                 Symposium on Logic in Computer Science, 1987,
                 194--204.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/138060.html",
  abstract =     "The Edinburgh Logical Framework (LF) provides a means
                 to define (or present) logics. It is based on a general
                 treatment of syntax, rules, and proofs by means of a
                 typed $\lambda$-calculus with dependent types. Syntax
                 is treated in a style similar to, but more general
                 than, Martin-L{\"o}f's system of arities. The treatment
                 of rules and proofs focuses on his notion of a {\em
                 judgment}. Logics are represented in LF via a new
                 principle, the {\em judgments as types\/} principle,
                 whereby each judgment is identified with the type of
                 its proofs. This allows for a smooth treatment of
                 discharge and variable occurrence conditions and leads
                 to a uniform treatment of rules and proofs whereby
                 rules are viewed as proofs of higher-order judgments
                 and proof checking is reduced to type checking. The
                 practical benefit of our treatment of formal systems is
                 that logic-independent tools, such as proof editors and
                 proof checkers, can be constructed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; formal systems; interactive theorem
                 proving; Logic in Computer Science; proof checking;
                 Theory; typed lambda calculus; Verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic. {\bf F.3.1}:
                 Theory of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about
                 Programs.",
}

@Article{Angluin:1993:LRO,
  author =       "Dana Angluin and Lisa Hellerstein and Marek
                 Karpinski",
  title =        "Learning Read-Once Formulas with Queries",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "1",
  pages =        "185--210",
  month =        jan,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 22:58:39 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/138061.html",
  abstract =     "A read-once formula is a Boolean formula in which each
                 variable occurs, at most, once. Such formulas are also
                 called $\mu$-formulas or Boolean trees. This paper
                 treats the problem of exactly identifying an unknown
                 read-once formula using specific kinds of
                 queries.\par

                 The main results are a polynomial-time algorithm for
                 exact identification of monotone read-once formulas
                 using only membership queries, and a polynomial-time
                 algorithm for exact identification of general read-once
                 formulas using equivalence and membership queries (a
                 protocol based on the notion of a {\em minimally
                 adequate teacher\/} [1]). The results of the authors
                 improve on Valiant's previous results for read-once
                 formulas [26]. It is also shown, that no
                 polynomial-time algorithm using only membership queries
                 or only equivalence queries can exactly identify all
                 read-once formulas.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "Was International Computer Science Institute
                 TR-89-05099, and University of California at Berkeley
                 TR 89-528",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "$u$-formulas; algorithms; design; equivalence queries;
                 exact identification; interpolation; Machine Learning;
                 membership queries; mu-formulas; polynomial-time
                 learning; read-once formulas; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf I.2.6}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Learning, Concept learning.
                 {\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Induction.",
}

@Article{Bshouty:1993:CFR,
  author =       "Nader H. Bshouty",
  title =        "On the Complexity of Functions for Random Access
                 Machines",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "2",
  pages =        "211--223",
  month =        apr,
  year =         "1993",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/151261.151262",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 22 07:42:24 2011",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/151262.html",
  abstract =     "Tight bounds are proved for Sort, Merge, Insert, Gcd
                 of integers, Gcd of polynomials, and Rational functions
                 over a {\em finite\/} inputs domain, in a random access
                 machine with arithmetic operations, direct and indirect
                 addressing, unlimited power for answering YES/NO
                 questions, branching, and tables with bounded size.
                 These bounds are also true even if additions,
                 subtractions, multiplications, and divisions of
                 elements by elements of the field are not
                 counted.\par

                 In a random access machine with finitely many constants
                 and a bounded number of types of instructions, it is
                 proved that the complexity of a function over a
                 countable infinite domain is equal to the complexity of
                 the function in a sufficiently large {\em finite\/}
                 subdomain.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Analysis of Algorithms; greatest common
                 divisor; indirect addressing; random access machine;
                 sorting; Theory; Verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Bounded-action devices. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sorting and searching.",
}

@Article{LaPaugh:1993:RDH,
  author =       "Andrea S. LaPaugh",
  title =        "Recontamination Does Not Help to Search a Graph",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "2",
  pages =        "224--245",
  month =        apr,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/151263.html",
  abstract =     "This paper is concerned with a game on graphs called
                 {\em graph searching}. The object of this game is to
                 clear all edges of a contaminated graph. Clearing is
                 achieved by moving searchers, a kind of token, along
                 the edges of the graph according to clearing rules.
                 Certain search strategies cause edges that have been
                 cleared to become contaminated again. Megiddo et al.
                 [9] conjectured that every graph can be searched using
                 a minimum number of searchers without this
                 recontamination occurring, that is, without clearing
                 any edge twice. In this paper, this conjecture is
                 proved. This places the graph-searching problem in NP,
                 completing the proof by Megiddo et al. that the
                 graph-searching problem is NP-complete. Furthermore, by
                 eliminating the need to consider recontamination, this
                 result simplifies the analysis of searcher requirements
                 with respect to other properties of graphs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Analysis of Algorithms; graph searching;
                 NP-completeness; pursuit and evasion; Theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.1.3}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Classes,
                 Reducibility and completeness. {\bf G.2.2}: Mathematics
                 of Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms.",
}

@Article{McAllester:1993:TSF,
  author =       "David McAllester and Robert Givan",
  title =        "Taxonomic Syntax for First Order Inference",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "2",
  pages =        "246--283",
  month =        apr,
  year =         "1993",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/151261.151264",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/151264.html",
  abstract =     "A new polynomial time decidable fragment of first
                 order logic is identified, and a general method for
                 using polynomial time inference procedures in knowledge
                 representation systems is presented. The results shown
                 in this paper indicate that a nonstandard ``taxonomic''
                 syntax is essential in constructing natural and
                 powerful polynomial time inference procedures. The
                 central role of taxonomic syntax in the polynomial time
                 inference procedures provides technical support for the
                 often-expressed intuition that knowledge is better
                 represented in terms of taxonomic relationships than
                 classical first order formulas. To use the procedures
                 in a knowledge representation system, a ``Socratic
                 proof system'' is defined, which is complete for first
                 order inference and which can be used as a
                 semi-automated interface to a first order knowledge
                 base.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; automated reasoning; Computational Logic;
                 Deduction; inference rules; machine inference;
                 mechanical verification; polynomial time algorithms;
                 proof systems; proof theory; theorem proving;
                 verification",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Deduction.
                 {\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Computational logic. {\bf F.2.0}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, General.",
}

@Article{McAllester:1993:ART,
  author =       "David A. McAllester",
  title =        "Automatic Recognition of Tractability in Inference
                 Relations",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "2",
  pages =        "284--303",
  month =        apr,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/151265.html",
  abstract =     "A procedure is given for recognizing sets of inference
                 rules that generate polynomial time decidable inference
                 relations. The procedure can automatically recognize
                 the tractability of the inference rules underlying
                 congruence closure. The recognition of tractability for
                 that particular rule set constitutes mechanical
                 verification of a theorem originally proved
                 independently by Kozen and Shostak. The procedure is
                 algorithmic, rather than heuristic, and the class of
                 automatically recognizable tractable rule sets can be
                 precisely characterized. A series of examples of rule
                 sets whose tractability is nontrivial, yet machine
                 recognizable, is also given. The technical framework
                 developed here is viewed as a first step toward a
                 general theory of tractable inference relations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; automated reasoning; Computational Logic;
                 Deduction; inference rules; machine inference;
                 mechanical verification; polynomial-time alg orithm;
                 proof systems; proof theory; theorem proving;
                 verification",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Deduction.
                 {\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Computational logic.",
}

@Article{Nicol:1993:CCS,
  author =       "David M. Nicol",
  title =        "The Cost of Conservative Synchronization in Parallel
                 Discrete Event Simulations",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "2",
  pages =        "304--333",
  month =        apr,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/151266.html",
  abstract =     "This paper analytically studies the performance of a
                 synchronous conservative parallel discrete-event
                 simulation protocol. The class of models considered
                 simulates activity in a physical domain, and possesses
                 a limited ability to predict future behavior. Using a
                 stochastic model, it is shown that as the volume of
                 simulation activity in the model increases relative to
                 a fixed architecture, the complexity of the average
                 per-event overhead due to synchronization, event list
                 manipulation, lookahead calculations, and processor
                 idle time approaches the complexity of the average
                 per-event overhead of a serial simulation, sometimes
                 rapidly. The method is therefore within a constant
                 factor of optimal. The result holds for the worst case
                 ``fully-connected'' communication topology, where an
                 event in any other portion of the domain can cause an
                 event in any other protion of the domain. Our analysis
                 demonstrates that on large problems---those for which
                 parallel processing is ideally suited--- there is often
                 enough parallel workload so that processors are not
                 usually idle. It also demonstrated the viability of the
                 method empirically, showing how good performance is
                 achieved on large problems using a thirty-two node
                 Intel iPSC/2 distributed memory multiprocessor.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "This paper analytically studies the performance of a
                 synchronous conservative parallel discrete-event
                 simulation protocol. The class of models considered
                 simulates activity in a physical domain, and possesses
                 a limited ability to predict future behaviour.",
  descriptors =  "distributed simulation; performance evaluation;
                 algorithm",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Computer System Modeling and Analysis;
                 conservative synchronization; measurement;
                 Performance",
  subject =      "{\bf I.6.8}: Computing Methodologies, SIMULATION AND
                 MODELING, Types of Simulation, Parallel. {\bf C.4}:
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS,
                 Performance attributes.",
}

@Article{Neiger:1993:SSC,
  author =       "Gil Neiger and Sam Toueg",
  title =        "Simulating Synchronized Clocks and Common Knowledge in
                 Distributed Systems",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "2",
  pages =        "334--367",
  month =        apr,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/151267.html",
  abstract =     "Time and knowledge are studied in synchronous and
                 asynchronous distributed systems. A large class of
                 problems that can be solved using logical clocks as if
                 they were perfectly synchronized clocks is formally
                 characterized. For the same class of problems, a
                 broadcast primitive that can be used as if it achieves
                 common knowledge is also proposed. Thus, logical clocks
                 and the broadcast primitive simplify the task of
                 designing and verifying distributed algorithms: The
                 designer can assume that processors have access to
                 perfectly synchronized clocks and the ability to
                 achieve common knowledge.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; clock synchronization; common knowledge;
                 Distributed Computing; knowledge-based protocols;
                 logical clocks; synchronized clocks; Theory;
                 timestamped common knowledge; Verification",
  subject =      "{\bf B.4.3}: Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Interconnections (subsystems),
                 Asynchronous/synchronous operation. {\bf B.4.4}:
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Performance Analysis and Design Aids, Formal models.
                 {\bf B.4.4}: Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Performance Analysis and Design Aids,
                 Verification. {\bf C.2.1}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Architecture and Design, Distributed networks. {\bf
                 C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol verification. {\bf D.4.4}: Software, OPERATING
                 SYSTEMS, Communications Management. {\bf C.2.1}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Network Architecture and Design, Network
                 communications.",
}

@Article{Lengauer:1993:EDP,
  author =       "Thomas Lengauer and Egon Wanke",
  title =        "Efficient Decision Procedures for Graph Properties on
                 Centext-Free Graph Languages",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "2",
  pages =        "368--393",
  month =        apr,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/151268.html",
  abstract =     "Efficient ways of analyzing families of graphs that
                 are generated by a certain type of context-free graph
                 grammars are considered. These graph grammars are
                 called {\em cellular graph grammars}. They generate the
                 same graph families as hyperedge replacement systems,
                 but are defined in a way that supports complexity
                 analysis. A characteristic called ``finiteness'' of
                 graph properties are defined, and combinatorial
                 algorithms are presented for deciding whether a graph
                 language generated by a given cellular graph grammar
                 contains a graph with a given finite graph property.
                 Structural parameters are introduced that bound the
                 complexity of the decision procedure and special cases
                 for which the decision can be made in polynomial time
                 are discussed. Extensions to graph grammars that are
                 not context-free are also given. Our results provide
                 explicit and efficient combinatorial algorithms where,
                 so far, only the existence of algorithms has been
                 shown, or the best known algorithms are highly
                 inefficient.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Graph Theory; hyperedge replacement
                 systems; languages; Theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 F.4.2}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Grammars and Other Rewriting Systems,
                 Decision problems. {\bf F.4.2}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Grammars and
                 Other Rewriting Systems, Grammar types.",
}

@Article{Leung:1993:ESS,
  author =       "Kin K. Leung",
  title =        "An Execution\slash Sleep Scheduling Policy for Serving
                 an Additional Job in Priority Queueing Systems",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "2",
  pages =        "394--417",
  month =        apr,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/151269.html",
  abstract =     "In a priority-based computer system, besides the
                 regular jobs, an additional job (refereed to as {\em
                 job A\/}) is invoked infrequently but requires a
                 significant amount of CPU time. To avoid CPU hogging,
                 job A receives (up to) a fixed amount of CPU time
                 whenever it is served. When the time expires, job A
                 immediately relinquishes the CPU and puts itself to
                 sleep for a period of time. By doing so, jobs with low
                 priority may be processed in a timely manner. When the
                 sleep time is over, job A is awakened and waits to
                 resume service according to its priority. Then, the
                 whole process is repeated until job A service is
                 completed. In this paper, such an {\em
                 execution/sleep\/} (ES) scheduling policy is analyzed
                 for serving job A in a {\em nonpreemptive priority
                 queuing\/} system. The Laplace Transforms are derived
                 for: (i) the conditional response time of job A and
                 (ii) the response time for jobs with priorities higher
                 and lower than job A.\par

                 This work is motivated by the ES policy in a switching
                 system in which job A is invoked in response to the
                 failure of signaling links. The proposed model is
                 applicable to other real-time computer systems, and the
                 modeling techniques can be applied or generalized to
                 analyzing other scheduling policies in which timers are
                 involved.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "performance; performance evaluation; priority queues;
                 Queueing Systems; response times; server vacation
                 models; theory; time-limited service; waiting times",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Modeling techniques. {\bf I.6.4}: Computing
                 Methodologies, SIMULATION AND MODELING, Model
                 Validation and Analysis. {\bf C.3}: Computer Systems
                 Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
                 SYSTEMS, Real-time systems. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sequencing and scheduling.",
}

@Article{Coppersmith:1993:RWW,
  author =       "Don Coppersmith and Peter Doyle and Prabhakar Raghavan
                 and Marc Snir",
  title =        "Random Walks on Weighted Graphs and Applications to
                 On-line Algorithms",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "421--453",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:04:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174131.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Probabilistic algorithms (including Monte Carlo).",
}

@Article{Karloff:1993:RAP,
  author =       "Howard J. Karloff and Prabhakar Raghavan",
  title =        "Randomized Algorithms and Pseudorandom Numbers",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "454--476",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/174130.174132",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:05:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174132.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Routing and layout. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Random number generation. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sorting and searching.",
}

@Article{Baader:1993:UCT,
  author =       "Franz Baader",
  title =        "Unification in Commutative Theories, {Hilbert}'s Basis
                 Theorem, and {Gr{\"o}bner} Bases",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "477--503",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:08:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174133.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf I.1.2}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Algorithms, Algebraic algorithms. {\bf
                 F.2.1}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Numerical Algorithms and
                 Problems, Computations on polynomials. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Resolution.",
}

@Article{Murray:1993:DMP,
  author =       "Neil V. Murray and Erik Rosenthal",
  title =        "Dissolution: {Making} Paths Vanish",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "504--535",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 27 00:43:31 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174135.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Metatheory. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Computational logic. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Mechanical theorem proving. {\bf
                 G.2.2}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Deduction. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Resolution.",
}

@Article{Johnson:1993:FCC,
  author =       "C. A. Johnson",
  title =        "Factorization and Circuit in the Connection Method",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "536--557",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:08:20 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/journals.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174136.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Deduction.
                 {\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Number-theoretic computations.",
}

@Article{Wang:1993:MRE,
  author =       "Tie-Cheng Wang",
  title =        "${Z}$-Module Reasoning: an Equality-Oriented Proving
                 Method with Built-in Ring Axioms",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "558--606",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Dec 10 15:43:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174137.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory; verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Computational logic. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Deduction. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Resolution.",
}

@Article{Linial:1993:CDC,
  author =       "Nathan Linial and Yishay Mansour and Noam Nisan",
  title =        "Constant Depth Circuits, {Fourier} Transform, and
                 Learnability",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "607--620",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:10:52 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174138.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory; verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computation of transforms. {\bf F.1.2}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation, Probabilistic computation. {\bf
                 F.2.1}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Numerical Algorithms and
                 Problems, Computations on polynomials. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Probabilistic algorithms (including Monte Carlo). {\bf
                 I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Concept learning.",
}

@Article{Mehlhorn:1993:DIS,
  author =       "Kurt Mehlhorn and Athanasios Tsakalidis",
  title =        "Dynamic Interpolation Search",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "621--634",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:11:53 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174139.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf F.2.0}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, General.",
}

@Article{vanKreveld:1993:UCS,
  author =       "Marc J. {van Kreveld} and Mark H. Overmars",
  title =        "Union-Copy Structures and Dynamic Segment Trees",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "635--652",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:24:59 1998",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174140.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Geometrical problems and computations.",
}

@Article{Baeten:1993:DBE,
  author =       "J. C. M. Baeten and J. A. Bergstra and J. W. Klop",
  title =        "Decidability of Bisimulation Equivalence for Processes
                 Generating Context-Free Languages",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "653--682",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:14:14 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174141.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf F.3.2}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages, Algebraic approaches to semantics. {\bf
                 F.1.1}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Automata. {\bf F.4.3}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Formal Languages, Decision problems.",
}

@Article{Gaifman:1993:UOP,
  author =       "Haim Gaifman and Harry Mairson and Yehoshua Sagiv and
                 Moshe Y. Vardi",
  title =        "Undecidable Optimization Problems for Database Logic
                 Programs",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "683--713",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:15:22 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174142.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming. {\bf D.3.4}: Software, PROGRAMMING
                 LANGUAGES, Processors, Optimization. {\bf H.2.3}:
                 Information Systems, DATABASE MANAGEMENT, Languages,
                 Query languages.",
}

@Article{Nelson:1993:PES,
  author =       "Randolph Nelson and Donald Towsley",
  title =        "A Performance Evaluation of Several Priority Policies
                 for Parallel Processing Systems",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "714--740",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1993.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174143.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  annote =       "In this paper, analytic models for a multiprocessor
                 executing a stream consisting of $K$ classes of
                 fork-join jobs are developed. \ldots{} Several priority
                 policies are analyzed.",
  descriptors =  "Queueing theory; HOL priority; preemptive priority",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "performance; theory",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Performance attributes. {\bf C.1.2}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors),
                 Parallel processors. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Modeling
                 techniques. {\bf D.4.1}: Software, OPERATING SYSTEMS,
                 Process Management, Scheduling. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Synchronization.
                 {\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Stochastic analysis.",
}

@Article{Bhatt:1993:TRW,
  author =       "Sandeep Bhatt and Jin-Yi Cai",
  title =        "Taking Random Walks to Grow Trees in Hypercubes",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "741--764",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:17:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174144.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Interconnection architectures. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms.",
}

@Article{Karp:1993:RPA,
  author =       "Richard M. Karp and Yanjun Zhang",
  title =        "Randomized Parallel Algorithms for Backtrack Search
                 and Branch-and-Bound Computation",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "3",
  pages =        "765--789",
  month =        jul,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:18:17 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174145.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Backtracking. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sorting and searching. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf F.1.2}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation, Probabilistic computation. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Probabilistic algorithms (including Monte Carlo). {\bf
                 I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Graph and tree search strategies.",
}

@Article{Cohen:1993:SPT,
  author =       "Edith Cohen and Nimrod Megiddo",
  title =        "Strongly Polynomial-Time and {NC} Algorithms for
                 Detecting Cycles in Periodic Graphs",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "4",
  pages =        "791--830",
  month =        sep,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:46:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/153727.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.1.6}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization, Linear programming.",
}

@Article{Yu:1993:AMD,
  author =       "Philip S. Yu and Daniel M. Dias and Stephen S.
                 Lavenberg",
  title =        "On the Analytical Modeling of Database Concurrency
                 Control",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "4",
  pages =        "831--872",
  month =        sep,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Dec 05 20:18:33 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/153733.html",
  abstract =     "The Concurrency Control (CC) scheme employed can
                 profoundly affect the performance of
                 transaction-processing systems. In this paper, a simple
                 unified approximate analysis methodology to model the
                 effect on system performance of data contention under
                 different CC schemes and for different system
                 structures is developed. This paper concentrates on
                 modeling data contention and then, as others have done
                 in other papers, the solutions of the data contention
                 model are coupled with a standard hardware resource
                 contention model through an iteration. The methodology
                 goes beyond previously published methods for analyzing
                 CC schemes in terms of the generality of CC schemes and
                 system structures that are handled. The methodology is
                 applied to analyze the performance of centralized
                 transaction processing systems using various
                 optimistic- and pessimistic-type CC schemes and for
                 both fixed-length and variable-length transactions. The
                 accuracy of the analysis is demonstrated by comparison
                 with simulations. It is also shown how the methodology
                 can be applied to analyze the performance of
                 distributed transaction-processing systems with
                 replicated data.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "performance; theory",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Transaction processing. {\bf H.2.2}:
                 Information Systems, DATABASE MANAGEMENT, Physical
                 Design. {\bf C.4}: Computer Systems Organization,
                 PERFORMANCE OF SYSTEMS. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Distributed
                 systems.",
}

@Article{Afek:1993:ASS,
  author =       "Yehuda Afek and Hagit Attiya and Danny Dolev and Eli
                 Gafni and Michael Merritt and Nir Shavit",
  title =        "Atomic Snapshots of Shared Memory",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "4",
  pages =        "873--890",
  month =        sep,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:34:23 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/153741.html",
  abstract =     "This paper introduces a general formulation of atomic
                 snapshot memory, a shared memory partitioned into words
                 written (updated) by individual processes, or
                 instantaneously read (scanned) in its entirety. This
                 paper presents three wait-free implementations of
                 atomic snapshot memory. The first implementation in
                 this paper uses unbounded (integer) fields in these
                 registers, and is particularly easy to understand. The
                 second implementation uses bounded registers. Its
                 correctness proof follows the ideas of the unbounded
                 implementation. Both constructions implement a
                 single-writer snapshot memory, in which each word may
                 be updated by only one process, from single-writer,
                 $n$-reader registers. The third algorithm implements a
                 multi-writer snapshot memory from atomic $n$-writer,
                 $n$-reader registers, again echoing key ideas from the
                 earlier constructions. All operations require
                 $\Theta(n^{2})$ reads and writes to the component
                 shared registers in the worst case.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; theory",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Concurrency. {\bf B.3.2}: Hardware, MEMORY
                 STRUCTURES, Design Styles, Shared memory. {\bf C.1.2}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors),
                 Multiple-instruction-stream, multiple-data-stream
                 processors (MIMD).",
}

@Article{Afrati:1993:PCS,
  author =       "Foto Afrati and Christos H. Papadimitriou",
  title =        "The Parallel Complexity of Simple Logic Programs",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "4",
  pages =        "891--916",
  month =        sep,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 07:59:12 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/153752.html",
  abstract =     "We consider logic programs with a single recursive
                 rules, whose right-hand side consists of binary
                 relations forming a chain. We give a complete
                 characterization of all programs of this form that are
                 computable in NC (assuming that $P \ne$). Our proof
                 uses ideas from automata and language theory, and the
                 combinatorics of strings.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; languages; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Reducibility and
                 completeness. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Logic programming. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Recursive function theory. {\bf
                 I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Logic
                 programming. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency.",
}

@Article{Halpern:1993:KPA,
  author =       "Joseph Y. Halpern and Mark R. Tuttle",
  title =        "Knowledge, Probability, and Adversaries",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "4",
  pages =        "917--962",
  month =        sep,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:49:19 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/153770.html",
  abstract =     "What should it mean for an agent to know or believe an
                 assertion is true with probability 9.99? Different
                 papers [2, 6, 15] give different answers, choosing to
                 use quite different probability spaces when computing
                 the probability that an agent assigns to an event. We
                 show that each choice can be understood in terms of a
                 betting game. This betting game itself can be
                 understood in terms of three types of adversaries
                 influencing three different aspects of the game. The
                 first selects the outcome of all nondeterministic
                 choices in the system; the second represents the
                 knowledge of the agent's opponent in the betting game
                 (this is the key place the papers mentioned above
                 differ); and the third is needed in asynchronous
                 systems to choose the time the bet is placed. We
                 illustrate the need for considering all three types of
                 adversaries with a number of examples. Given a class of
                 adversaries, we show how to assign probability spaces
                 to agents in a way most appropriate for that class,
                 where ``most appropriate'' is made precise in terms of
                 this betting game. We conclude by showing how different
                 assignments of probability spaces (corresponding to
                 different opponents) yield different levels of
                 guarantees in probabilistic coordinated attack.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory; verification",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods. {\bf F.2.0}: Theory of Computation, ANALYSIS
                 OF ALGORITHMS AND PROBLEM COMPLEXITY, General. {\bf
                 C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf B.4.4}: Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Performance Analysis and Design Aids,
                 Formal models. {\bf B.4.4}: Hardware, INPUT/OUTPUT AND
                 DATA COMMUNICATIONS, Performance Analysis and Design
                 Aids, Verification. {\bf B.4.5}: Hardware, INPUT/OUTPUT
                 AND DATA COMMUNICATIONS, Reliability, Testing, and
                 Fault-Tolerance. {\bf F.3.1}: Theory of Computation,
                 LOGICS AND MEANINGS OF PROGRAMS, Specifying and
                 Verifying and Reasoning about Programs.",
}

@Article{Marek:1993:MNL,
  author =       "V. Wiktor Marek and Grigori F. Shvarts and Miros{\l}aw
                 Truszczy{\'n}ski",
  title =        "Modal Nonmonotonic Logics: {Ranges}, Characterization,
                 Computation",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "4",
  pages =        "963--990",
  month =        sep,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:51:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/153773.html",
  abstract =     "Many nonmonotonic formalism, including default logic,
                 logic programming with stable models, and autoepistemic
                 logic, can be represented faithfully by means of modal
                 nonmonotonic logics in the family proposed by McDermott
                 and Doyle. In this paper properties of logics in this
                 family are thoroughly investigated. We present several
                 results on characterization of expansions. These
                 results are applicable to a wide class of nonmonotonic
                 modal logics. Using these characterization results,
                 algorithms for computing expansions for finite theories
                 are developed. Perhaps the most important finding of
                 this paper is that the structure of the family of modal
                 nonmonotonic logics is much simpler than that of the
                 family of underlying modal (monotonic) logics. Namely,
                 it is often the case that different monotonic modal
                 logics collapse to the same nonmonotonic system. We
                 exhibit four families of logics whose nonmonotonic
                 variants coincide: {\bf 5-KD45, TW5-SW5, N-WK}, and
                 {\bf W5-D4WB}. These nonmonotonic logics naturally
                 represent logics related to common-sense reasoning and
                 knowledge representation such as autoepistemic logic,
                 reflexive autoepistemic logic, default logic, and truth
                 maintenance with negation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Nonmonotonic reasoning and belief revision. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf I.2.4}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Knowledge Representation
                 Formalisms and Methods, Representations (procedural and
                 rule-based).",
}

@Article{Coffman:1993:PCP,
  author =       "E. G. {Coffman, Jr.} and M. R. Garey",
  title =        "Proof of the $4/3$ Conjecture for Preemptive vs.
                 Nonpreemptive Two-Processor Scheduling",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "991--1018",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:54:24 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174148.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sequencing and scheduling.
                 {\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Scheduling. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics,
                 Combinatorial algorithms.",
}

@Article{Luo:1993:CCD,
  author =       "Zhi-Quan Luo and John N. Tsitsiklis",
  title =        "On the Communication Complexity of Distributed
                 Algebraic Computation",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "1019--1047",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:55:15 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174149.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes. {\bf F.2.1}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Numerical Algorithms and
                 Problems.",
}

@Article{Donald:1993:KMP,
  author =       "Bruce Donald and Patrick Xavier and John Canny and
                 John Reif",
  title =        "Kinodynamic Motion Planning",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "1048--1066",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:57:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174150.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; reliability",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.1.2}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Approximation. {\bf
                 G.1.6}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory. {\bf I.2.9}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Robotics. {\bf I.3.5}: Computing Methodologies,
                 COMPUTER GRAPHICS, Computational Geometry and Object
                 Modeling.",
}

@Article{Tay:1993:OSM,
  author =       "Y. C. Tay",
  title =        "On the Optimality of Strategies for Multiple Joins",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "1067--1086",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:56:00 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174151.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sequencing and scheduling.",
}

@Article{Fekete:1993:IIR,
  author =       "Alan Fekete and Nancy Lynch and Yishay Mansour and
                 John Spinelli",
  title =        "The Impossibility of Implementing Reliable
                 Communication in the Face of Crashes",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "1087--1107",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:58:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/169676.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.3.1}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Specification techniques.
                 {\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems.",
}

@Article{Golumbic:1993:CAR,
  author =       "Martin Charles Golumbic and Ron Shamir",
  title =        "Complexity and Algorithms for Reasoning about Time:
                 {A} Graph-Theoretic Approach",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "1108--1133",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 22:59:26 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/169675.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Reducibility and completeness. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem
                 Proving.",
}

@Article{Arnborg:1993:ATG,
  author =       "Stefan Arnborg and Bruno Courcelle and Andrzej
                 Proskurowski and Detlef Seese",
  title =        "An Algebraic Theory of Graph Reduction",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "1134--1164",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:00:17 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/169807.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; languages; performance; theory",
  subject =      "{\bf F.4.3}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Formal Languages, Classes defined
                 by grammars or automata. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Trees.",
}

@Article{Fonlupt:1993:DPG,
  author =       "Jean Fonlupt and Armand Nachef",
  title =        "Dynamic Programming and the Graphical Traveling
                 Salesman Problem",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "1165--1187",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:01:06 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/169803.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Network problems.
                 {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Path and circuit problems.
                 {\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Backtracking. {\bf I.2.8}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search, Dynamic
                 programming.",
}

@Article{Jean-Marie:1993:PQR,
  author =       "Alain Jean-Marie and Levent G{\"{u}}n",
  title =        "Parallel Queues with Resequencing",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "1188--1208",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 01 10:10:09 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/169748.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "design; performance; theory",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Stochastic analysis. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Modeling
                 techniques. {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance, Queueing theory.",
}

@Article{Baccelli:1993:ESP,
  author =       "Fran{\c{c}}ois Baccelli and Zhen Liu and Don Towsley",
  title =        "Extremal Scheduling of Parallel Processing with and
                 without Real-Time Constraints",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "1209--1237",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:03:05 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/169745.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; management; performance; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sequencing and scheduling.
                 {\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Parallel processors. {\bf C.4}:
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS.
                 {\bf D.1.3}: Software, PROGRAMMING TECHNIQUES,
                 Concurrent Programming. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Concurrency.
                 {\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Scheduling. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Synchronization.
                 {\bf D.4.7}: Software, OPERATING SYSTEMS, Organization
                 and Design, Batch processing systems. {\bf D.4.7}:
                 Software, OPERATING SYSTEMS, Organization and Design,
                 Distributed systems. {\bf D.4.7}: Software, OPERATING
                 SYSTEMS, Organization and Design, Real-time and
                 embedded systems. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Modeling and prediction. {\bf
                 D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Stochastic analysis.",
}

@Article{Knessl:1993:STD,
  author =       "Charles Knessl",
  title =        "On the Sojourn Time Distribution in a Finite Capacity
                 Processor Shared Queue",
  journal =      j-J-ACM,
  volume =       "40",
  number =       "5",
  pages =        "1238--1301",
  month =        nov,
  year =         "1993",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:03:18 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/169736.html",
  abstract =     "We consider a processor shared M/M/1 queue that can
                 accommodate at most a finite number $K$ of customers.
                 Using singular perturbation techniques, we construct
                 asymptotic approximations to the distribution of a
                 customer's sojourn time. We assume that $ K$ is large
                 and treat several different cases of the model
                 parameters and also treat different time scales.
                 Extensive numerical comparisons are used to back up our
                 asymptotic formulas.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "performance; theory",
  subject =      "{\bf G.m}: Mathematics of Computing, MISCELLANEOUS,
                 Queueing theory.",
}

@Article{Fischer:1994:FPQ,
  author =       "Michael J. Fischer and Michael S. Paterson",
  title =        "{Fishspear}: a Priority Queue Algorithm",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "1",
  pages =        "3--30",
  month =        jan,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:06:40 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174645.html",
  abstract =     "The Fishspear priority queue algorithm is presented
                 and analyzed. Fishspear is comparable to the usual heap
                 algorithm in its worst-case running time, and its
                 relative performance is much better in many common
                 situations. Fishspear also differs from the heap method
                 in that it can be implemented efficiently using
                 sequential storage such as stacks or tapes, making it
                 potentially attractive for implementation of very large
                 queues on paged memory systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; theory",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Lists. {\bf E.2}:
                 Data, DATA STORAGE REPRESENTATIONS, Contiguous
                 representations. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Sequencing and
                 scheduling. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Sorting and
                 searching. {\bf F.2.2}: Theory of Computation, ANALYSIS
                 OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures.",
}

@Article{Rockmore:1994:ECF,
  author =       "Daniel N. Rockmore",
  title =        "Efficient Computation of {Fourier} Inversion for
                 Finite Groups",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "1",
  pages =        "31--66",
  month =        jan,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 09 18:41:14 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174646.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computation of transforms. {\bf G.1.0}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, General,
                 Numerical algorithms. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics,
                 Permutations and combinations. {\bf G.4}: Mathematics
                 of Computing, MATHEMATICAL SOFTWARE, Algorithm
                 analysis. {\bf J.2}: Computer Applications, PHYSICAL
                 SCIENCES AND ENGINEERING, Mathematics and statistics.",
}

@Article{Kearns:1994:CLL,
  author =       "Michael Kearns and Leslie Valiant",
  title =        "Cryptographic Limitations on Learning {Boolean}
                 Formulae and Finite Automata",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "1",
  pages =        "67--95",
  month =        jan,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:08:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174647.html",
  abstract =     "In this paper, we prove the intractability of learning
                 several classes of Boolean functions in the
                 distribution-free model (also called the Probably
                 Approximately Correct or PAC model) of learning from
                 examples. These results are {\em representation
                 independent}, in that they hold regardless of the
                 syntactic form in which the learner chooses to
                 represent its hypotheses.\par

                 Our methods reduce the problems of cracking a number of
                 well-known public-key cryptosystems to the learning
                 problems. We prove that a polynomial-time learning
                 algorithm for Boolean formulae, deterministic finite
                 automata or constant-depth threshold circuits would
                 have dramatic consequences for cryptography and number
                 theory. In particular, such an algorithm could be used
                 to break the RSA cryptosystem, factor Blum integers
                 (composite numbers equivalent to 3 modulo 4), and
                 detect quadratic residues. The results hold even if the
                 learning algorithm is only required to obtain a slight
                 advantage in prediction over random guessing. The
                 techniques used demonstrate an interesting duality
                 between learning and cryptography.\par

                 We also apply our results to obtain strong
                 intractability results for approximating a
                 generalization of graph coloring.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf E.3}: Data, DATA ENCRYPTION, Public key
                 cryptosystems. {\bf I.2.6}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Learning, Concept learning.
                 {\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Connectionism and neural nets.
                 {\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata.",
}

@Article{Orponen:1994:IC,
  author =       "Pekka Orponen and Ker-I Ko and Uwe Sch{\"{o}}ning and
                 Osamu Watanabe",
  title =        "Instance Complexity",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "1",
  pages =        "96--121",
  month =        jan,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:09:34 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174648.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes.",
}

@Article{Attiya:1994:BTR,
  author =       "Hagit Attiya and Cynthia Dwork and Nancy Lynch and
                 Larry Stockmeyer",
  title =        "Bounds on the Time to Reach Agreement in the Presence
                 of Timing Uncertainty",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "1",
  pages =        "122--152",
  month =        jan,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:10:22 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174649.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; reliability; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes. {\bf C.4}:
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS,
                 Reliability, availability, and serviceability. {\bf
                 F.2.0}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, General. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf F.2.0}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, General. {\bf C.2.4}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems.",
}

@Article{Baker:1994:AAN,
  author =       "Brenda S. Baker",
  title =        "Approximation Algorithms for {NP}-Complete Problems on
                 Planar Graphs",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "1",
  pages =        "153--180",
  month =        jan,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:10:51 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174650.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Reducibility and
                 completeness. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory.",
}

@Article{Alur:1994:RTL,
  author =       "Rajeev Alur and Thomas A. Henzinger",
  title =        "A Really Temporal Logic",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "1",
  pages =        "181--204",
  month =        jan,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:11:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174651.html",
  abstract =     "We introduce a temporal logic for the specification of
                 real-time systems. Our logic, TPTL, employs a novel
                 quantifier construct for referencing time: the {\em
                 freeze quantifier\/} binds a variable to the time of
                 the local temporal context.\par

                 TPTL is both a natural language for specification and a
                 suitable formalism for verification. We present a
                 tableau-based decision procedure and a model-checking
                 algorithm for TPTL. Several generalizations of TPTL are
                 shown to be highly undecidable.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory; verification",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Model theory.
                 {\bf F.4.3}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Formal Languages, Decision
                 problems. {\bf C.3}: Computer Systems Organization,
                 SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS,
                 Real-time systems. {\bf D.2.1}: Software, SOFTWARE
                 ENGINEERING, Requirements/Specifications, Languages.
                 {\bf D.2.4}: Software, SOFTWARE ENGINEERING, Program
                 Verification, Correctness proofs. {\bf F.2.2}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Complexity of proof procedures. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about
                 Programs.",
}

@Article{Dubiner:1994:FTP,
  author =       "Moshe Dubiner and Zvi Galil and Edith Magen",
  title =        "Faster Tree Pattern Matching",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "2",
  pages =        "205--213",
  month =        mar,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:12:49 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174653.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Pattern matching.
                 {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Trees.",
}

@Article{Khuller:1994:BAG,
  author =       "Samir Khuller and Uzi Vishkin",
  title =        "Biconnectivity Approximations and Graph Carvings",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "2",
  pages =        "214--235",
  month =        mar,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:13:25 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174654.html",
  abstract =     "A spanning tree in a graph is the smallest connected
                 spanning subgraph. Given a graph, how does one find the
                 smallest (i.e., least number of edges) 2-connected
                 spanning subgraph (connectivity refers to both edge and
                 vertex connectivity, if not specified)? Unfortunately,
                 the problem is known to be NP-hard.\par

                 We consider the problem of finding a better
                 approximation to the smallest 2-connected subgraph, by
                 an efficient algorithm. For 2-edge connectivity, our
                 algorithm guarantees a solution that is no more than
                 3/2 times the optimal. For 2-vertex connectivity, our
                 algorithm guarantees a solution that is no more than
                 5/3 times the optimal. The previous best approximation
                 factor is 2 for each of these problems. The new
                 algorithms (and their analyses) depend upon a structure
                 called a {\em carving\/} of a graph, which is of
                 independent interest. We show that approximating the
                 optimal solution to within an additive constant is
                 NP-hard as well.\par

                 We also consider the case where the graph has edge
                 weights. For this case, we show that an approximation
                 factor of 2 is possible in polynomial time for finding
                 a $k$-edge connected spanning subgraph. This improves
                 an approximation factor of 3 for $k$ = 2, due to
                 Frederickson and J{\'a}J{\'a} [1981], and extends it
                 for any $k$ (with an increased running time though).",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures.",
}

@Article{Bachmair:1994:EIC,
  author =       "Leo Bachmair and Nachum Dershowitz",
  title =        "Equational Inference, Canonical Proofs, and Proof
                 Orderings",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "2",
  pages =        "236--276",
  month =        mar,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:14:08 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174655.html",
  abstract =     "We describe the application of proof orderings---a
                 technique for reasoning about inference systems-to
                 various rewrite-based theorem-proving methods,
                 including refinements of the standard Knuth--Bendix
                 completion procedure based on critical pair criteria;
                 Huet's procedure for rewriting modulo a congruence;
                 ordered completion (a refutationally complete extension
                 of standard completion); and a proof by consistency
                 procedure for proving inductive theorems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Proof theory.
                 {\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Computational
                 logic. {\bf F.4.1}: Theory of Computation, MATHEMATICAL
                 LOGIC AND FORMAL LANGUAGES, Mathematical Logic,
                 Mechanical theorem proving. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Deduction. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Mathematical induction. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Metatheory.",
}

@Article{Abrahamson:1994:TLB,
  author =       "Karl Abrahamson and Andrew Adler and Lisa Higham and
                 David Kirkpatrick",
  title =        "Tight Lower Bounds for Probabilistic Solitude
                 Verification on Anonymous Rings",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "2",
  pages =        "277--310",
  month =        mar,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:05:16 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174656.html",
  abstract =     "A model that captures communication on asynchronous
                 unidirectional rings is formalized. Our model
                 incorporates both probabilistic and nondeterministic
                 features and is strictly more powerful than a purely
                 probabilistic model. Using this model, a collection of
                 tools are developed that facilitate studying lower
                 bounds on the expected communication complexity of
                 Monte Carlo algorithms for language recognition
                 problems on anonymous asynchronous unidirectional
                 rings. The tools are used to establish tight lower
                 bounds on the expected bit complexity of the Solitude
                 Verification problem that asymptotically match upper
                 bounds for this problem. The bounds demonstrate that,
                 for this problem, the expected bit complexity depends
                 subtly on the processors' knowledge of the size of the
                 ring and on whether or not processor-detectable
                 termination is required.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Probabilistic
                 computation. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency. {\bf F.2.3}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Tradeoffs among Complexity Measures. {\bf
                 C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf C.2.1}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Network Architecture and Design, Network
                 communications. {\bf G.3}: Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Probabilistic algorithms
                 (including Monte Carlo).",
}

@Article{Singh:1994:EAR,
  author =       "Ambuj K. Singh and James H. Anderson and Mohamed G.
                 Gouda",
  title =        "The Elusive Atomic Register",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "2",
  pages =        "311--339",
  month =        mar,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:15:10 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174657.html",
  abstract =     "We present a construction of a single-writer,
                 multiple-reader atomic register from single-writer,
                 single-reader atomic registers. The complexity of our
                 construction is asymptotically optimal; $O(M^{2} + MN)$
                 shared single-writer, single-reader safe bits are
                 required to construct a single-writer, $M$-reader,
                 $N$-bit atomic register.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; reliability; theory",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Concurrency. {\bf D.1.3}: Software,
                 PROGRAMMING TECHNIQUES, Concurrent Programming. {\bf
                 D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Concurrent programming
                 structures. {\bf D.4.1}: Software, OPERATING SYSTEMS,
                 Process Management, Mutual exclusion. {\bf D.4.1}:
                 Software, OPERATING SYSTEMS, Process Management,
                 Synchronization. {\bf D.4.5}: Software, OPERATING
                 SYSTEMS, Reliability, Fault-tolerance. {\bf F.1.2}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation, Parallelism and concurrency.",
}

@Article{Fagin:1994:RAK,
  author =       "Ronald Fagin and Joseph Y. Halpern",
  title =        "Reasoning About Knowledge and Probability",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "2",
  pages =        "340--367",
  month =        mar,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 10 17:58:31 1998",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See corrigendum \cite{Fagin:1998:CRA}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174658.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory; verification",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Uncertainty, ``fuzzy,'' and probabilistic reasoning.
                 {\bf I.2.5}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Programming Languages and Software. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Model theory.
                 {\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS.",
}

@Article{Kfoury:1994:AMT,
  author =       "A. J. Kfoury and J. Tiuryn and P. Urzyczyn",
  title =        "An Analysis of {ML} Typability",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "2",
  pages =        "368--398",
  month =        mar,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:16:35 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174659.html",
  abstract =     "We carry out an analysis of typability of terms in ML.
                 Our main result is that this problem is DEXPTIME-hard,
                 where by DEXPTIME we mean DTIME($2^n0(1)$). This,
                 together with the known exponential-time algorithm that
                 solves the problem, yields the DEXPTIME-completeness
                 result. This settles an open problem of P. Kanellakis
                 and J. C. Mitchell.\par

                 Part of our analysis is an algebraic characterization
                 of ML typability in terms of a restricted form of
                 semi-unification, which we identify as {\em acyclic
                 semi-unification}. We prove that ML typability and
                 acyclic semi-unification can be reduced to each other
                 in polynomial time. We believe this result is of
                 independent interest.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; languages; theory",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, ML. {\bf D.3.1}: Software, PROGRAMMING
                 LANGUAGES, Formal Definitions and Theory. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features. {\bf F.3.3}: Theory of Computation,
                 LOGICS AND MEANINGS OF PROGRAMS, Studies of Program
                 Constructs, Type structure. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic. {\bf F.4.2}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Grammars and
                 Other Rewriting Systems, Decision problems.",
}

@Article{Cosnard:1994:OAP,
  author =       "Michel Cosnard and El Mostafa Daoudi",
  title =        "Optimal Algorithms for Parallel {Givens} Factorization
                 on a Coarse-Grained {PRAM}",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "2",
  pages =        "399--421",
  month =        mar,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:17:20 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174660.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; theory",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Computations on matrices. {\bf G.1.3}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, Numerical
                 Linear Algebra. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Unbounded-action devices. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf G.1.0}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, General,
                 Parallel algorithms.",
}

@Article{Alon:1994:PLP,
  author =       "Noga Alon and Nimrod Megiddo",
  title =        "Parallel Linear Programming in Fixed Dimension Almost
                 Surely in Constant Time",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "2",
  pages =        "422--434",
  month =        mar,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:17:48 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/174661.html",
  abstract =     "For any fixed dimension $d$, the linear programming
                 problem with $n$ inequality constraints can be solved
                 on a probabilistic CRCW PRAM with $O(n)$ processors
                 almost surely in constant time. The algorithm always
                 finds the correct solution. With $nd/\log^{2}d$
                 processors, the probability that the algorithm will not
                 finish within $O(d^{2}\log^{2}d)$ time tends to zero
                 exponentially with $n$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf G.1.6}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Optimization, Linear programming. {\bf
                 G.1.0}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 General, Parallel algorithms. {\bf G.3}: Mathematics of
                 Computing, PROBABILITY AND STATISTICS, Probabilistic
                 algorithms (including Monte Carlo).",
}

@Article{Ladkin:1994:BCP,
  author =       "Peter B. Ladkin and Roger D. Maddux",
  title =        "On Binary Constraint Problems",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "3",
  pages =        "435--469",
  month =        may,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:20:38 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/176585.html",
  abstract =     "The concepts of binary constraint satisfaction
                 problems can be naturally generalized to the relation
                 algebras of Tarski. The concept of path-consistency
                 plays a central role. Algorithms for path-consistency
                 can be implemented on matrices of relations and on
                 matrices of elements from a relation algebra. We give
                 an example of a 4-by-4 matrix of infinite relations on
                 which on iterative local path-consistency algorithm
                 terminates. We give a class of examples over a fixed
                 finite algebra on which all iterative local algorithms,
                 whether parallel or sequential, must take quadratic
                 time. Specific relation algebras arising from interval
                 constraint problems are also studied: the Interval
                 Algebra, the Point Algebra, and the Containment
                 Algebra.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Model theory. {\bf I.2.4}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Knowledge
                 Representation Formalisms and Methods, Relation
                 systems.",
}

@Article{Blum:1994:NAA,
  author =       "Avrim Blum",
  title =        "New Approximation Algorithms for Graph Coloring",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "3",
  pages =        "470--516",
  month =        may,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:20:56 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/176586.html",
  abstract =     "The problem of coloring a graph with the minimum
                 number of colors is well known to be NP-hard, even
                 restricted to $k$-colorable graphs for constant $k \geq
                 3$. This paper explores the approximation problem of
                 coloring $k$-colorable graphs with as few additional
                 colors as possible in polynomial time, with special
                 focus on the case of $k = 3$.\par

                 The previous best upper bound on the number of colors
                 needed for coloring 3-colorable $n$-vertex graphs in
                 polynomial time was $o(n/\log n)$ colors by Berger and
                 Rompel, improving a bound of $o(n)$ colors by
                 Wigderson. This paper presents an algorithm to color
                 any 3-colorable graph with
                 $o(n^{3/8}\mbox{polylog}(n))$ colors, thus breaking an
                 ``$O(n^{1/2})-o(1)$ barrier''. The algorithm given here
                 is based on examining second-order neighborhoods of
                 vertices, rather than just immediate neighborhoods of
                 vertices as in previous approaches. We extend our
                 results to improve the worst-case bounds for coloring
                 $k$-colorable graphs for constant $k > 3$ as well.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms.",
}

@Article{Drusinsky:1994:PBC,
  author =       "Doron Drusinsky and David Harel",
  title =        "On the Power of Bounded Concurrency {I}: {Finite}
                 Automata",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "3",
  pages =        "517--539",
  month =        may,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:21:21 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/176587.html",
  abstract =     "We investigate the descriptive succinctness of three
                 fundamental notions for modeling concurrency:
                 nondeterminism and pure parallelism, the two facets of
                 alternation, and {\em bounded cooperative concurrency},
                 whereby a system configuration consists of a bounded
                 number of cooperating states. Our results are couched
                 in the general framework of finite-state automata, but
                 hold for appropriate versions of most concurrent models
                 of computation, such as Petri nets, statecharts or
                 finite-state versions of concurrent programming
                 languages. We exhibit exhaustive sets of upper and
                 lower bounds on the relative succinctness of these
                 features over $\Sigma^*$ and $\Sigma^\omega$,
                 establishing that:\par

                 \begin{itemize} \item Each of the three features
                 represents an exponential saving in succinctness of the
                 representation, in a manner that is independent of the
                 other two and additive with respect to them. \item Of
                 the three, bounded concurrency is the strongest,
                 representing a similar exponential saving even when
                 substituted for each of the others. \end{itemize}
                 \par

                 For example, we prove exponential upper and lower
                 bounds on the simulation of deterministic concurrent
                 automata by AFAs, and triple-exponential bounds on the
                 simulation of alternating concurrent automata by
                 DFAs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Automata. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism.",
}

@Article{Hirst:1994:PBC,
  author =       "Tirza Hirst and David Harel",
  title =        "On the Power of Bounded Concurrency {II}: {Pushdown}
                 Automata",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "3",
  pages =        "540--554",
  month =        may,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:21:42 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/176588.html",
  abstract =     "This is the second in a series of papers on the
                 inherent power of bounded cooperative concurrency,
                 whereby an automaton can be in some bounded number of
                 states that cooperate in accepting the input. In this
                 paper, we consider pushdown automata. We are interested
                 in differences in power of expression and in
                 exponential (or higher) discrepancies in succinctness
                 between variants of pda's that incorporate
                 nondeterminism ($E$), pure parallelism ($A$), and
                 bounded cooperative concurrency (C). Technically, the
                 results are proved for cooperating push-down automata
                 with cooperating states, but they hold for appropriate
                 versions of most concurrent models of computation. We
                 exhibit exhaustive sets of upper and lower bounds on
                 the relative succinctness of these features for three
                 classes of languages: deterministic context-free,
                 regular, and finite. For example, we show that C
                 represents exponential savings in succinctness in all
                 cases except when both $E$ and $A$ are present (i.e.,
                 except for alternating automata), and that $E$ and $A$
                 represent {\em unlimited\/} savings in succinctness in
                 all cases.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Automata. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism.",
}

@Article{Rivest:1994:DBI,
  author =       "Ronald L. Rivest and Robert E. Schapire",
  title =        "Diversity-Based Inference of Finite Automata",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "3",
  pages =        "555--589",
  month =        may,
  year =         "1994",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/176584.176589",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 22 23:22:07 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/176589.html",
  abstract =     "We present new procedures for inferring the structure
                 of a finite-state automaton (FSA) from its input/output
                 behavior, using access to the automaton to perform
                 experiments.\par

                 Our procedures use a new representation for finite
                 automata, based on the notion of equivalence between
                 {\em tests}. We call the number of such equivalence
                 classes the {\em diversity\/} of the automaton; the
                 diversity may be as small as the logarithm of the
                 number of states of the automaton. For the special
                 class of {\em permutation automata}, we describe an
                 inference procedure that runs in time polynomial in the
                 diversity and $\log(1/\delta)$, where $\delta$ is a
                 given upper bound on the probability that our procedure
                 returns an incorrect result. (Since our procedure uses
                 randomization to perform experiments, there is a
                 certain controllable chance that it will return an
                 erroneous result.) We also discuss techniques for
                 handling more general automata.\par

                 We present evidence for the practical efficiency of our
                 approach. For example, our procedure is able to infer
                 the structure of an automaton based on Rubik's Cube
                 (which has approximately $10^{19}$ states) in about 2
                 minutes on a DEC MicroVax. This automaton is many
                 orders of magnitude larger than possible with previous
                 techniques, which would require time proportional at
                 least to the number of global states. (Note that in
                 this example, only a small fraction ($10^{-14}$) of the
                 global states were even visited.)\par

                 Finally, we present a new procedure for inferring
                 automata of a special type in which the global state is
                 composed of a vector of binary local state variables,
                 all of which are observable (or {\em visible\/}) to the
                 experimenter. Our inference procedure runs provably in
                 time polynomial in the size of this vector (which
                 happens to be the diversity of the automaton), even
                 though the global state space may be exponentially
                 larger. The procedure plans and executes experiments on
                 the unknown automaton; we show that the number of input
                 symbols given to the automaton during this process is
                 (to within a constant factor) the best possible.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; experimentation; theory",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Concept learning. {\bf I.2.6}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Learning, Induction. {\bf I.2.9}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Robotics.",
}

@Article{Buntine:1994:SED,
  author =       "Wray L. Buntine and Hans-J{\"{u}}rgen B{\"{u}}rckert",
  title =        "On Solving Equations and Disequations",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "4",
  pages =        "591--629",
  month =        jul,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 07:59:25 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/179813.html",
  abstract =     "We are interested in the problem of solving a system
                 $<s_i=t_i:1 \leq i \leq n, p_j \neq q_j : 1 \leq j \leq
                 m>$ of equations and disequations, also known as
                 disunification. Solutions to disunification problems
                 are substitutions for the variables of the problem that
                 make the two terms of each equation equal, but leave
                 those of the disequations different. We investigate
                 this in both algebraic and logical contexts where
                 equality is defined by an equational theory and more
                 generally by a definitive clause equality theory $E$.
                 We show how $E$-disunification can be reduced to
                 $E$-unification, that is, solving equations only, and
                 give a disunification algorithm for theories given a
                 unification algorithm. In fact, this result shows that
                 for theories in which the solutions of all unification
                 problems can also be represented finitely. We sketch
                 how disunification can be applied to handle negation in
                 logic programming with equality in a similar style to
                 Colmerauer's logic programming with rational trees, and
                 to represent many solutions to AC-unification problems
                 by a few solutions to ACI-disunification problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "definite clause; E-disunification; E-unification;
                 equational theory; inequations; languages; logic
                 programming; solving equations and disequations;
                 theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Computational logic.",
}

@Article{Blum:1994:LAS,
  author =       "Avrim Blum and Ming Li and John Tromp and Mihalis
                 Yannakakis",
  title =        "Linear Approximation of Shortest Superstrings",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "4",
  pages =        "630--647",
  month =        jul,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:22:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/179818.html",
  abstract =     "We consider the following problem: given a collection
                 of strings $s_1, \ldots{}, s_m$, find the shortest
                 string $s$ such that each $s_i$ appears as a substring
                 (a consecutive block) of $s$. Although this problem is
                 known to be NP-hard, a simple greedy procedure appears
                 to do quite well and is routinely used in DNA
                 sequencing and data compression practice, namely:
                 repeatedly merge the pair of (distinct) strings with
                 maximum overlap until only one string remains. Let $n$
                 denote the length of the optimal superstring. A common
                 conjecture states that the above greedy procedure
                 produces a superstring of length $O(n)$ (in fact,
                 $2n$), yet the only previous nontrivial bound known for
                 any polynomial-time algorithm is a recent $O(n \log n)$
                 result.\par

                 We show that the greedy algorithm does in fact achieve
                 a constant factor approximation, proving an upper bound
                 of $4n$. Furthermore, we present a simple modified
                 version of the greedy algorithm that we show produces a
                 superstring of length at most $3n$. We also show the
                 superstring problem to be MAXSNP-hard, which implies
                 that a polynomial-time approximation scheme for this
                 problem is unlikely.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; approximation algorithms; shortest common
                 superstrings",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics.",
}

@Article{Conway:1994:EDM,
  author =       "Adrian E. Conway and Eugene Pinsky and Srinivasan
                 Tridandapani",
  title =        "Efficient Decomposition Methods for the Analysis of
                 Multi-Facility Blocking Models",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "4",
  pages =        "648--675",
  month =        jul,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:22:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/179838.html",
  abstract =     "Three new decomposition methods are developed for the
                 exact analysis of stochastic multi-facility blocking
                 models of the product-form type. The first is a basic
                 decomposition algorithm that reduces the analysis of
                 blocking probabilities to that of two separate
                 subsystems. The second is a generalized $M$-subsystem
                 decomposition method. The third is a more elaborate and
                 efficient incremental decomposition technique. All of
                 the algorithms exploit the sparsity of locality that
                 can be found in the demand matrix of a system. By
                 reducing the analysis to that of a set of subsystems,
                 the overall dimensionality of the problem is diminished
                 and the computational requirements are reduced
                 significantly. This enables the efficient computation
                 of blocking probabilities in large systems. Several
                 numerical examples are provided to illustrate the
                 computational savings that can be realized.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; blocking models; circuit-switched
                 networks; decomposition methods; exact analysis;
                 locality; performance; product-form; recursion;
                 sparsity; theory; verification",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Stochastic analysis. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Network operating systems. {\bf
                 D.4.4}: Software, OPERATING SYSTEMS, Communications
                 Management, Network communication. {\bf D.4.8}:
                 Software, OPERATING SYSTEMS, Performance, Modeling and
                 prediction. {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance, Queueing theory.",
}

@Article{Lui:1994:CBS,
  author =       "John C. S. Lui and Richard R. Muntz",
  title =        "Computing Bounds on Steady State Availability of
                 Repairable Computer Systems",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "4",
  pages =        "676--707",
  month =        jul,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:22:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/179848.html",
  abstract =     "One of the most important performance measures for
                 computer system designers is system availability. Most
                 often, Markov models are used in representing systems
                 for dependability/availability analysis. Due to complex
                 interactions between components and complex repair
                 policies, the Markov model often has an irregular
                 structure, and closed-form solutions are extremely
                 difficult to obtain. Also, a realistic system model
                 often has an unmanageably large state space and it
                 quickly becomes impractical to even generate the entire
                 transition rate matrix. In this paper, we present a
                 methodology that can (i) bound the system steady state
                 availability and at the same time, (ii) drastically
                 reduce the state space of the model that must be
                 solved. The bounding algorithm is iterative and
                 generates a part of the transition matrix at each step.
                 At each step, tighter bounds on system availability are
                 obtained. The algorithm also allows the size of the
                 submodel, to be solved at each step, to be chosen so as
                 to accommodate memory limitations. This general
                 bounding methodology provides an efficient way to
                 evaluate dependability models with very large state
                 spaces without ever generating the entire transition
                 rate matrix.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; availability; bounds; Markov models;
                 reliability; stationary probabilities; theory",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Reliability, availability, and
                 serviceability. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Stochastic analysis.",
}

@Article{Bell:1994:RBG,
  author =       "Timothy C. Bell and Ian H. Witten",
  title =        "The Relationship between Greedy Parsing and Symbolwise
                 Text Compression",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "4",
  pages =        "708--724",
  month =        jul,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:22:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/179892.html",
  abstract =     "Text compression methods can be divided into two
                 classes: {\em symbolwise\/} and {\em parsing}.
                 Symbolwise methods assign codes to individual symbols,
                 while parsing methods assign codes to groups of
                 consecutive symbols (phrases). The set of phrases
                 available to a parsing method is referred to as a {\em
                 dictionary}. The vast majority of parsing methods in
                 the literature use {\em greedy\/} parsing (including
                 nearly all variations of the popular Ziv--Lempel
                 methods). When greedy parsing is used, the coder
                 processes a string from left to right, at each step
                 encoding as many symbols as possible with a phrase from
                 the dictionary. This parsing strategy is not optimal,
                 but an optimal method cannot guarantee a bounded coding
                 delay.\par

                 An important problem in compression research has been
                 to establish the relationship between symbolwise
                 methods and parsing methods. This paper extends prior
                 work that shows that there are symbolwise methods that
                 simulate a subset of greedy parsing methods. We provide
                 a more general algorithm that takes any {\em
                 nonadaptive\/} greedy parsing method and constructs a
                 symbolwise method that achieves exactly the same
                 compression. Combined with the existence of symbolwise
                 equivalents for two of the most significant {\em
                 adaptive\/} parsing methods, this result gives added
                 weight to the idea that research aimed at increasing
                 compression should concentrate on symbolwise methods,
                 while parsing methods should be chosen for speed or
                 temporary storage considerations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "adaptive modelling; algorithms; context modeling;
                 theory; Ziv--Lempel compression",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY, Data
                 compaction and compression. {\bf H.1.1}: Information
                 Systems, MODELS AND PRINCIPLES, Systems and Information
                 Theory, Information theory.",
}

@Article{Attiya:1994:WFA,
  author =       "Hagit Attiya and Nancy Lynch and Nir Shavit",
  title =        "Are Wait-Free Algorithms Fast?",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "4",
  pages =        "725--763",
  month =        jul,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:22:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/179902.html",
  abstract =     "The time complexity of wait-free algorithms in
                 ``normal'' executions, where no failures occur and
                 processes operate at approximately the same speed, is
                 considered. A lower bound of $\log n$ on the time
                 complexity of any wait-free algorithm that achieves
                 {\em approximate agreement\/} among $n$ processes is
                 proved. In contrast, there exists a non-wait-free
                 algorithm that solves this problem in constant time.
                 This implies an $\Omega(\log n)$ time separation
                 between the wait-free and non-wait-free computation
                 models. On the positive side, we present an $O(\log n)$
                 time wait-free approximate agreement algorithm; the
                 complexity of this algorithm is within a small constant
                 of the lower bound.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; approximate agreement; fault-tolerance;
                 performance; reliability; theory; wait-free",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming, Distributed
                 programming. {\bf D.4.1}: Software, OPERATING SYSTEMS,
                 Process Management, Concurrency. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management,
                 Multiprocessing/multiprogramming. {\bf D.4.1}:
                 Software, OPERATING SYSTEMS, Process Management,
                 Synchronization.",
}

@Article{Reif:1994:MPP,
  author =       "John Reif and Micha Sharir",
  title =        "Motion Planning in the Presence of Moving Obstacles",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "4",
  pages =        "764--790",
  month =        jul,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:22:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/179911.html",
  abstract =     "This paper investigates the computational complexity
                 of planning the motion of a body B in 2-D or 3-D space,
                 so as to avoid collision with moving obstacles of
                 known, easily computed, trajectories. Dynamic movement
                 problems are of fundamental importance to robotics, but
                 their computational complexity has not previously been
                 investigated.\par

                 We provide evidence that the 3-D dynamic movement
                 problem is intractable even if B has only a constant
                 number of degrees of freedom of movement. In
                 particular, we prove the problem is PSPACE-hard if B is
                 given a velocity modulus bound on its movements and is
                 NP-hard even if B has no velocity modulus bound, where,
                 in both cases, B has 6 degrees of freedom. To prove
                 these results, we use a unique method of simulation of
                 a Turing machine that uses time to encode
                 configurations (whereas previous lower bound proofs in
                 robotic motion planning used the system position to
                 encode configurations and so required unbounded number
                 of degrees of freedom).\par

                 We also investigate a natural class of dynamic problems
                 that we call {\em asteroid avoidance problems\/}: B,
                 the object we wish to move, is a convex polyhedron that
                 is free to move by translation with bounded velocity
                 modulus, and the polyhedral obstacles have known
                 translational trajectories but cannot rotate. This
                 problem has many applications to robot, automobile, and
                 aircraft collision avoidance. Our main positive results
                 are polynomial time algorithms for the 2-D asteroid
                 avoidance problem, where B is a moving polygon and we
                 assume a constant number of obstacles, as well as
                 single exponential time or polynomial space algorithms
                 for the 3-D asteroid avoidance problem, where B is a
                 convex polyhedron and there are arbitrarily many
                 obstacles. Our techniques for solving these asteroid
                 avoidance problems use ``normal path'' arguments, which
                 are an interesting generalization of techniques
                 previously used to solve static shortest path
                 problems.\par

                 We also give some additional positive results for
                 various other dynamic movers problems, and in
                 particular give polynomial time algorithms for the case
                 in which B has no velocity bounds and the movements of
                 obstacles are algebraic in space-time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; computational geometry; cylindrical
                 algebraic decomposition; decision procedures; motion
                 planning; moving obstacles; theory; theory of reals;
                 Turing machines",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Plan execution, formation, generation. {\bf
                 I.2.9}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Robotics. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Geometrical problems and computations.",
}

@Article{Gao:1994:CRM,
  author =       "Shaodi Gao and Michael Kaufmann",
  title =        "Channel Routing of Multiterminal Nets",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "4",
  pages =        "791--818",
  month =        jul,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Oct 20 23:22:32 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/179927.html",
  abstract =     "This paper presents new upper bounds for channel
                 routing of multiterminal nets, which answers the
                 long-standing open question whether or not
                 multiterminal problems really require channels two
                 times wider than 2-terminal problems. We transform any
                 multiterminal problem of density $d$ into a so-called
                 extended simple channel routing problem (ESCRP) of
                 density $3d/2+O(d \log d)$. We then describe routing
                 algorithms for solving ESCRPs in three different
                 models. The channel width $w$ is $ <=3d/2+O(d\log d) $
                 in the knock-knee and unit-vertical-overlap models, and
                 $ w<=3d/2+O(d\log d) + O(f) $ in the Manhattan model,
                 where $f$ is the flux of the problem. In all three
                 cases, we improve the best-known upper bounds.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; channel routing; design; theory; VLSI
                 layout",
  subject =      "{\bf B.7.2}: Hardware, INTEGRATED CIRCUITS, Design
                 Aids, Placement and routing. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Routing and layout.",
}

@Article{Rathmann:1994:CHS,
  author =       "Peter K. Rathmann and Marianne Winslett and Mark
                 Manasse",
  title =        "Circumscription with Homomorphisms: {Solving} the
                 Equality and Counterexample Problems",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "5",
  pages =        "819--873",
  month =        sep,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 07:56:14 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/185678.html",
  abstract =     "One important facet of common-sense reasoning is the
                 ability to draw default conclusions about the state of
                 the world, so that one can, for example, assume that a
                 given bird flies in the absence of information to the
                 contrary. A deficiency in the circumscriptive approach
                 to common-sense reasoning has been its difficulties in
                 producing default that Tweety $\ne$ Blutto using
                 ordinary circumscription, or conclude by default that a
                 particular bird flies, if some birds are known not to
                 fly. In this paper, we introduce a new form of
                 circumscription, based on homomorphisms between models,
                 that remedies these two problems and still retains the
                 major desirable properties of traditional forms of
                 circumscription.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Nonmonotonic reasoning and belief revision. {\bf
                 I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods, Predicate logic. {\bf I.2.0}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, General,
                 Philosophical foundations.",
}

@Article{Glass:1994:TMA,
  author =       "Christopher J. Glass and Lionel M. Ni",
  title =        "The Turn Model for Adaptive Routing",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "5",
  pages =        "874--902",
  month =        sep,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 06 08:47:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/185682.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; performance",
  subject =      "{\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network topology. {\bf C.1.2}: Computer
                 Systems Organization, PROCESSOR ARCHITECTURES, Multiple
                 Data Stream Architectures (Multiprocessors),
                 Interconnection architectures. {\bf C.1.2}: Computer
                 Systems Organization, PROCESSOR ARCHITECTURES, Multiple
                 Data Stream Architectures (Multiprocessors), Parallel
                 processors. {\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf C.2.1}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Network Architecture and Design, Network
                 communications. {\bf C.2.1}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Architecture and Design, Packet networks.",
}

@Article{Dallery:1994:ERS,
  author =       "Yves Dallery and Zhen Liu and Don Townsley",
  title =        "Equivalence, Reversibility, Symmetry and Concavity
                 Properties in Fork-Join Queueing Networks with
                 Blocking",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "5",
  pages =        "903--942",
  month =        sep,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 06 08:47:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/185776.html",
  abstract =     "In this paper, we study quantitative as well as
                 qualitative properties of Fork-Join Queuing Networks
                 with Blocking (FJQN/Bs). Specifically, we prove results
                 regarding the equivalence of the behavior of a FJQN/B
                 and that of its duals and a strongly connected marked
                 graph. In addition, we obtain general conditions that
                 must be satisfied by the service times to guarantee the
                 existence of a long-term throughput and its
                 independence on the initial configuration. We also
                 establish conditions under which the reverse of a
                 FJQN/B has the same throughput as the original network.
                 By combining the equivalence result for duals and the
                 reversibility result, we establish a symmetry property
                 for the throughput of a FJQN/B. Last, we establish that
                 the throughput is a concave function of the buffer
                 sizes and the initial marking, provided that the
                 service times are mutually independent random variables
                 belonging to the class of PERT distributions that
                 includes the Erlang distributions. This last result
                 coupled with the symmetry property can be used to
                 identify the initial configuration that maximizes the
                 long-term throughput in closed series-parallel
                 networks.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "performance",
  subject =      "{\bf G.m}: Mathematics of Computing, MISCELLANEOUS,
                 Queueing theory. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Queueing theory. {\bf D.4.8}:
                 Software, OPERATING SYSTEMS, Performance, Stochastic
                 analysis. {\bf C.4}: Computer Systems Organization,
                 PERFORMANCE OF SYSTEMS, Modeling techniques.",
}

@Article{Driscoll:1994:FPL,
  author =       "James R. Driscoll and Daniel D. K. Sleator and Robert
                 E. Tarjan",
  title =        "Fully Persistent Lists with Catenation",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "5",
  pages =        "943--959",
  month =        sep,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 06 08:47:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/185791.html",
  abstract =     "This paper considers the problem of representing
                 stacks with catenation so that any stack, old or new,
                 is available for access or update operations. This
                 problem arises in the implementation of list-based and
                 functional programming languages. A solution is
                 proposed requiring constant time and space for each
                 stack operation except catenation, which requires
                 $O(\log \log k)$ time and space. Here $k$ is the number
                 of stack operations done before the catenation. All the
                 resource bounds are amortized over the sequence of
                 operations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "design; theory",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Lists. {\bf D.1.1}:
                 Software, PROGRAMMING TECHNIQUES, Applicative
                 (Functional) Programming. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures.",
}

@Article{Lund:1994:HAM,
  author =       "Carsten Lund and Mihalis Yannakakis",
  title =        "On the Hardness of Approximating Minimization
                 Problems",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "5",
  pages =        "960--981",
  month =        sep,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 06 08:47:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Storer:1994:SPP,
  author =       "James A. Storer and John H. Reif",
  title =        "Shortest Paths in the Plane with Polygonal Obstacles",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "5",
  pages =        "982--1012",
  month =        sep,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 06 08:47:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/185795.html",
  abstract =     "We present a practical algorithm for finding
                 minimum-length paths between points in the Euclidean
                 plane with (not necessarily convex) polygonal
                 obstacles. Prior to this work, the best known algorithm
                 for finding the shortest path between two points in the
                 plane required $\Omega(n^{2} \log n)$ time and
                 $O(n^{2})$ space, where $n$ denotes the number of
                 obstacle edges. Assuming that a triangulation or a
                 Voronoi diagram for the obstacle space is provided with
                 the input (if is not, either one can be precomputed in
                 $O(n \log n)$ time), we present an $O(kn)$ time
                 algorithm, where $k$ denotes the number of ``islands''
                 (connected components) in the obstacle space. The
                 algorithm uses only $O(n)$ space and, given a source
                 point $s$, produces an $O(n)$ size data structure such
                 that the distance between $s$ and any other point $x$
                 in the plane $(x)$ is not necessarily an obstacle
                 vertex or a point on an obstacle edge can be computed
                 in $O(1)$ time. The algorithm can also be used to
                 compute shortest paths for the movement of a disk (so
                 that optimal movement for arbitrary objects can be
                 computed to the accuracy of enclosing them with the
                 smallest possible disk).",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations.",
}

@Article{Reif:1994:SEU,
  author =       "John H. Reif and James A. Storer",
  title =        "A Single-Exponential Upper Bound for Finding Shortest
                 Paths in Three Dimensions",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "5",
  pages =        "1013--1019",
  month =        sep,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 06 08:47:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/185811.html",
  abstract =     "We derive a single-exponential time upper bound for
                 finding the shortest path between two points in
                 3-dimensional Euclidean space with (nonnecessarily
                 convex) polyhedral obstacles. Prior to this work, the
                 best known algorithm required double-exponential time.
                 Given that the problem is known to be PSPACE-hard, the
                 bound we present is essentially the best (in the
                 worst-case sense) that can reasonably be expected.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems.",
}

@Article{Aspnes:1994:CN,
  author =       "James Aspnes and Maurice Herlihy and Nir Shavit",
  title =        "Counting Networks",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "5",
  pages =        "1020--1048",
  month =        sep,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 06 08:47:03 1994",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/185815.html",
  abstract =     "Many fundamental multi-processor coordination problems
                 can be expressed as {\em counting problems\/}:
                 Processes must cooperate to assign successive values
                 from a given range, such as addresses in memory or
                 destinations on an interconnection network.
                 Conventional solutions to these problems perform poorly
                 because of synchronization bottlenecks and high memory
                 contention.\par

                 Motivated by observations on the behavior of sorting
                 networks, we offer a new approach to solving such
                 problems, by introducing {\em counting networks}, a new
                 class of networks that can be used to count. We give
                 two counting network constructions, one of depth $\log
                 n(1 + \log n)/2$ using $n \log (1 + \log n)/4$
                 ``gates,'' and a second of depth $\log^2 n$ using $n
                 \log^{2n}/2$ gates. These networks avoid the sequential
                 bottlenecks inherent to earlier solutions and
                 substantially lower the memory contention.\par

                 Finally, to show that counting networks are not merely
                 mathematical creatures, we provide experimental
                 evidence that they outperform conventional
                 synchronization techniques under a variety of
                 circumstances.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf C.2.1}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Architecture and Design, Distributed networks. {\bf
                 C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network topology. {\bf C.2.4}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed applications.",
}

@Article{Atallah:1994:PAE,
  author =       "Mikhail J. Atallah",
  title =        "Parallel Algorithms for Evaluating Sequences of
                 Set-Manipulation Operations",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "6",
  pages =        "1049--1088",
  month =        nov,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 21:42:13 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/195617.html",
  abstract =     "Given an off-line sequence $S$ of $n$ set-manipulation
                 operations, we investigate the parallel complexity of
                 evaluating $S$ (i.e., finding the response to every
                 operation in $S$ and returning the resulting set). We
                 show that the problem of evaluating $S$ is in {\em
                 NC\/} for various combinations of common
                 set-manipulation operations. Once we establish
                 membership in {\em NC\/} (or, if membership in {\em
                 NC\/} is obvious), we develop techniques for improving
                 the time and/or processor complexity.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency.",
}

@Article{Rabin:1994:RSS,
  author =       "Tal Rabin",
  title =        "Robust Sharing of Secrets when the Dealer is Honest or
                 Cheating",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "6",
  pages =        "1089--1109",
  month =        nov,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 21:42:13 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/195621.html",
  abstract =     "The problem of Verifiable Secret Sharing (VSS) is the
                 following: A dealer, who may be honest or cheating, can
                 share a secret $s$, among $n \geq 2t + 1$ players,
                 where $t$ players at most are cheaters. The sharing
                 process will cause the dealer to commit himself to a
                 secret $s$. If the dealer is honest, then, during the
                 sharing process, the set of dishonest players will have
                 no information about $s$. When the secret is
                 reconstructed, at a later time, all honest players will
                 reconstruct $s$. The solution that is given is a
                 constant round protocol, with polynomial time local
                 computations and polynomial message size. The protocol
                 assumes private communication lines between every two
                 participants, and a broadcast channel. The protocol
                 achieves the desired properties with an exponentially
                 small probability of error.\par

                 A new tool, called {\em Information Checking}, which
                 provides authentication and is not based on any
                 unproven assumptions, is introduced, and may have wide
                 application elsewhere.\par

                 For the case in which it is known that the dealer is
                 honest, a simple constant round protocol is proposed,
                 without assuming broadcast.\par

                 A weak version of secret sharing is defined: Weak
                 Secret Sharing (WSS). WSS has the same properties as
                 VSS for the sharing process. But, during
                 reconstruction, if the dealer is dishonest, then he
                 might obstruct the reconstruction of $s$. A protocol
                 for WSS is also introduced. This protocol has an
                 exponentially small probability of error. WSS is an
                 essential building block for VSS. For certain
                 applications, the much simpler WSS protocol
                 suffice.\par

                 All protocols introduced in this paper are secure in
                 the Information Theoretic sense.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; security; theory; verification",
  subject =      "{\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol verification. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Network
                 problems. {\bf F.2.1}: Theory of Computation, ANALYSIS
                 OF ALGORITHMS AND PROBLEM COMPLEXITY, Numerical
                 Algorithms and Problems.",
}

@Article{Ross:1994:MCS,
  author =       "Keith W. Ross and Danny H. K. Tsang and Jie Wang",
  title =        "{Monte Carlo} Summation and Integration Applied to
                 Multiclass Queuing Networks",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "6",
  pages =        "1110--1135",
  month =        nov,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 21:42:13 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/195630.html",
  abstract =     "Although many closed multiclass queuing networks have
                 a product-form solution, evaluating their performance
                 measures remains nontrivial due to the presence of a
                 normalization constant. We propose the application of
                 Monte Carlo summation in order to determine the
                 normalization constant, throughputs, and gradients of
                 throughputs. A class of importance-sampling functions
                 leads to a decomposition approach, where separate
                 single-class problems are first solved in a setup
                 module, and then the original problem is solved by
                 aggregating the single-class solutions in an execution
                 model. We also consider Monte Carlo methods for
                 evaluating performance measures based on integral
                 representations of the normalization constant; a theory
                 for optimal importance sampling is developed.
                 Computational examples are given that illustrate that
                 the Monte Carlo methods are robust over a wide range of
                 networks and can rapidly solve networks that cannot be
                 handled by the techniques in the existing literature.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance, Modeling and prediction. {\bf D.4.8}:
                 Software, OPERATING SYSTEMS, Performance, Queueing
                 theory. {\bf G.m}: Mathematics of Computing,
                 MISCELLANEOUS, Queueing theory.",
}

@Article{Karp:1994:PRR,
  author =       "Richard M. Karp",
  title =        "Probabilistic Recurrence Relations",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "6",
  pages =        "1136--1150",
  month =        nov,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 21:42:13 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/195632.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics.",
}

@Article{Naughton:1994:HFP,
  author =       "Jeffrey F. Naughton and Raghu Ramakrishnan",
  title =        "How to Forget the Past without Repeating It",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "6",
  pages =        "1151--1177",
  month =        nov,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 21:42:13 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/195634.html",
  abstract =     "Bottom-up evaluation of deductive database programs
                 has the advantage that it avoids repeated computations
                 by storing all intermediate results and replacing
                 recomputation by table lookup. However, in general,
                 storing all intermediate results for the duration of a
                 computation wastes space. In this paper, we propose an
                 evaluation scheme that avoids recomputation, yet for a
                 fairly general class of programs at any given time
                 stores only a small subset of the facts generated. The
                 results constitute a significant first step in
                 compile-time garbage collection for bottom-up
                 evaluation of deductive database programs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; languages; theory",
  subject =      "{\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Query languages. {\bf I.2.4}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Knowledge
                 Representation Formalisms and Methods, Representations
                 (procedural and rule-based). {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving. {\bf H.2.4}: Information Systems,
                 DATABASE MANAGEMENT, Systems.",
}

@Article{Bell:1994:MIP,
  author =       "Colin Bell and Anil Nerode and Raymond T. Ng and V. S.
                 Subrahmanian",
  title =        "Mixed Integer Programming Methods for Computing
                 Nonmonotonic Deductive Databases",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "6",
  pages =        "1178--1215",
  month =        nov,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 21:42:13 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "A preliminary version is available as a University of
                 Maryland TR Nr. CS-TR-2801, Dec 1991.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/195637.html",
  abstract =     "Though the declarative semantics of both explicit and
                 nonmonotonic negation in logic programs has been
                 studied extensively, relatively little work has been
                 done on computation and implementation of these
                 semantics. In this paper, we study three different
                 approaches to computing stable models of logic programs
                 based on mixed integer linear programming methods for
                 automated deduction introduced by R. Jeroslow. We
                 subsequently discuss the relative efficiency of these
                 algorithms. The results of experiments with a prototype
                 compiler implemented by us tend to confirm our
                 theoretical discussion. In contrast to resolution, the
                 mixed integer programming methodology is both fully
                 declarative and handles reuse of old computations
                 gracefully.\par

                 We also introduce, compare, implement, and experiment
                 with linear constraints corresponding to four semantics
                 for ``explicit'' negation in logic programs: the
                 four-valued annotated semantics [Blair and Subrahmanian
                 1989], the Gelfond-Lifschitz semantics [1990], the
                 over-determined models [Grant and Subrahmanian 1989],
                 the Gelfond-Lifschitz semantics [1990], the
                 over-determined models [Grant and Subrahmanian 1990],
                 and the classical logic semantics. Gelfond and
                 Lifschitz[1990] argue for simultaneous use of two modes
                 of negation in logic programs, ``classical'' and
                 ``nonmonotonic,'' so we give algorithms for computing
                 ``answer sets'' for such logic programs too.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming. {\bf G.1.6}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, Optimization, Linear programming.
                 {\bf G.1.6}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Optimization, Integer programming. {\bf
                 H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models.",
}

@Article{Ross:1994:MSM,
  author =       "Kenneth A. Ross",
  title =        "Modular Stratification and Magic Sets for Datalog
                 Programs with Negation",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "6",
  pages =        "1216--1266",
  month =        nov,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 21:42:13 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/195646.html",
  abstract =     "A class of ``modularly stratified'' logic programs is
                 defined. Modular stratification generalizes
                 stratification and local stratification, while allowing
                 programs that are not expressible as stratified
                 programs. For modularly stratified programs, the
                 well-founded semantics coincides with the stable model
                 semantics and makes every ground literal true or false.
                 Modularly stratified programs are weakly stratified,
                 but the converse is false. Unlike some weakly
                 stratified programs, modularly stratified programs can
                 be evaluated in a subgoal-at-a time fashion. An
                 extension of top-down methods with memoing that handles
                 this broader class of programs is presented. A
                 technique for rewriting a modularly stratified program
                 for bottom-up evaluation is demonstrated and extended
                 to include magic-set techniques. The rewritten program,
                 when evaluated bottom-up, gives correct answers
                 according to the well-founded semantics, but much more
                 efficiently than computing the complete well-founded
                 model. A one-to-one correspondence between steps of the
                 extended top-down method and steps during the bottom-up
                 evaluation of the magic-rewritten program is exhibited,
                 demonstrating that the complexity of the two methods is
                 the same. Extensions of modular stratification to other
                 operators such as set-grouping and aggregation, which
                 have traditionally been stratified to prevent semantic
                 difficulties, are discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; languages; theory",
  subject =      "{\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Datalog. {\bf D.3.1}: Software, PROGRAMMING
                 LANGUAGES, Formal Definitions and Theory, Semantics.
                 {\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming. {\bf H.2.4}: Information Systems, DATABASE
                 MANAGEMENT, Systems, Query processing. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Deduction. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Logic programming. {\bf
                 I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Nonmonotonic reasoning and belief revision.",
}

@Article{Afek:1994:RCU,
  author =       "Yehuda Afek and Hagit Attiya and Alan Fekete and
                 Michael Fischer and Nancy Lynch and Yishay Mansour and
                 Dai-Wei Wang and Lenore Zuck",
  title =        "Reliable Communication over Unreliable Channels",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "6",
  pages =        "1267--1297",
  month =        nov,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 21:42:13 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/195651.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; reliability; theory;
                 verification",
  subject =      "{\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol architecture. {\bf B.4.4}: Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Performance
                 Analysis and Design Aids, Verification. {\bf C.2.0}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, General, Data communications. {\bf C.2.2}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Network Protocols, Protocol verification.
                 {\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 C.4}: Computer Systems Organization, PERFORMANCE OF
                 SYSTEMS, Reliability, availability, and
                 serviceability.",
}

@Article{Kearns:1994:LBF,
  author =       "Michael Kearns and Ming Li and Leslie Valiant",
  title =        "Learning {Boolean} Formulas",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "6",
  pages =        "1298--1328",
  month =        nov,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:30:26 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/195656.html",
  abstract =     "Efficient distribution-free learning of Boolean
                 formulas from positive and negative examples is
                 considered. It is shown that classes of formulas that
                 are efficiently learnable from only positive examples
                 or only negative examples have certain closure
                 properties. A new substitution technique is used to
                 show that in the distribution-free case learning DNF
                 (disjunctive normal form formulas) is no harder than
                 learning monotone DNF. We prove that monomials cannot
                 be efficiently learned from negative examples alone,
                 even if the negative examples are uniformly
                 distributed. It is also shown that, if the examples are
                 drawn from uniform distributions, then the class of DNF
                 in which each variable occurs at most once is
                 efficiently {\em weakly learnable\/} (i.e., individual
                 examples are correctly classified with a probability
                 larger than 1/2 + 1/$p$, where $p$ is a polynomial in
                 the relevant parameters of the learning problem). We
                 then show an equivalence between the notion of weak
                 learning and the notion of {\em group learning}, where
                 a group of examples of polynomial size, either all
                 positive or all negative, must be correctly classified
                 with high probability.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Induction. {\bf F.4.1}: Theory
                 of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic.",
}

@Article{Motwani:1994:ACA,
  author =       "Rajeev Motwani",
  title =        "Average-Case Analysis of Algorithms for Matching and
                 Related Problems",
  journal =      j-J-ACM,
  volume =       "41",
  number =       "6",
  pages =        "1329--1356",
  month =        nov,
  year =         "1994",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 21:42:13 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/195663.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.2.2}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Graph algorithms. {\bf G.3}: Mathematics
                 of Computing, PROBABILITY AND STATISTICS, Probabilistic
                 algorithms (including Monte Carlo).",
}

@Article{Eiter:1995:CLB,
  author =       "Thomas Eiter and Georg Gottlob",
  title =        "The Complexity of Logic-Based Abduction",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "1",
  pages =        "3--42",
  month =        jan,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 15 21:04:34 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/200838.html",
  abstract =     "Abduction is an important form of nonmonotonic
                 reasoning allowing one to find explanations for certain
                 symptoms or manifestations. When the application domain
                 is described by a logical theory, we speak about {\em
                 logic-based abduction}. Candidates for abductive
                 explanations are usually subjected to minimality
                 criteria such as subset-minimality, minimal
                 cardinality, minimal weight, or minimality under
                 prioritization of individual hypotheses. This paper
                 presents a comprehensive complexity analysis of
                 relevant decision and search problems related to
                 abduction on propositional theories. Our results
                 indicate that abduction is harder than deduction. In
                 particular, we show that with the most basic forms of
                 abduction the relevant decision problems are complete
                 for complexity classes at the second level of the
                 polynomial hierarchy, while the use of prioritization
                 raises the complexity to the third level in certain
                 cases.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving. {\bf
                 I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods. {\bf F.2.2}: Theory of Computation, ANALYSIS
                 OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic.",
}

@Article{Nebel:1995:RAT,
  author =       "Bernhard Nebel and Hans-J{\"{u}}rgen B{\"{u}}rckert",
  title =        "Reasoning About Temporal Relations: a Maximal
                 Tractable Subclass of {Allen}'s Interval Algebra",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "1",
  pages =        "43--66",
  month =        jan,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 07:55:40 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/200848.html",
  abstract =     "We introduce a new subclass of Allen's interval
                 algebra we call ``ORD-Horn subclass,'' which is a
                 strict superset of the ``pointisable subclass.'' We
                 prove that reasoning in the ORD-Horn subclass is a
                 polynomial-time problem and show that the
                 path-consistency method is sufficient for deciding
                 satisfiability. Further, using an extensive
                 machine-generated case analysis, we show that the
                 ORD-Horn subclass is a maximal tractable subclass of
                 the full algebra (assuming P $\ne$ NP). In fact, it is
                 the unique greatest tractable subclass amongst the
                 subclasses that contain all basic relations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods, Relation systems. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sequencing and scheduling. {\bf I.2.4}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Knowledge
                 Representation Formalisms and Methods, Representations
                 (procedural and rule-based). {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic.",
}

@Article{Callahan:1995:DMP,
  author =       "Paul B. Callahan and S. Rao Kosaraju",
  title =        "A Decomposition of Multidimensional Point Sets with
                 Applications to $k$-Nearest-Neighbors and $n$-Body
                 Potential Fields",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "1",
  pages =        "67--90",
  month =        jan,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 15 21:04:34 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/200853.html",
  abstract =     "We define the notion of a {\em well-separated pair
                 decomposition\/} of points in $d$-dimensional space. We
                 then develop efficient sequential and parallel
                 algorithms for computing such a decomposition. We apply
                 the resulting decomposition to the efficient
                 computation of $k$-nearest neighbors and $n$-body
                 potential fields.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency. {\bf G.1.0}: Mathematics
                 of Computing, NUMERICAL ANALYSIS, General, Parallel
                 algorithms.",
}

@Article{Chien:1995:PAR,
  author =       "Andrew A. Chien and Jae H. Kim",
  title =        "Planar-Adaptive Routing: {Low-Cost} Adaptive Networks
                 for Multiprocessors",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "1",
  pages =        "91--123",
  month =        jan,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 15 21:04:34 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/200856.html",
  abstract =     "Network throughput can be increased by allowing
                 multipath, adaptive routing. Adaptive routing allows
                 more freedom in the paths taken by messages, spreading
                 load over physical channels more evenly. The
                 flexibility of adaptive routing introduces new
                 possibilities of deadlock. Previous deadlock avoidance
                 schemes in $k$-ary $n$-cubes require an exponential
                 number of virtual channels. We describe a family of
                 deadlock-free routing algorithms, called {\em
                 planar-adaptive routing\/} algorithms, that require
                 only a constant number of virtual channels, independent
                 of networks size and dimension. Planar-adaptive routing
                 algorithms reduce the complexity of deadlock prevention
                 by reducing the number of choices at each routing step.
                 In the fault-free case, planar-adaptive networks are
                 guaranteed to be deadlock-free. In the presence of
                 network faults, the planar-adaptive router can be
                 extended with misrouting to produce a working network
                 which remains provably deadlock free and is provably
                 livelock free. In addition, planar-adaptive networks
                 can simultaneously support both in-order and adaptive,
                 out-of-order packet delivery.\par

                 Planar-adaptive routing is of practical significance.
                 It provides the simplest known support for
                 deadlock-free adaptive routing in $k$-ary $n$-cubes of
                 more than two dimensions (with $k>2$). Restricting
                 adaptivity reduces the hardware complexity, improving
                 router speed or allowing additional
                 performance-enhancing network features. The structure
                 of planar-adaptive routers is amenable to efficient
                 implementation.\par

                 Simulation studies show that planar-adaptive routers
                 can increase the robustness of network throughput for
                 nonuniform communication patterns. Planar-adaptive
                 routers outperform deterministic routers with equal
                 hardware resources. Further, adding virtual lanes to
                 planar-adaptive routers increases this advantage.
                 Comparisons with fully adaptive routers show that
                 planar-adaptive routers, limited adaptive routers, can
                 give superior performance. These results indicate the
                 best way to allocate router resources to combine
                 adaptivity and virtual lanes.\par

                 Planar-adaptive routers are a special case of limited
                 adaptivity routers. We define a class of adaptive
                 routers with $f$ degrees of routing freedom. This
                 class, termed {\em $f$-flat adaptive routers}, allows a
                 direct cost-performance tradeoff between implementation
                 cost (speed and silicon area) and routing freedom
                 (channel utilization). For a network of a particular
                 dimension, the cost of adaptivity grows linearly with
                 the routing freedom. However, the rate of growth is a
                 much larger constant for high-dimensional networks. All
                 of the properties proven for planar-adaptive routers,
                 such as deadlock and livelock freedom, also apply to
                 $f$-flat adaptive routers.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; reliability",
  subject =      "{\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network topology. {\bf B.4.3}: Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Interconnections
                 (subsystems). {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Routing and
                 layout. {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf C.1.2}: Computer Systems Organization,
                 PROCESSOR ARCHITECTURES, Multiple Data Stream
                 Architectures (Multiprocessors), Interconnection
                 architectures. {\bf C.2.1}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Architecture and Design, Packet networks. {\bf B.4.5}:
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Reliability, Testing, and Fault-Tolerance, Hardware
                 reliability.",
}

@Article{Attiya:1995:SMR,
  author =       "Hagit Attiya and Amotz Bar-Noy and Danny Dolev",
  title =        "Sharing Memory Robustly in Message-Passing Systems",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "1",
  pages =        "124--142",
  month =        jan,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 15 21:04:34 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/200869.html",
  abstract =     "Emulators that translate algorithms from the
                 shared-memory model to two different message-passing
                 models are presented. Both are achieved by implementing
                 a wait-free, atomic, single-writer multi-reader
                 register in unreliable, asynchronous networks. The two
                 message-passing models considered are a complete
                 network with processor failures and an arbitrary
                 network with dynamic link failures.\par

                 These results make it possible to view the
                 shared-memory model as a higher-level language for
                 designing algorithms in asynchronous distributed
                 systems. Any wait-free algorithm based on atomic,
                 single-writer multi-reader registers can be
                 automatically emulated in message-passing systems,
                 provided that at least a majority of the processors are
                 not faulty and remain connected. The overhead
                 introduced by these emulations is polynomial in the
                 number of processors in the system.\par

                 Immediate new results are obtained by applying the
                 emulators to known shared-memory algorithms. These
                 include, among others, protocols to solve the following
                 problems in the message-passing model in the presence
                 of processor or link failures: multi-writer
                 multi-reader registers, concurrent time-stamp systems,
                 $l$-exclusion, atomic snapshots, randomized consensus,
                 and implementation of data structures.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; reliability; theory",
  subject =      "{\bf D.4.4}: Software, OPERATING SYSTEMS,
                 Communications Management, Message sending. {\bf
                 C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf C.2.4}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems. {\bf D.4.1}: Software, OPERATING
                 SYSTEMS, Process Management, Concurrency. {\bf D.4.1}:
                 Software, OPERATING SYSTEMS, Process Management,
                 Multiprocessing/multiprogramming. {\bf D.4.1}:
                 Software, OPERATING SYSTEMS, Process Management,
                 Synchronization. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Relations among models.",
}

@Article{Dolev:1995:DFT,
  author =       "Danny Dolev and Joseph Y. Halpern and Barbara Simons
                 and Ray Strong",
  title =        "Dynamic Fault-Tolerant Clock Synchronization",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "1",
  pages =        "143--185",
  month =        jan,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 15 21:04:34 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/200870.html",
  abstract =     "This paper gives two simple efficient distributed
                 algorithms: one for keeping clocks in a network
                 synchronized and one for allowing new processors to
                 join the network with their clocks synchronized.
                 Assuming a fault-tolerant authentication protocol, the
                 algorithms tolerate both link and processor failures of
                 any type. The algorithm for maintaining synchronization
                 works for arbitrary networks (rather than just
                 completely connected networks) and tolerates any number
                 of processor or communication link faults as long as
                 the correct processors remain connected by fault-free
                 paths. It thus represents an improvement over other
                 clock synchronization algorithms such as those of
                 Lamport and Melliar Smith and Welch and Lynch,
                 although, unlike them, it does require an
                 authentication protocol to handle Byzantine faults. Our
                 algorithm for allowing new processors to join requires
                 that more than half the processors be correct, a
                 requirement that is provably necessary.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; reliability; theory",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Synchronization. {\bf C.2.4}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed applications. {\bf
                 C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed databases. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Network operating systems. {\bf
                 C.4}: Computer Systems Organization, PERFORMANCE OF
                 SYSTEMS, Reliability, availability, and serviceability.
                 {\bf D.4.5}: Software, OPERATING SYSTEMS, Reliability,
                 Fault-tolerance.",
}

@Article{Haldar:1995:CWM,
  author =       "S. Haldar and K. Vidyasankar",
  title =        "Constructing $1$-Writer Multiread Multivalued Atomic
                 Variables from Regular Variables",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "1",
  pages =        "186--203",
  month =        jan,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:22:18 2001",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/200871.html",
  abstract =     "A simple wait-free construction of 1-writer
                 multireader multivalued atomic variable from
                 multireader regular variables is presented in this
                 paper. A key point of the construction is the use of an
                 elegant forwarding technique to overcome the new-old
                 inversion property inherent in regular
                 variables.\par

                 Another construction, using a different forwarding
                 technique, is also given. This technique is a
                 refinement of one proposed in the
                 literature.\par

                 Formal correctness proofs for both the constructions
                 are short and easy to follow.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory; verification",
  subject =      "{\bf B.3.2}: Hardware, MEMORY STRUCTURES, Design
                 Styles, Shared memory. {\bf B.4.3}: Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Interconnections
                 (subsystems), Asynchronous/synchronous operation. {\bf
                 D.1.3}: Software, PROGRAMMING TECHNIQUES, Concurrent
                 Programming. {\bf D.4.1}: Software, OPERATING SYSTEMS,
                 Process Management, Concurrency. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management,
                 Multiprocessing/multiprogramming. {\bf D.4.4}:
                 Software, OPERATING SYSTEMS, Communications Management,
                 Buffering.",
}

@Article{Chang:1995:BSE,
  author =       "C. S. Chang and R. Nelson",
  title =        "Bounds on the Speedup and Efficiency of Partial
                 Synchronization in Parallel Processing Systems",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "1",
  pages =        "204--231",
  month =        jan,
  year =         "1995",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/200836.200872",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 15 21:04:34 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/200872.html",
  abstract =     "In this paper, we derive bounds on the speedup and
                 efficiency of applications that schedule tasks on a set
                 of parallel processors. We assume that the application
                 runs an algorithm that consists of $N$ iterations and
                 before starting its $i$+1st iteration, a processor must
                 wait for data (i.e., synchronize) calculated in the
                 $i$th iteration by a subset of the other processors of
                 the system. Processing times and interconnections
                 between iterations are modeled by random variables with
                 possibly deterministic distributions. Scientific
                 applications consisting of iterations of recursive
                 equations are examples of such applications that can be
                 modeled within this formulation. We consider the
                 efficiency of applications and show that, although
                 efficiency decreases with an increase in the number of
                 processors, it has a nonzero limit when the number of
                 processors increases to infinity. We obtain a lower
                 bound for the efficiency by solving an equation that
                 depends on the distribution of task service times and
                 the expected number of tasks needed to be synchronized.
                 We also show that the lower bound is approached if the
                 topology of the processor graph is ``spread-out,'' a
                 notion we define in the paper.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Performance attributes. {\bf C.1.2}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors),
                 Parallel processors.",
}

@Article{Bloom:1995:BCT,
  author =       "Bard Bloom and Sorin Istrail and Albert R. Meyer",
  title =        "Bisimulation Can't Be Traced",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "1",
  pages =        "232--268",
  month =        jan,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 15 21:04:34 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/200876.html",
  abstract =     "In the concurrent language CCS, two programs are
                 considered the same if they are {\em bisimilar}.
                 Several years and many researchers have demonstrated
                 that the theory of bisimulation is mathematically
                 appealing and useful in practice. However, bisimulation
                 makes too many distinctions between programs. We
                 consider the problem of adding operations to CCS to
                 make bisimulation fully abstract. We define the class
                 of GSOS operations, generalizing the style and
                 technical advantages of CCS operations. We characterize
                 GSOS congruence in as a bisimulation-like relation
                 called {\em ready-simulation}. Bisimulation is strictly
                 finer than ready simulation, and hence not a congruence
                 for any GSOS language.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; languages; theory",
  subject =      "{\bf F.3.3}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Studies of Program Constructs.
                 {\bf D.1.3}: Software, PROGRAMMING TECHNIQUES,
                 Concurrent Programming. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features, Concurrent programming structures. {\bf
                 F.3.2}: Theory of Computation, LOGICS AND MEANINGS OF
                 PROGRAMS, Semantics of Programming Languages,
                 Operational semantics. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Trees.
                 {\bf D.2.1}: Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications, CCS.",
}

@Article{Blum:1995:DPC,
  author =       "Manuel Blum and Sampath Kannan",
  title =        "Designing Programs that Check Their Work",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "1",
  pages =        "269--291",
  month =        jan,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 15 21:04:34 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/200880.html",
  abstract =     "A {\em program correctness checker\/} is an algorithm
                 for checking the output of a computation. That is,
                 given a program and an instance on which the program is
                 run, the checker certifies whether the output of the
                 program on that instance is correct. This paper defines
                 the concept of a program checker. It designs program
                 checkers for a few specific and carefully chosen
                 problems in the class FP of functions computable in
                 polynomial time. Problems in FP for which checkers are
                 presented in this paper include Sorting, Matrix Rank
                 and GCD. It also applies methods of modern
                 cryptography, especially the idea of a probabilistic
                 interactive proof, to the design of program checkers
                 for group theoretic computations.\par

                 Two structural theorems are proven here. One is a
                 characterization of problems that can be checked. The
                 other theorem establishes equivalence classes of
                 problems such that whenever one problem in a class is
                 checkable, all problems in the class are checkable.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; reliability; theory;
                 verification",
  subject =      "{\bf D.2.4}: Software, SOFTWARE ENGINEERING, Program
                 Verification, Correctness proofs. {\bf D.2.4}:
                 Software, SOFTWARE ENGINEERING, Program Verification,
                 Reliability. {\bf F.2.0}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY, General.
                 {\bf F.3.1}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Specifying and Verifying and Reasoning
                 about Programs. {\bf G.3}: Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Probabilistic algorithms
                 (including Monte Carlo).",
}

@Article{Lin:1995:PCT,
  author =       "Fangzhen Lin and Yoav Shoham",
  title =        "Provably Correct Theories of Action",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "2",
  pages =        "293--320",
  month =        mar,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 30 20:17:10 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/201021.html",
  abstract =     "We investigate logical formalization of the effects of
                 actions in the situation calculus. We propose a formal
                 criterion against which to evaluate theories of
                 deterministic actions. We show how the criterion
                 provides us a formal foundation upon which to tackle
                 the frame problem, as well as its variant in the
                 context of concurrent actions. Our main technical
                 contributions are in formulating a wide class of
                 monotonic causal theories that satisfy the criterion,
                 and showing that each such theory can be reformulated
                 succinctly in circumscription.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "humanfactors; theory",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem
                 Proving.",
}

@Article{Karger:1995:RLT,
  author =       "David R. Karger and Philip N. Klein and Robert E.
                 Tarjan",
  title =        "A Randomized Linear-Time Algorithm to Find Minimum
                 Spanning Trees",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "2",
  pages =        "321--328",
  month =        mar,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 30 20:17:10 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/201022.html",
  abstract =     "We present a randomized linear-time algorithm to find
                 a minimum spanning tree in a connected graph with edge
                 weights. The algorithm uses random sampling in
                 combination with a recently discovered linear-time
                 algorithm for verifying a minimum spanning tree. Our
                 computational model is a unit-cost random-access
                 machine with the restriction that the only operations
                 allowed on edge weights are binary comparisons.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf I.5.3}: Computing Methodologies, PATTERN
                 RECOGNITION, Clustering. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Network
                 problems. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Trees.",
}

@Article{Wang:1995:DMR,
  author =       "Ke Wang and Weining Zhang and Siu-Cheung Chau",
  title =        "Decomposition of Magic Rewriting",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "2",
  pages =        "329--381",
  month =        mar,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 30 20:17:10 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/201027.html",
  abstract =     "The magic rewriting focuses on relevant data but
                 suffers from additional rules, predicates, and tuples
                 that are generated in search for the relevant data.
                 Reducing the arity of predicates can cut down the
                 number of such rules, predicates, and tuples by an
                 exponential factor. In this paper, we consider a
                 subclass of linear single-IDB programs and show that
                 the magic rewriting can be decomposed in such a way
                 that it is applied to only programs having smaller
                 arities and fewer recursive rules, without losing the
                 binding capacity. The decomposed rewriting is shown to
                 be much more efficient than the standard one and
                 amenable to distributed and parallel environments. The
                 considered subclass significantly generalizes
                 recursions previously proposed for efficient
                 implementation. The decomposed rewriting and the
                 standard generalized magic rewriting are extended to
                 multi-binding queries in such a way that data relevant
                 to one binding is not necessarily considered as
                 relevant to other bindings. The work in this paper
                 shows the use of tuple ID as an important technique in
                 optimizing logic programs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming. {\bf H.2.4}: Information Systems, DATABASE
                 MANAGEMENT, Systems, Query processing. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Deduction. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Logic programming. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Recursive
                 function theory.",
}

@Article{Tsitsiklis:1995:ACC,
  author =       "John N. Tsitsiklis and George D. Stamoulis",
  title =        "On the Average Communication Complexity of
                 Asynchronous Distributed Algorithms",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "2",
  pages =        "382--400",
  month =        mar,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 30 20:17:10 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/201029.html",
  abstract =     "We study the communication complexity of asynchronous
                 distributed algorithms. Such algorithms can generate
                 excessively many messages in the worst case.
                 Nevertheless, we show that, under certain probabilistic
                 assumptions, the expected number of messages generated
                 per time unit is bounded by a polynomial function of
                 the number of processors under a very general model of
                 distributed computation. Furthermore, for
                 constant-degree processor graphs, the expected number
                 of generated messages is only $O(nT)$, where $n$ is the
                 number of processors and $T$ is the running time. We
                 conclude that (under our model) any asynchronous
                 algorithm with good time complexity will also have good
                 communication complexity, on the average.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems. {\bf C.2.1}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Architecture and Design, Network communications. {\bf
                 G.m}: Mathematics of Computing, MISCELLANEOUS, Queueing
                 theory. {\bf F.1.2}: Theory of Computation, COMPUTATION
                 BY ABSTRACT DEVICES, Modes of Computation, Parallelism
                 and concurrency.",
}

@Article{Kurtz:1995:ICF,
  author =       "Stuart A. Kurtz and Stephen R. Mahaney and James S.
                 Royer",
  title =        "The Isomorphism Conjecture Fails Relative to a Random
                 Oracle",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "2",
  pages =        "401--420",
  month =        mar,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 30 20:17:10 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/201030.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Relativized
                 computation. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes.",
}

@Article{Gottlob:1995:NTC,
  author =       "Georg Gottlob",
  title =        "{NP} Trees and {Carnap}'s Modal Logic",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "2",
  pages =        "421--457",
  month =        mar,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 30 20:17:10 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/201031.html",
  abstract =     "In this paper we consider problems and complexity
                 classes definable by interdependent queries to an
                 oracle in NP. How the queries depend on each other is
                 specified by a directed graph $G$. We first study the
                 class of problems where $G$ is a general dag and show
                 that this class coincides with $D^{p}_{2}$.\par

                 We then consider the class where $G$ is a tree. Our
                 main result states that this class is identical to
                 $P^{\mbox{NP}}[O(\log n)]$, the class of problems
                 solvable in polynomial time with a logarithmic number
                 of queries to an oracle in NP. This result has
                 interesting applications in the fields of modal logic
                 and artificial intelligence. In particular, we show
                 that the following problems are all
                 $P^{\mbox{NP}}[O(\log n)]$ complete: validity-checking
                 of formulas in Carnap's modal logic, checking whether a
                 formula is almost surely valid over finite structures
                 in modal logics $K$, $T$, and $S4$ (a problem recently
                 considered by Halpern and Kapron [1992]), and checking
                 whether a formula belongs to the stable set of beliefs
                 generated by a propositional theory.\par

                 We generalize the case of dags to the case where $G$ is
                 a general (possibly cyclic) directed graph of NP-oracle
                 queries and show that this class corresponds to $
                 P^{p}_{2}$. We show that such graphs are easily
                 expressible in autoepistemic logic. Finally, we
                 generalize our complexity results to higher classes of
                 the polynomial-time hierarchy.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Relations among
                 complexity classes. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Complexity of
                 proof procedures. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Computations on
                 discrete structures. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Computational logic. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Nonmonotonic reasoning
                 and belief revision. {\bf I.2.4}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Knowledge
                 Representation Formalisms and Methods.",
}

@Article{DeNicola:1995:TLB,
  author =       "Rocco {De Nicola} and Frits Vaandrager",
  title =        "Three logics for branching bisimulation",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "2",
  pages =        "458--487",
  month =        mar,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Aug 31 18:04:33 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/201032.html",
  abstract =     "Three temporal logics are introduced that induce on
                 labeled transition systems the same identifications as
                 branching bisimulation, a behavioral equivalence that
                 aims at ignoring invisible transitions while preserving
                 the branching structure of systems. The first logic is
                 an extension of Hennessy--Milner Logic with an
                 ``until'' operator. The second one is another extension
                 of Hennessy--Milner Logic, which exploits the power of
                 backward modalities. The third logic is CTL* without
                 the next-time operator. A relevant side-effect of the
                 last characterization is that it sets a bridge between
                 the state- and action-based approaches to the semantics
                 of concurrent systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory; verification",
  subject =      "{\bf F.3.1}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Logics of programs. {\bf
                 F.1.1}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic. {\bf F.3.2}: Theory of Computation,
                 LOGICS AND MEANINGS OF PROGRAMS, Semantics of
                 Programming Languages, Operational semantics.",
}

@Article{Clarkson:1995:VAL,
  author =       "Kenneth L. Clarkson",
  title =        "{Las Vegas} Algorithms for Linear and Integer
                 Programming When the Dimension is Small",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "2",
  pages =        "488--499",
  month =        mar,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 09:19:33 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/201036.html",
  abstract =     "This paper gives an algorithm for solving linear
                 programming problems. For a problem with $n$
                 constraints and $d$ variables, the algorithm requires
                 an expected $O(d^{2}n)+(\log
                 n)O(d)^{d/2+O(1)}+O(d^{4}\sqrt{n}\log n)$ arithmetic
                 operations, as $n \rightarrow \infty$. The constant
                 factors do not depend on $d$. Also, an algorithm is
                 given for integer linear programming. Let $4$ bound the
                 number of bits required to specify the rational numbers
                 defining an input constraint or the objective function
                 vector. Let $n$ and $d$ be as before. Then, the
                 algorithm requires expected $O(2^{d}dn+8^{d}d
                 \sqrt{n\log n} \log n) + d^{O(d)}\phi \ln n$ operations
                 on numbers with $d^{O(1)}\phi$ bits, as $n \rightarrow
                 \infty$, where the constant factors do not depend on
                 $d$ or $4$ to other convex programming problems. For
                 example, an algorithm for finding the smallest sphere
                 enclosing a set of $n$ points in $E^{d}$ has the same
                 time bound.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf G.1.6}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Optimization, Linear programming. {\bf
                 G.1.6}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization, Integer programming.",
}

@Article{Berger:1995:NOA,
  author =       "Bonnie Berger and Martin Brady and Donna Brown and Tom
                 Leighton",
  title =        "Nearly Optimal Algorithms and Bounds for Multilayer
                 Channel Routing",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "2",
  pages =        "500--542",
  month =        mar,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 30 20:17:10 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/201037.html",
  abstract =     "This paper presents algorithms for routing channels
                 with $L \geq 2$ layers. For the unit vertical overlap
                 model, we describe a two-layer channel routing
                 algorithm that uses at most $d + O(d)$ tracks to route
                 two-terminal net problems and $2d + o(d)$ tracks to
                 route multiterminal nets. We also show that $d + W(\log
                 d)$ tracks are required to route two-terminal net
                 problems in the worst case even if arbitrary vertical
                 overlap is allowed. We generalize the algorithm to
                 unrestricted multilayer routing and use only $d/(L - 1)
                 + O(d / L + 1) $tracks for two-terminal net problems
                 (within $O(d/L+ 1)$ tracks of optimal) and $d/(L - 2) +
                 O(d / L + 1)$ tracks for multiterminal net problems
                 (within a factor of $(L - 1) / (L - 2)$ times optimal).
                 We demonstrate the generality of our routing strategy
                 by showing that it can be used to duplicate some of the
                 best previous upper bounds for other models (two-layer
                 Manhattan routing and two and three-layer knock-knee
                 routing of two-terminal, two-sided nets), and gives a
                 new upper bound for routing with 45-degree diagonal
                 wires.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Routing and layout. {\bf
                 B.7.2}: Hardware, INTEGRATED CIRCUITS, Design Aids,
                 Placement and routing. {\bf B.4.2}: Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Input/Output
                 Devices, Channels and controllers.",
}

@Article{vanBeek:1995:MGC,
  author =       "Peter {van Beek} and Rina Dechter",
  title =        "On the minimality and global consistency of row-convex
                 constraint networks",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "3",
  pages =        "543--561",
  month =        may,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:25:04 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210347.html",
  abstract =     "Constraint networks have been shown to be useful in
                 formulating such diverse problems as scene labeling,
                 natural language parsing, and temporal reasoning. Given
                 a constraint network, we often wish to (i) find a
                 solution that satisfies the constraints and (ii) find
                 the corresponding minimal network where the constraints
                 are as explicit as possible. Both tasks are known to be
                 NP-complete in the general case. Task (1) is usually
                 solved using a backtracking algorithm, and task (ii) is
                 often solved only approximately by enforcing various
                 levels of local consistency. In this paper, we identify
                 a property of binary constraint called {\em row
                 convexity\/} and show its usefulness in deciding when a
                 form of local consistency called path consistency is
                 sufficient to guarantee that a network is both minimal
                 and globally consistent. Globally consistent networks
                 have the property that a solution can be found without
                 backtracking. We show that one can test for the row
                 convexity property efficiently and we show, by
                 examining applications of constraint networks discussed
                 in the literature, that our results are useful in
                 practice. Thus, we identify a class of binary
                 constraint networks for which we can solve both tasks
                 (i) and (ii) efficiently. Finally, we generalize the
                 results for binary constraint networks to networks with
                 nonbinary constraints.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory. {\bf I.2.4}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Knowledge Representation Formalisms and Methods,
                 Relation systems.",
}

@Article{Compton:1995:EDT,
  author =       "Kevin J. Compton and Chinya Ravishankar",
  title =        "Expected Deadlock Time in a Multiprocessing System",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "3",
  pages =        "562--583",
  month =        may,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 05 20:48:59 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210412.html",
  abstract =     "We consider multiprocessing systems where processes
                 make independent, Poisson distributed resource requests
                 with mean arrival time 1. We assume that resources are
                 not released. It is shown that the expected deadlock
                 time is never less than 1, no matter how many processes
                 and resources are in the system. Also, the expected
                 number of processes blocked by deadlock time is
                 one-half more than half the number of initially active
                 processes. We obtain expressions for system statistics
                 such as expected deadlock time, expected total
                 processing time, and system efficiency, in terms of
                 Abel sums. We derive asymptotic expressions for these
                 statistics in the case of systems with many processes
                 and the case of systems with a fixed number of
                 processes. In the latter, generalizations of the
                 Ramanujan $Q$-function arise. we use singularity
                 analysis to obtain asymptotics of coefficients of
                 generalized $Q$-functions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "performance; theory",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Deadlocks. {\bf D.4.1}: Software, OPERATING
                 SYSTEMS, Process Management,
                 Multiprocessing/multiprogramming. {\bf F.2.2}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Generating functions. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Path and circuit problems.",
}

@Article{Korilis:1995:EEN,
  author =       "Yannis A. Korilis and Aurel A. Lazar",
  title =        "On the Existence of Equilibria in Noncooperative
                 Optimal Flow Control",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "3",
  pages =        "584--613",
  month =        may,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 05 20:48:59 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210415.html",
  abstract =     "The existence of Nash equilibria in noncooperative
                 flow control in a general product-form network shared
                 by $K$ users is investigated. The performance objective
                 of each user is to maximize its average throughput
                 subject to an upper bound on its average time-delay.
                 Previous attempts to study existence of equilibria for
                 this flow control model were not successful, partly
                 because the time-delay constraints couple the strategy
                 spaces of the individual users in a way that does not
                 allow the application of standard equilibrium existence
                 theorems from the game theory literature. To overcome
                 this difficulty, a more general approach to study the
                 existence of Nash equilibria for decentralized control
                 schemes is introduced. This approach is based on
                 directly proving the existence of a fixed point of the
                 best reply correspondence of the underlying game. For
                 the investigated flow control model, the best reply
                 correspondence is shown to be a function, implicitly
                 defined by means of $K$ interdependent linear programs.
                 Employing an appropriate definition for continuity of
                 the set of optimal solutions of parameterized linear
                 programs, it is shown that, under appropriate
                 conditions, the best reply function is continuous.
                 Brouwer's theorem implies, then, that the best reply
                 function has a fixed point.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "performance; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 G.1.6}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization, Constrained optimization. {\bf G.1.6}:
                 Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization, Linear programming. {\bf G.m}:
                 Mathematics of Computing, MISCELLANEOUS, Queueing
                 theory.",
}

@Article{Bay:1995:DLR,
  author =       "Paul Bay and Gianfranco Bilardi",
  title =        "Deterministic On-Line Routing on Area-Universal
                 Networks",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "3",
  pages =        "614--640",
  month =        may,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 05 20:48:59 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210417.html",
  abstract =     "Two deterministic routing networks are presented: the
                 {\em pruned butterfly\/} and the {\em sorting
                 fat-tree}. Both networks are area-universal, that is,
                 they can simulate any other routing network fitting in
                 similar area with polylogarithmic slowdown. Previous
                 area-universal networks were either for the off-line
                 problem, where the message set to be routed is known in
                 advance and substantial precomputation is permitted, or
                 involved randomization, yielding results that hold only
                 with high probability. The two networks introduced here
                 are the first that are simultaneously deterministic and
                 on-line, and they use two substantially different
                 routing techniques. The performance of their routing
                 algorithms depends on the difficulty of the problem
                 instance, which is measured by a quantity $\lambda$
                 known as the load factor. The pruned butterfly runs in
                 time $O(\lambda \log^{2}N)$, is the number of possible
                 sources and destinations for messages and $\lambda$ is
                 assumed to be polynomial in $N$. The sorting fat-tree
                 algorithm runs in $O(\lambda \log N + \log^{2 N})$ time
                 for a restricted class of message sets including
                 partial permutations. Other results of this work
                 include a ``flexible'' circuit that is area-time
                 optimal across a range of different input sizes and an
                 area-time lower bound for routers based on wire-length
                 arguments.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network topology. {\bf C.1.2}: Computer
                 Systems Organization, PROCESSOR ARCHITECTURES, Multiple
                 Data Stream Architectures (Multiprocessors),
                 Interconnection architectures. {\bf C.2.1}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Network Architecture and Design, Network
                 communications. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Routing and layout. {\bf F.2.3}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Tradeoffs among Complexity Measures.",
}

@Article{Birman:1995:OSP,
  author =       "Alexander Birman and H. Richard Gail and Sidney L.
                 Hantler and Zvi Rosberg and Moshe Sidi",
  title =        "An Optimal Service Policy for Buffer Systems",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "3",
  pages =        "641--657",
  month =        may,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:08:17 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210422.html",
  abstract =     "Consider a switching component in a packet-switching
                 network, where messages from several incoming channels
                 arrive and are routed to appropriate outgoing ports
                 according to a service policy. One requirement in the
                 design of such a system is to determine the buffer
                 storage necessary at the input of each channel and the
                 policy for serving these buffers that will prevent
                 buffer overflow and the corresponding loss of messages.
                 In this paper, a class of buffer service policies,
                 called Least Time to Reach Bound (LTRB), is introduced
                 that guarantees no overflow, and for which the buffer
                 size required at each input channel is independent of
                 the number of channels and their relative speeds.
                 Further, the storage requirement is only twice the
                 maximal length of a message in all cases, and as a
                 consequence the class is shown to be {\em optimal\/} in
                 the sense that any nonoverflowing policy requires at
                 least as much storage as LTRB.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; performance",
  subject =      "{\bf D.4.4}: Software, OPERATING SYSTEMS,
                 Communications Management, Buffering. {\bf C.2.1}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Network Architecture and Design, Packet
                 networks. {\bf C.4}: Computer Systems Organization,
                 PERFORMANCE OF SYSTEMS, Performance attributes. {\bf
                 D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory.",
}

@Article{OHearn:1995:PLV,
  author =       "P. W. O'Hearn and R. D. Tennent",
  title =        "Parametricity and Local Variables",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "3",
  pages =        "658--709",
  month =        may,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 05 20:48:59 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210425.html",
  abstract =     "We propose that the phenomenon of local state may be
                 understood in terms of Strachey's concept of parametric
                 (i.e., uniform) polymorphism. The intuitive basis for
                 our proposal is the following analogy: a non-local
                 procedure is independent of locally-declared variables
                 in the same way that a parametrically polymorphic
                 function is independent of types to which it is
                 instantiated.\par

                 A connection between parametricity and representational
                 abstraction was first suggested by J. C. Reynolds.
                 Reynolds used logical relations to formalize this
                 connection in languages with type variables and
                 user-defined types. We use relational parametricity to
                 construct a model for an Algol-like language in which
                 interactions between local and non-local entities
                 satisfy certain relational criteria. Reasoning about
                 local variables essentially involved proving properties
                 of polymorphic functions. The new model supports
                 straightforward validations of all the test
                 equivalences that have been proposed in the literature
                 for local-variable semantics, and encompasses standard
                 methods of reasoning about data representations. It is
                 not known whether our techniques yield fully abstract
                 semantics. A model based on partial equivalence
                 relations on the natural numbers is also briefly
                 examined.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf D.3.1}: Software, PROGRAMMING LANGUAGES, Formal
                 Definitions and Theory, Semantics. {\bf F.3.2}: Theory
                 of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Semantics of Programming Languages, Denotational
                 semantics.",
}

@Article{Gottlob:1995:TDL,
  author =       "Georg Gottlob",
  title =        "Translating Default Logic into Standard Autoepistemic
                 Logic",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "4",
  pages =        "711--740",
  month =        jul,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 28 07:53:44 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210334.html",
  abstract =     "Since Konolige's translation of default logic into
                 strongly grounded autoepistemic logic, several other
                 variants of Moore's original autoepistemic logic that
                 embody default logic have been studied. All these
                 logics differ significantly from Moore's autoepistemic
                 logic (standard AEL) in that expansions are subject to
                 additional groundedness-conditions. Hence, the question
                 naturally arises whether default logic can be
                 translated into standard AEL at all. We show that a
                 modular translation is not possible. However, we are
                 able to construct a faithful polynomial-time
                 translation from default logic into standard AEL, which
                 is nonmodular. Our translation exploits the
                 self-referentiality of AEL. It uses as an important
                 intermediate step an embedding of Marek's and
                 Truszczy{\'n}ski's nonmonotonic logic {\bf N} into
                 standard AEL. It follows from our results that the
                 expressive power of standard AEL is strictly greater
                 than that of default logic.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Nonmonotonic reasoning and belief revision. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Computational
                 logic. {\bf I.2.0}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, General, Philosophical foundations. {\bf
                 I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods, Representation languages.",
}

@Article{Kifer:1995:LFO,
  author =       "Michael Kifer and Georg Lausen and James Wu",
  title =        "Logical Foundations of Object-Oriented and Frame-Based
                 Languages",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "4",
  pages =        "741--843",
  month =        jul,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 28 07:53:44 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210335.html",
  abstract =     "We propose a novel formalism, called {\em Frame
                 Logic\/} (abbr., $F$-logic), that accounts in a clean
                 and declarative fashion for most of the structural
                 aspects of object-oriented and frame-based languages.
                 These features include object identity, complex
                 objects, inheritance, polymorphic types, query methods,
                 encapsulation, and others. In a sense, $F$-logic stands
                 in the same relationship to the object-oriented
                 paradigm as classical predicate calculus stands to
                 relational programming. $F$-logic has a model-theoretic
                 semantics and a sound and complete resolution-based
                 proof theory. A small number of fundamental concepts
                 that come from object-oriented programming have direct
                 representation in $F$-logic; other, secondary aspects
                 of this paradigm are easily modeled as well. The paper
                 also discusses semantic issues pertaining to
                 programming with a deductive object-oriented language
                 based on a subset of $F$-logic.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Query languages. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Deduction. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Logic programming. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Nonmonotonic reasoning
                 and belief revision. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Logic programming. {\bf F.4.1}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic, Mechanical theorem
                 proving. {\bf D.3.2}: Software, PROGRAMMING LANGUAGES,
                 Language Classifications, Object-oriented languages.",
}

@Article{Alon:1995:CC,
  author =       "Noga Alon and Raphael Yuster and Uri Zwick",
  title =        "Color-Coding",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "4",
  pages =        "844--856",
  month =        jul,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 28 07:53:44 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210337.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Path and circuit problems.
                 {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 F.1.3}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Complexity Classes.",
}

@Article{Courcoubetis:1995:CPV,
  author =       "Costas Courcoubetis and Mihalis Yannakakis",
  title =        "The Complexity of Probabilistic Verification",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "4",
  pages =        "857--907",
  month =        jul,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 28 07:53:44 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210339.html",
  abstract =     "We determine the complexity of testing whether a
                 finite state, sequential or concurrent probabilistic
                 program satisfies its specification expressed in
                 linear-time temporal logic. For sequential programs, we
                 present an algorithm that runs in time linear in the
                 program and exponential in the specification, and also
                 show that the problem is in PSPACE, matching the known
                 lower bound. For concurrent programs, we show that the
                 problem can be solved in time polynomial in the program
                 and doubly exponential in the specification, and prove
                 that it is complete for double exponential time. We
                 also address these questions for specifications
                 described by $\omega$-automata or formulas in extended
                 temporal logic.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory; verification",
  subject =      "{\bf F.3.1}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Mechanical verification. {\bf
                 D.2.4}: Software, SOFTWARE ENGINEERING, Program
                 Verification. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Complexity of
                 proof procedures. {\bf G.3}: Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Probabilistic algorithms
                 (including Monte Carlo). {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes.",
}

@Article{Galil:1995:CTO,
  author =       "Zvi Galil",
  title =        "A Constant-Time Optimal Parallel String-Matching
                 Algorithm",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "4",
  pages =        "908--918",
  month =        jul,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 28 07:53:44 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210341.html",
  abstract =     "Given a pattern string, we describe a way to
                 preprocess it. We design a CRCW-PRAM constant time
                 optimal parallel algorithm for finding all occurrences
                 of the (preprocessed) pattern in any given text.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Pattern matching.
                 {\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Unbounded-action devices.",
}

@Article{Nodine:1995:GSO,
  author =       "Mark H. Nodine and Jeffrey Scott Vitter",
  title =        "Greed Sort: {Optimal} Deterministic Sorting on
                 Parallel Disks",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "4",
  pages =        "919--933",
  month =        jul,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 28 07:53:44 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210343.html",
  abstract =     "We present an algorithm for sorting efficiently with
                 parallel two-level memories. Our main result is an
                 elegant, easy-to-implement, optimal, {\em
                 deterministic\/} algorithm for external sorting with
                 $D$ disk drives. This result answers in the affirmative
                 the open problem posed by Vitter and Shriver of whether
                 an optimal algorithm exists that is deterministic. Our
                 measure of performance is the number of parallel
                 input/output (I/O) operations, in which each of the $D$
                 disks can simultaneously transfer a block of $B$
                 contiguous records. We assume that internal memory can
                 hold $M$ records. Our algorithm sorts $N$ records in
                 the optimal bound of $\Theta((N/BD) \log(N/B)/
                 \log(M/B))$ deterministically, and thus improves upon
                 Vitter and Shriver's optimal randomized algorithm as
                 well as the well-known deterministic but nonoptimal
                 technique of disk striping. It is also practical to
                 implement.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 B.4.4}: Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Performance Analysis and Design Aids, Worst-case
                 analysis. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency. {\bf E.5}: Data, FILES,
                 Sorting/searching.",
}

@Article{Choudhury:1995:CNC,
  author =       "Gagan H. Choudhury and Kin K. Leung and Ward Whitt",
  title =        "Calculating Normalization Constants of Closed Queuing
                 Networks by Numerically Inverting Their Generating
                 Functions",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "5",
  pages =        "935--970",
  month =        sep,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Nov 27 18:20:58 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210122.html",
  abstract =     "A new algorithm is developed for calculating
                 normalization constants (partition functions) and
                 moments of product-form steady-state distributions of
                 closed queuing networks and related models. The
                 essential idea is to numerically invert the generating
                 function of the normalization constant and related
                 generating functions appearing in expressions for the
                 moments. It is known that the generating function of
                 the normalization constant often has a remarkably
                 simple form, but numerical inversion evidently has not
                 been considered before. For $p$-dimensional transforms,
                 as occur with queuing networks having $p$ closed
                 chains, the algorithm recursively performs $p$
                 one-dimensional inversions. The required computation
                 grows exponentially in the dimension, but the dimension
                 can often be reduced by exploiting conditional
                 decomposition based on special structure. For large
                 populations, the inversion algorithm is made more
                 efficient by computing large sums using Euler
                 summation. The inversion algorithm also has a very low
                 storage requirement. A key ingredient in the inversion
                 algorithm is scaling. An effective static scaling is
                 developed for multichain closed queuing networks with
                 only single-server and (optionally) infinite-server
                 queues. An important feature of the inversion algorithm
                 is a self-contained accuracy check, which allows the
                 results to be verified in the absence of alternative
                 algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; theory",
  subject =      "{\bf G.m}: Mathematics of Computing, MISCELLANEOUS,
                 Queueing theory. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Modeling
                 techniques. {\bf F.2.1}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Numerical Algorithms and Problems, Computation of
                 transforms. {\bf G.1.4}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, Quadrature and Numerical
                 Differentiation, Multiple quadrature.",
}

@Article{Koutsoupias:1995:SC,
  author =       "Elias Koutsoupias and Christos H. Papadimitriou",
  title =        "On the $k$-server Conjecture",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "5",
  pages =        "971--983",
  month =        sep,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Nov 27 18:20:58 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210128.html",
  abstract =     "We prove that the {\em work function algorithm\/} for
                 the $k$-server problem has a competitive ratio at most
                 2$k$-1. Manasse et al. [1988] conjectured that the
                 competitive ratio for the $k$-server problem is exactly
                 $k$ (it is trivially at least $k$); previously the
                 best-known upper bound was exponential in $k$. Our
                 proof involves three crucial ingredients: A {\em
                 quasiconvexity property\/} of work functions, a {\em
                 duality lemma\/} that uses quasiconvexity to
                 characterize the configuration that achieve maximum
                 increase of the work function, and a {\em potential
                 function\/} that exploits the duality lemma.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Combinatorial
                 algorithms.",
}

@Article{Verma:1995:TUH,
  author =       "Rakesh M. Verma",
  title =        "A Theory of Using History for Equational Systems with
                 Applications",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "5",
  pages =        "984--1020",
  month =        sep,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Nov 27 18:20:58 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210130.html",
  abstract =     "Implementation of programming language interpreters,
                 proving theorem of the form A=B, implementation of
                 abstract data types, and program optimization are all
                 problems that can be reduced to the problem of finding
                 a normal form for an expression with respect to a
                 finite set of equations. In 1980, Chew proposed an
                 elegant congruence closure based simplifier (CCNS) for
                 computing with regular systems, which stores the
                 history of it computations in a compact data structure.
                 In 1990, Verma and Ramakrishnan showed that it can also
                 be used for noetherian systems with no overlaps.\par

                 In this paper, we develop a general theory of using
                 CCNS for computing normal forms and present several
                 applications. Our results are more powerful and widely
                 applicable than earlier work. We present an independent
                 set of postulates and prove that CCNS can be used for
                 any system that satisfies them. (This proof is based on
                 the notion of {\em strong closure\/}). We then show
                 that CCNS can be used for consistent convergent systems
                 and for various kinds of priority rewrite systems. This
                 is the first time that the applicability of CCNS has
                 been shown for priority systems. Finally, we present a
                 new and simpler translation scheme for converting
                 convergent systems into effectively nonoverlapping
                 convergent priority systems. Such a translation scheme
                 has been proposed earlier, but we show that it is
                 incorrect.\par

                 Because CCNS requires some strong properties of the
                 given system, our demonstration of its wide
                 applicability is both difficult and surprising. The
                 tension between demands imposed by CCNS and our efforts
                 to satisfy them gives our work much general
                 significance. Our results are partly achieved through
                 the idea of effectively simulating ``bad'' systems by
                 almost-equivalent ``good'' ones, partly through our
                 theory that substantially weakens the demands, and
                 partly through the design of a powerful and unifying
                 reduction proof method.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Mechanical
                 theorem proving. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Computational logic. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Proof theory. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Deduction. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 F.4.2}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Grammars and Other Rewriting
                 Systems.",
}

@Article{Awerbuch:1995:OTM,
  author =       "Baruch Awerbuch and David Peleg",
  title =        "Online Tracking of Mobile Users",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "5",
  pages =        "1021--1058",
  month =        sep,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Nov 27 18:20:58 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210132.html",
  abstract =     "This paper deals with the problem of maintaining a
                 distributed directory server, that enables us to keep
                 track of mobile users in a distributed network. The
                 paper introduces the graph-theoretic concept of {\em
                 regional matching}, and demonstrates how finding a
                 regional matching with certain parameters enables
                 efficient tracking. The communication overhead of our
                 tracking mechanism is within a polylogarithmic factor
                 of the lower bound.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "design; reliability; theory; verification",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Network operating systems. {\bf B.4.4}: Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Performance
                 Analysis and Design Aids, Formal models. {\bf B.4.4}:
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Performance Analysis and Design Aids, Verification.
                 {\bf B.4.4}: Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Performance Analysis and Design Aids,
                 Worst-case analysis. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf C.2.2}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Network Protocols. {\bf D.4.4}: Software,
                 OPERATING SYSTEMS, Communications Management, Network
                 communication. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed applications.",
}

@Article{Tempero:1995:RST,
  author =       "Ewan D. Tempero and Richard E. Ladner",
  title =        "Recoverable Sequence Transmission Protocols",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "5",
  pages =        "1059--1090",
  month =        sep,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Nov 27 18:20:58 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210133.html",
  abstract =     "We consider the sequence transmission problem, that
                 is, the problem of transmitting an infinite sequence of
                 messages $x_{1}x_{2}x_{3}\ldots{}$ over a channel that
                 can both lose and reorder packets. We define
                 performance measures, ideal transmission cost and
                 recovery cost, for protocols that solve the sequence
                 transmission problem. Ideal transmission cost measures
                 the number of packets needed to deliver $x_{n}$ when
                 the channel is behaving ideally and recovery cost
                 measures how long it takes, in terms of number of
                 messages delivered, for the ideal transmission cost to
                 take hold once the channel begins behaving ideally. We
                 also define lookahead, which measures the number of
                 messages the sender can be ahead of the receiver in the
                 protocol. We show that any protocol with constant
                 recovery cost and lookahead requires linear ideal
                 transmission cost. We describe a protocol,
                 $P>_{\mbox{lin}}$, that has ideal transmission cost
                 $2n$, recovery cost 1, and lookahead 0.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Packet networks. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf C.2.1}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Network Architecture and Design, Network
                 topology. {\bf D.4.4}: Software, OPERATING SYSTEMS,
                 Communications Management.",
}

@Article{Kahale:1995:EER,
  author =       "Nabil Kahale",
  title =        "Eigenvalues and Expansion of Regular Graphs",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "5",
  pages =        "1091--1106",
  month =        sep,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Nov 27 18:20:58 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210136.html",
  abstract =     "The spectral method is the best currently known
                 technique to prove lower bounds on expansion. Ramanujan
                 graphs, which have asymptotically optimal second
                 eigenvalue, are the best-known explicit expanders. The
                 spectral method yielded a lower bound of $k$/4 on the
                 expansion of linear-sized subsets of $k$-regular
                 Ramanujan graphs. We improve the lower bound on the
                 expansion of Ramanujan graphs to approximately $k$/2.
                 Moreover, we construct a family of $k$-regular graphs
                 with asymptotically optimal second eigenvalue and
                 linear expansion equal to $k$/2. This shows that $k/2$
                 is the best bound one can obtain using the second
                 eigenvalue method. We also show an upper bound of
                 roughly $1+k-1$ on the average degree of linear-sized
                 induced subgraphs of Ramanujan graphs. This compares
                 positively with the classical bound $2k-1$. As a
                 byproduct, we obtain improved results on random walks
                 on expanders and construct selection networks
                 (respectively, extrovert graphs) of smaller size
                 (respectively, degree) than was previously known.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems. {\bf
                 G.1.3}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 Numerical Linear Algebra, Eigenvalues.",
}

@Article{Conforti:1995:CLP,
  author =       "Michele Conforti and G{\'e}rard Cornu{\'e}jols",
  title =        "A Class of Logic Problems Solvable by Linear
                 Programming",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "5",
  pages =        "1107--1113",
  month =        sep,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Nov 27 18:20:58 1995",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/210137.html",
  abstract =     "In propositional logic, several problems, such as
                 satisfiability, MAX SAT and logical inference, can be
                 formulated as integer programs. In this paper, we
                 consider sets of clauses for which the corresponding
                 integer programs can be solved as linear programs. We
                 prove that balanced sets of clauses have this
                 property.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf G.1.6}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Optimization, Linear programming. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic. {\bf G.1.6}:
                 Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization, Integer programming. {\bf F.2.1}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Numerical Algorithms and Problems.",
}

@Article{Goemans:1995:IAA,
  author =       "Michel X. Goemans and David P. Williamson",
  title =        "Improved approximation algorithms for maximum cut and
                 satisfiability problems using semidefinite
                 programming",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "6",
  pages =        "1115--1145",
  month =        nov,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Aug 31 18:04:33 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/227684.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Graph algorithms.
                 {\bf I.1.2}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Algorithms, Analysis of algorithms.",
}

@Article{Freivalds:1995:IFL,
  author =       "R{\={u}}si{\c{n}}{\v{s}} Freivalds and Efim Kinber and
                 Carl H. Smith",
  title =        "On the Impact of Forgetting on Learning Machines",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "6",
  pages =        "1146--1168",
  month =        nov,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Aug 31 18:04:33 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/227685.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Complexity
                 hierarchies. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Automata. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Relations among models. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Unbounded-action devices. {\bf F.1.2}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation, Probabilistic computation. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Recursive
                 function theory. {\bf I.2.6}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Learning, Induction. {\bf
                 I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Concept learning.",
}

@Article{Boyar:1995:SZK,
  author =       "Joan Boyar and Gilles Brassard and Ren{\'e} Peralta",
  title =        "Subquadratic zero-knowledge",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "6",
  pages =        "1169--1193",
  month =        nov,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Aug 31 18:04:33 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/227686.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; security; theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Proof theory.
                 {\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes. {\bf F.1.2}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation, Alternation and nondeterminism.
                 {\bf E.3}: Data, DATA ENCRYPTION. {\bf F.2.1}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Numerical Algorithms and Problems,
                 Computations on matrices.",
}

@Article{Bergstra:1995:ESC,
  author =       "J. A. Bergstra and J. V. Tucker",
  title =        "Equational specifications, complete term rewriting
                 systems, and computable and semicomputable algebras",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "6",
  pages =        "1194--1230",
  month =        nov,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Aug 31 18:04:33 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/227687.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf F.4.2}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Grammars and Other Rewriting
                 Systems. {\bf D.3.3}: Software, PROGRAMMING LANGUAGES,
                 Language Constructs and Features, Data types and
                 structures. {\bf F.3.2}: Theory of Computation, LOGICS
                 AND MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages.",
}

@Article{Afek:1995:CFS,
  author =       "Yehuda Afek and David S. Greenberg and Michael Merritt
                 and Gadi Taubenfeld",
  title =        "Computing with faulty shared objects",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "6",
  pages =        "1231--1274",
  month =        nov,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Aug 31 18:04:33 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/227688.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; performance; reliability",
  subject =      "{\bf B.3.2}: Hardware, MEMORY STRUCTURES, Design
                 Styles, Shared memory. {\bf B.5.1}: Hardware,
                 REGISTER-TRANSFER-LEVEL IMPLEMENTATION, Design, Memory
                 design. {\bf B.3.4}: Hardware, MEMORY STRUCTURES,
                 Reliability, Testing, and Fault-Tolerance. {\bf B.5.3}:
                 Hardware, REGISTER-TRANSFER-LEVEL IMPLEMENTATION,
                 Reliability and Testing.",
}

@Article{Toyama:1995:TDS,
  author =       "Y. Toyama and J. W. Klop and H. P. Barendregt",
  title =        "Termination for direct sums of left-linear complete
                 term rewriting systems",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "6",
  pages =        "1275--1304",
  month =        nov,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Aug 31 18:04:33 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/227689.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf F.4.2}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Grammars and Other Rewriting
                 Systems.",
}

@Article{Anonymous:1995:AI,
  author =       "Anonymous",
  title =        "Author Index",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "6",
  pages =        "1305--1306",
  month =        nov,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 09 09:49:13 1996",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1995:SI,
  author =       "Anonymous",
  title =        "Subject Index",
  journal =      j-J-ACM,
  volume =       "42",
  number =       "6",
  pages =        "1307--1308",
  month =        nov,
  year =         "1995",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 09 09:49:13 1996",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Afek:1996:LMG,
  author =       "Yehuda Afek and Baruch Awerbuch and Serge Plotkin and
                 Michael Saks",
  title =        "Local management of a global resource in a
                 communication network",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "1",
  pages =        "1--19",
  month =        jan,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68M10 (68Q25 90Bxx)",
  MRnumber =     "1 407 395",
  bibdate =      "Thu Dec 05 11:46:30 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/227596.html",
  abstract =     "This paper introduces a new distributed data object
                 called {\em Resource Controller\/} that provides an
                 abstraction for managing the consumption of a global
                 resource in a distributed system. Examples of resources
                 that may be managed by such an object include; number
                 of messages sent, number of nodes participating in the
                 protocol, and total CPU time consumed.\par

                 The Resource Controller object is accessed through a
                 procedure that can be invoked at any node in the
                 network. Before consuming a unit of resource at some
                 node, the controlled algorithm should invoke the
                 procedure at this node, requesting a {\em permit\/} or
                 a {\em rejection}.\par

                 The key characteristics of the Resource Controller
                 object are the constraints that it imposes on the
                 global resource consumption. An ($M, W$)-Controller
                 guarantees that the total number of permits granted is
                 at most $M$; it also ensures that, if a request is
                 rejected, then at least $M - W$ permits are eventually
                 granted, even if no more requests are made after the
                 rejected one.\par

                 In this paper, we describe several message and
                 space0efficient implementations of the Resource
                 Controller object. In particular, we present an ($M,
                 W$)-Controller whose message complexity is $O(n
                 \log^{2}n \log(M/(W + 1)))$ where $n$ is the total
                 number of nodes. This is in contrast to the $O(nM)$
                 message complexity of a fully centralized controller
                 which maintains a global counter of the number of
                 granted permits at some distinguished node and relays
                 all the requests to the node.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf C.2.3}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Operations.
                 {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory.",
}

@Article{Chen:1996:TED,
  author =       "Weidong Chen and David S. Warren",
  title =        "Tabled evaluation with delaying for general logic
                 programs",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "1",
  pages =        "20--74",
  month =        jan,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68N17 (68P15)",
  MRnumber =     "1 407 396",
  bibdate =      "Thu Dec 05 11:46:53 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/227597.html",
  abstract =     "SLD resolution with negation as finite failure (SLDNF)
                 reflects the procedural interpretation of predicate
                 calculus as a programming language and forms the
                 computational basis for Prolog systems. Despite its
                 advantages for stack-based memory management, SLDNF is
                 often not appropriate for query evaluation for three
                 reasons: (a) it may not terminate due to infinite
                 positive recursion; (b) it may be terminate due to
                 infinite recursion through negation; and (c) it may
                 repeatedly evaluate the same literal in a rule body,
                 leading to unacceptable performance.\par

                 We address all three problems for goal-oriented query
                 evaluation of general logic programs by presenting
                 tabled evaluation with delaying, called {\em SLG
                 resolution}. It has three distinctive features:\par

                 (i) SLG resolution is a partial deduction procedure,
                 consisting of seven fundamental transformations. A
                 query is transformed step by step into a set of
                 answers. The use of transformations separates logical
                 issues of query evaluation from procedural ones. SLG
                 allows an arbitrary computation rule for selecting a
                 literal from a rule body and an arbitrary control
                 strategy for selecting transformations to
                 apply.\par

                 (ii) SLG resolution is sound and search space complete
                 with respect to the well-founded partial model for all
                 non-floundering queries, and preserves all three-valued
                 stable models. To evaluate a query under different
                 three-valued stable models, SLG resolution can be
                 enhanced by further processing of the answers of
                 subgoals relevant to a query.\par

                 (iii) SLG resolution avoids both positive and negative
                 loops and always terminates for programs with the
                 bounded-term-size property. It has a polynomial time
                 data complexity for well-founded negation of
                 function-free programs. Through a delaying mechanism
                 for handling ground negative literals involved in
                 loops, SLG resolution avoids the repetition of any of
                 its derivation steps.\par

                 Restricted forms of $S$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "management; theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic. {\bf H.2.3}:
                 Information Systems, DATABASE MANAGEMENT, Languages.
                 {\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem
                 Proving.",
}

@Article{Joung:1996:CSC,
  author =       "Yuh-Jzer Joung and Scott A. Smolka",
  title =        "A comprehensive study of the complexity of multiparty
                 interaction",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "1",
  pages =        "75--115",
  month =        jan,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q10 (68M20 68N25 68Q25)",
  MRnumber =     "1 407 397",
  bibdate =      "Thu Dec 05 11:47:01 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/227601.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "management; theory",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management. {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications. {\bf D.3.3}: Software, PROGRAMMING
                 LANGUAGES, Language Constructs and Features. {\bf
                 D.4.4}: Software, OPERATING SYSTEMS, Communications
                 Management. {\bf D.4.7}: Software, OPERATING SYSTEMS,
                 Organization and Design. {\bf F.2.3}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Tradeoffs among Complexity Measures.",
}

@Article{Alur:1996:BRP,
  author =       "Rajeev Alur and Tom{\'a}s Feder and Thomas A.
                 Henzinger",
  title =        "The benefits of relaxing punctuality",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "1",
  pages =        "116--146",
  month =        jan,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q60 (68Q10 68Q25 68Q55)",
  MRnumber =     "1 407 398",
  bibdate =      "Thu Dec 05 11:47:02 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/227602.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory; verification",
  subject =      "{\bf C.3}: Computer Systems Organization,
                 SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS,
                 Real-time systems. {\bf D.2.1}: Software, SOFTWARE
                 ENGINEERING, Requirements/Specifications. {\bf F.3.1}:
                 Theory of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs.
                 {\bf F.4.3}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Formal Languages.",
}

@Article{Miltersen:1996:ACM,
  author =       "Peter Bro Miltersen and Mike Paterson and Jun Tarui",
  title =        "The asymptotic complexity of merging networks",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "1",
  pages =        "147--165",
  month =        jan,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q25 (68P10)",
  MRnumber =     "1 407 399",
  bibdate =      "Thu Dec 05 11:47:02 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/227693.html",
  abstract =     "Let M(m,n) be the minimum number of comparators needed
                 in a comparator network that merges $m$ elements
                 $x_{1}\le x_{2}\le \ldots{}\le x_{m}$ and $n$ elements
                 $y_{1}\le y_{2}\le \ldots{}\le y_{n}$, where $n\ge m$.
                 Batcher's odd-even merge yields the following upper
                 bound: \par

                 $$M(m,n)\le (1/2)(m+n)\log_2m+o(n)$$ in particular,
                 $$M(n,n)\le n\log_2n+O(n)$$\par

                 We prove the following lower bound that matches the
                 upper bound above asymptotically as $n\ge
                 m\rightarrow\infty$:\par

                 $$M(m,n)\ge (1/2)(m+n)\log_2m-O(m);$$

                 \noindent in particular,\par

                 $$M(n,n)\ge n\log_2n-O(n).$$\par

                 Our proof technique extends to give similarly tight
                 lower bounds for the size of monotone Boolean circuits
                 for merging, and for the size of switching networks
                 capable of realizing the set of permutations that arise
                 from merging.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching.",
}

@Article{Boyer:1996:APO,
  author =       "Robert S. Boyer and Yuan Yu",
  title =        "Automated proofs of object code for a widely used
                 microprocessor",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "1",
  pages =        "166--192",
  month =        jan,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q60 (68T15)",
  MRnumber =     "1 407 400",
  bibdate =      "Thu Dec 05 11:47:02 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/227603.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf D.2.1}: Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications. {\bf D.2.4}: Software,
                 SOFTWARE ENGINEERING, Program Verification. {\bf
                 D.3.1}: Software, PROGRAMMING LANGUAGES, Formal
                 Definitions and Theory. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs.
                 {\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving.",
}

@Article{Selman:1996:KCT,
  author =       "Bart Selman and Henry Kautz",
  title =        "Knowledge compilation and theory approximation",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "2",
  pages =        "193--224",
  month =        mar,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68T30",
  MRnumber =     "1 408 321",
  bibdate =      "Thu Dec 05 11:47:03 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/226644.html",
  abstract =     "Computational efficiency is a central concern in the
                 design of knowledge representation systems. In order to
                 obtain efficient systems, it has been suggested that
                 one should limit the form of the statements in the
                 knowledge base or use an incomplete inference
                 mechanism. The former approach is often too restrictive
                 for practical applications, whereas the latter leads to
                 uncertainty about exactly what can and cannot be
                 inferred from the knowledge base. We present a third
                 alternative, in which knowledge given in a general
                 representation language is translated (compiled) into a
                 tractable form---allowing for efficient subsequent
                 query answering.\par

                 We show how propositional logical theories can be
                 compiled into Horn theories that approximate the
                 original information. The approximations bound the
                 original theory from below and above in terms of
                 logical strength. The procedures are extended to other
                 tractable languages (for example, binary clauses) and
                 to the first-order case. Finally, we demonstrate the
                 generality of our approach by compiling concept
                 descriptions in a general frame-based language into a
                 tractable form.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; experimentation; theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic. {\bf I.2.4}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Knowledge Representation Formalisms and Methods.",
}

@Article{Chandra:1996:UFD,
  author =       "Tushar Deepak Chandra and Sam Toueg",
  title =        "Unreliable failure detectors for reliable distributed
                 systems",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "2",
  pages =        "225--267",
  month =        mar,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68M10 (68M15 68P15 68Q10)",
  MRnumber =     "1 408 322",
  bibdate =      "Thu Dec 05 11:47:03 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/226647.html",
  abstract =     "We introduce the concept of unreliable failure
                 detectors and study how they can be used to solve
                 Consensus in asynchronous systems with crash failures.
                 We characterise unreliable failure detectors in terms
                 of two properties---completeness and accuracy. We show
                 that Consensus can be solved even with unreliable
                 failure detectors that make an infinite number of
                 mistakes, and determine which ones can be used to solve
                 Consensus despite any number of crashes, and which ones
                 require a majority of correct processes. We prove that
                 Consensus and Atomic Broadcast are reducible to each
                 other in asynchronous systems with crash failures;
                 thus, the above results also apply to Atomic Broadcast.
                 A companion paper shows that one of the failure
                 detectors introduced here is the weakest failure
                 detector for solving Consensus [Chandra et al. 1992].",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; reliability; theory",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Network operating systems. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Reliability,
                 availability, and serviceability. {\bf D.1.3}:
                 Software, PROGRAMMING TECHNIQUES, Concurrent
                 Programming, Distributed programming. {\bf D.4.5}:
                 Software, OPERATING SYSTEMS, Reliability,
                 Fault-tolerance. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Automata. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Concurrency.
                 {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed applications. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed databases. {\bf
                 F.1.1}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Relations among models.
                 {\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Distributed systems. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Transaction
                 processing.",
}

@Article{Feige:1996:IPH,
  author =       "Uriel Feige and Shafi Goldwasser and Laszlo Lov{\'a}sz
                 and Shmuel Safra and Mario Szegedy",
  title =        "Interactive proofs and the hardness of approximating
                 cliques",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "2",
  pages =        "268--292",
  month =        mar,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q15 (68Q25)",
  MRnumber =     "1 408 323",
  bibdate =      "Thu Dec 05 11:47:04 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/226652.html",
  abstract =     "The contribution of this paper is two-fold. First, a
                 connection is established between approximating the
                 size of the largest clique in a graph and multi-prover
                 interactive proofs. Second, an efficient multi-prover
                 interactive proof for NP languages is constructed,
                 where the verifier uses very few random bits and
                 communication bits. Last, the connection between
                 cliques and efficient multi-prover interaction proofs,
                 is shown to yield hardness results on the complexity of
                 approximating the size of the largest clique in a
                 graph.\par

                 Of independent interest is our proof of correctness for
                 the multilinearity test of functions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes, Reducibility and
                 completeness. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory.",
}

@Article{Bhatt:1996:OEB,
  author =       "Sandeep N. Bhatt and Fan R. K. Chung and Jia-Wei Hong
                 and F. Thomson Leighton and Bojana Obreni{\'c} and
                 Arnold L. Rosenberg and Eric J. Schwabe",
  title =        "Optimal emulations by butterfly-like networks",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "2",
  pages =        "293--330",
  month =        mar,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68M10 (68R10)",
  MRnumber =     "1 408 324",
  bibdate =      "Thu Dec 05 11:47:07 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/226658.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; theory",
  subject =      "{\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Interconnection architectures. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 G.2.1}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms.",
}

@Article{Goodrich:1996:SPP,
  author =       "Michael T. Goodrich and S. Rao Kosaraju",
  title =        "Sorting on a parallel pointer machine with
                 applications to set expression evaluation",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "2",
  pages =        "331--361",
  month =        mar,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68P10 (68P05 68Q22 68Q25)",
  MRnumber =     "1 408 325",
  bibdate =      "Thu Dec 05 11:47:07 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/226670.html",
  abstract =     "We present optimal algorithms for sorting on parallel
                 CREW and EREW versions of the pointer machine model.
                 Intuitively, one can view our methods as being based on
                 a parallel mergesort using linked lists rather than
                 arrays (the usual parallel data structure). We also
                 show how to exploit the ``locality'' of our approach to
                 solve the set expression evaluation problem, a problem
                 with applications to database querying and
                 logic-programming in $O(\log n)$ time using $O(n)$
                 processors. Interestingly, this is an asymptotic
                 improvement over what seems possible using previous
                 techniques.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 E.1}: Data, DATA STRUCTURES, Arrays. {\bf F.1.1}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Models of Computation, Unbounded-action devices. {\bf
                 F.1.2}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Modes of Computation, Parallelism and
                 concurrency.",
}

@Article{Curien:1996:CPW,
  author =       "Pierre-Louis Curien and Th{\'e}r{\`e}se Hardin and
                 Jean-Jacques L{\'e}vy",
  title =        "Confluence properties of weak and strong calculi of
                 explicit substitutions",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "2",
  pages =        "362--397",
  month =        mar,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q55 (03Bxx 68Q42)",
  MRnumber =     "1 408 326",
  bibdate =      "Thu Dec 05 11:47:07 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/226675.html",
  abstract =     "Categorical combinators [Curien 1986/1993; Hardin
                 1989; Yokouchi 1989] and more recently
                 [lambda][sigma]-calculus [Abadi 1991; Hardin and
                 L{\'e}vy 1989], have been introduced to provide an
                 explicit treatment of substitutions in the
                 [lambda]-calculus. We reintroduce here the ingredients
                 of these calculi in a self-contained and stepwise way,
                 with a special emphasis on confluence properties. The
                 main new results of the paper with respect to Curien
                 [1986/1993], Hardin [1989], Abadi [1991], and Hardin
                 and L{\'e}vy [1989] are the following:\par

                 (1) We present a confluent weak calculus of
                 substitutions, where no variable clashes can be feared;
                 (2) We solve a conjecture raised in Abadi [1991]:
                 [lambda][sigma]-calculus is not confluent (it is
                 confluent on ground terms only).\par

                 This unfortunate result is ``repaired'' by presenting a
                 confluent version of [lambda][sigma]-calculus, named
                 the $\lambda${\em Env\/}-calculus in Hardin and
                 L{\'e}vy [1989], called here the confluent $\lambda
                 \sigma$-calculus.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf F.3.2}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages, Operational semantics. {\bf F.3.3}: Theory
                 of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Studies of Program Constructs, Functional constructs.
                 {\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Lambda
                 calculus and related systems.",
}

@Article{Santos:1996:LPF,
  author =       "Eugene {Santos, Jr.}",
  title =        "On Linear Potential Functions for Approximating
                 {Bayesian} Computations",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "3",
  pages =        "399--430",
  month =        may,
  year =         "1996",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/233551.233552",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Txx",
  MRnumber =     "1 408 561",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/233552.html",
  abstract =     "Probabilistic reasoning suffers from NP-hard
                 implementations. In particular, the amount of
                 probabilistic information necessary to the computations
                 is often overwhelming. For example, the size of
                 conditional probability tables in Bayesian networks has
                 long been a limiting factor in the general use of these
                 networks.\par

                 We present a new approach for manipulating the
                 probabilistic information given. This approach avoids
                 being overwhelmed by essentially compressing the
                 information using approximation functions called linear
                 potential functions. We can potentially reduce the
                 information from a combinatorial amount to roughly
                 linear in the number of random variable assigments.
                 Furthermore, we can compute these functions through
                 closed form equations. As it turns out, our
                 approximation method is quite general and may be
                 applied to other data compression problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; experimentation; theory",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY. {\bf
                 G.1.2}: Mathematics of Computing, NUMERICAL ANALYSIS,
                 Approximation. {\bf G.1.6}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, Optimization. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving. {\bf I.5}: Computing
                 Methodologies, PATTERN RECOGNITION.",
}

@Article{Goldreich:1996:SPS,
  author =       "Oded Goldreich and Rafail Ostrovsky",
  title =        "Software protection and simulation on oblivious
                 {RAMs}",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "3",
  pages =        "431--473",
  month =        may,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q05 (68M10 68P25)",
  MRnumber =     "1 408 562",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/233553.html",
  abstract =     "Software protection is one of the most important
                 issues concerning computer practice. There exist many
                 heuristics and ad-hoc methods for protection, but the
                 problem as a whole has not received the theoretical
                 treatment it deserves. In this paper, we provide
                 theoretical treatment of software protection. We reduce
                 the problem of software protection to the problem of
                 efficient simulation on {\em oblivious\/} RAM.\par

                 A machine is {\em oblivious\/} if the sequence in which
                 it accesses memory locations is equivalent for any two
                 inputs with the same running time. For example, an
                 oblivious Turing Machine is one for which the movement
                 of the heads on the tapes is identical for each
                 computation. (Thus, the movement is independent of the
                 actual input.) {\em What is the slowdown in the running
                 time of a machine, if it is required to be
                 oblivious?\/} In 1979, Pippenger and Fischer showed how
                 a two-tape {\em oblivious\/} Turing Machine can
                 simulate, on-line, a one-tape Turing Machine, with a
                 logarithmic slowdown in the running time. We show an
                 analogous result for the random-access machine (RAM)
                 model of computation. In particular, we show how to do
                 an on-line simulation of an arbitrary RAM by a
                 probabilistic {\em oblivious\/} RAM with a
                 polylogarithmic slowdown in the running time. On the
                 other hand, we show that a logarithmic slowdown is a
                 lower bound.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "security; theory",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection. {\bf E.3}: Data, DATA ENCRYPTION. {\bf
                 F.1.1}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Bounded-action
                 devices.",
}

@Article{Marcus:1996:FMD,
  author =       "Sherry Marcus and V. S. Subrahmanian",
  title =        "Foundations of multimedia database systems",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "3",
  pages =        "463--523",
  month =        may,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68P15",
  MRnumber =     "1 408 563",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/233554.html",
  abstract =     "Though numerous multimedia systems exist in the
                 commercial market today, relatively little work has
                 been done on developing the mathematical foundation of
                 multimedia technology. We attempt to take some initial
                 steps towards the development of a theoretical basis
                 for a multimedia information system. To do so, we
                 develop the motion of a structured multimedia database
                 system. We begin by defining a mathematical model of a
                 media-instance. A media-instance may be thought of as
                 ``glue'' residing on top of a specific physical
                 media-representation (such as video, audio, documents,
                 etc). Using this ``glue'', it is possible to define a
                 general purpose logical query language to query
                 multimedia data. This glue consists of a set of
                 ``states'' (e.g., video frames, audio tracks, etc.) and
                 ``features'', together with relationships between
                 states and/or features. A structured multimedia
                 database system imposes a certain mathematical
                 structures on the set of features/states. Using this
                 notion of a structure, we are able to define indexing
                 structures for processing queries, methods to relax
                 queries when answers do not exist to those queries, as
                 well as sound, complete and terminating procedures to
                 answer such queries (and their relaxations, when
                 appropriate). We show how a media-presentation can be
                 generated by processing a sequence of queries, and
                 furthermore we show that when these queries are
                 extended to include {\em constraints}, then these
                 queries can not only generate presentations, but also
                 generate temporal synchronization properties and
                 spatial layout properties for such presentations. We
                 describe the architecture of a prototype multimedia
                 database system based on the principles described in
                 this paper.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic. {\bf H.2.3}:
                 Information Systems, DATABASE MANAGEMENT, Languages.
                 {\bf H.2.5}: Information Systems, DATABASE MANAGEMENT,
                 Heterogeneous Databases.",
}

@Article{Nederhof:1996:LTS,
  author =       "Mark-Jan Nederhof and Eberhard Bertsch",
  title =        "Linear-Time Suffix Parsing for Deterministic
                 Languages",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "3",
  pages =        "524--554",
  month =        may,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q52 (68Q45 68Q50 68Q68)",
  MRnumber =     "1 408 564",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/233555.html",
  abstract =     "We present a linear-time algorithm to decide for any
                 fixed deterministic context-free language $L$ and input
                 string $w$ whether $w$is a suffix of some string in
                 $L$. In contrast to a previously published technique,
                 the decision procedure may be extended to produce
                 syntactic structures (parses) without an increase in
                 time complexity. We also show how this algorithm may be
                 applied to process incorrect input in linear time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory; verification",
  subject =      "{\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Parsing. {\bf F.4.2}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Grammars and Other Rewriting Systems, Parsing.",
}

@Article{vanGlabbeek:1996:BTA,
  author =       "Rob J. {van Glabbeek} and W. Peter Weijland",
  title =        "Branching Time and Abstraction in Bisimulation
                 Semantics",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "3",
  pages =        "555--600",
  month =        may,
  year =         "1996",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/233551.233556",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q10 (68Q55 68Q60)",
  MRnumber =     "1 408 565",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/233556.html",
  abstract =     "In comparative concurrency semantics, one usually
                 distinguishes between {\em linear time\/} and {\em
                 branching time\/} semantic equivalences. Milner's
                 notion of {\em observation equivalence\/} is often
                 mentioned as the standard example of a branching time
                 equivalence. In this paper we investigate whether
                 observation equivalence really does respect the
                 branching structure of processes, and find that in the
                 presence of the unobservable action $^*$ of CCS this is
                 not the case.\par

                 Therefore, the notion of {\em branching bisimulation
                 equivalence\/} is introduced which strongly preserves
                 the branching structure of processes, in the sense that
                 it preserves computations together with the potentials
                 in all intermediate states that are passed through,
                 even if silent moves are involved. On closed CCS-terms
                 branching bisimulation congruence can be completely
                 axiomatized by the single axiom scheme:\par

                 $$a . (\tau . (y + z) + y) = a . (y +
                 z)$$\par

                 \noindent (where $a$ ranges over all actions) and the
                 usual laws for strong congruence.\par

                 We also establish that for sequential processes
                 observation equivalence is not preserved under
                 refinement of actions, whereas branching bisimulation
                 is.\par

                 For a large class of processes, it turns out that
                 branching bisimulation and observation equivalence are
                 the same. As far as we know, all protocols that have
                 been verified in the setting of observation equivalence
                 happen to fit in this class, and hence are also valid
                 in the stronger setting of branching bisimulation
                 equivalence.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf D.3.1}: Software, PROGRAMMING LANGUAGES, Formal
                 Definitions and Theory. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation. {\bf F.3.2}: Theory of Computation, LOGICS
                 AND MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages. {\bf F.4.3}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Formal
                 Languages.",
}

@Article{Karger:1996:NAM,
  author =       "David R. Karger and Clifford Stein",
  title =        "A new approach to the minimum cut problem",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "4",
  pages =        "601--640",
  month =        jul,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68R10 (68Q25)",
  MRnumber =     "1 409 212",
  bibdate =      "Tue Sep 09 07:55:44 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/234534.html",
  abstract =     "This paper present a new approach to finding minimum
                 cuts in undirected graphs. The fundamental principle is
                 simple: the edges in a graph's minimum cut form an
                 extremely small fraction of the graph's edges. Using
                 this idea, we give a randomized, strongly polynomial
                 algorithm that finds the minimum cut in an arbitrarily
                 weighted undirected graph with high probability. The
                 algorithm runs in $O(n^{2}\log^{3}n)$ time, a
                 significant improvement over the previous
                 $\tilde{O}(mn)$ time bounds based on maximum flows. It
                 is simple and intuitive and uses no complex data
                 structures. Our algorithm can be parallelized to run in
                 {\em RNL\/} with $n^{2}$ processors; this gives the
                 first proof that the minimum cut problem can be solved
                 in {\em RNL}. The algorithm does more than find a
                 single minimum cut; it finds all of them.\par

                 With minor modifications, our algorithm solves two
                 other problems of interest. Our algorithm finds all
                 cuts with value within a multiplicative factor of
                 [alpha] of the minimum cut's in expected
                 $\tilde{O}(n^{2[alpha]})$ time, or in {\em RNL\/} with
                 $n^{2[alpha]}$ processors. The problem of finding a
                 minimum multiway cut of graph into $r$ pieces is solved
                 in expected $\tilde{O}(n^{2(r-1)})$ time, or in {\em
                 RNL\/} with $n^{2(r-1)}$ processors. The ``trace'' of
                 the algorithm's execution on these two problems forms a
                 new compact data structure for representing all small
                 cuts and all multiway cuts in a graph. This data
                 structure can be efficiently transformed into the more
                 standard cactus representing for minimum cuts.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Graph
                 algorithms. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Network problems.
                 {\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf I.1.2}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Algorithms.",
}

@Article{Cheng:1996:BEI,
  author =       "William C. Cheng and Richard R. Muntz",
  title =        "Bounding Errors Introduced by Clustering of Customers
                 in Closed Product-Form Queuing Networks",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "4",
  pages =        "641--669",
  month =        jul,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/234539.html",
  abstract =     "Product-form queuing network models have been widely
                 used to model systems with shared resources such as
                 computer systems (both centralized and distributed),
                 communication networks, and flexible manufacturing
                 systems. Closed multichain product-form networks are
                 inherently more difficult to analyze than open
                 networks, due to the effect of normalization. Results
                 in workload characterization for closed networks in the
                 literature are often for networks having special
                 structures and only specific performance measures have
                 been considered.\par

                 In this article, we drive certain properties
                 (insensitivity of conditional state probability
                 distributions and fractional-linearity of Markov reward
                 functions) for a broad class of closed multichain
                 product-form networks. These properties are derived
                 using the most basic flow balance conditions of
                 product-form networks. Then we show how these basic
                 properties can be applied in obtaining error bounds
                 when similar customers are clustered together to speed
                 up computation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Modeling techniques. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Queueing theory. {\bf
                 G.m}: Mathematics of Computing, MISCELLANEOUS, Queueing
                 theory.",
}

@Article{Koscielski:1996:CMA,
  author =       "Antoni Ko{\'s}cielski and Leszek Pacholski",
  title =        "Complexity of {Makanin}'s algorithm",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "4",
  pages =        "670--684",
  month =        jul,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q25 (68R15)",
  MRnumber =     "1 409 214",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/234543.html",
  abstract =     "The exponent of periodicity is an important factor in
                 estimates of complexity of word-unification algorithms.
                 We prove that the exponent of periodicity of a minimal
                 solution of a word equation is of order $2^{1.07d}$,
                 where $d$ is the length of the equation. We also give a
                 lower bound $2^{0.29d}$ so our upper bound is almost
                 optimal and exponentially better than the original
                 bound {\em $(6d)^{22d4}+ 2$}. Consequently, our result
                 implies an exponential improvement of known upper
                 bounds on complexity of word-unification algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf I.1.2}: Computing Methodologies,
                 ALGEBRAIC MANIPULATION, Algorithms, Algebraic
                 algorithms.",
}

@Article{Chandra:1996:WFD,
  author =       "Tushar Deepak Chandra and Vassos Hadzilacos and Sam
                 Toueg",
  title =        "The Weakest Failure Detector for Solving Consensus",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "4",
  pages =        "685--722",
  month =        jul,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68M15 (68M10 68Q10)",
  MRnumber =     "1 409 215",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/234549.html",
  abstract =     "We determine what information about failures is
                 necessary and sufficient to solve Consensus in
                 asynchronous distributed systems subject to crash
                 failures. In Chandra and Toueg [1996], it is shown that
                 $W$, a failure detector that provides surprisingly
                 little information about which processes have crashed,
                 is sufficient to solve Consensus in asynchronous
                 systems with a majority of correct processes. In this
                 paper, we prove that to solve Consensus, any failure
                 detector has to provide at least as much information as
                 W. Thus, W is indeed the weakest failure detector for
                 solving Consensus in asynchronous systems with a
                 majority of correct processes.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; reliability; theory",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed applications. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed databases. {\bf
                 C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Network operating systems. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Reliability,
                 availability, and serviceability. {\bf D.1.3}:
                 Software, PROGRAMMING TECHNIQUES, Concurrent
                 Programming, Distributed programming. {\bf D.4.5}:
                 Software, OPERATING SYSTEMS, Reliability,
                 Fault-tolerance. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Automata. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Relations among models. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Concurrency. {\bf H.2.4}: Information Systems, DATABASE
                 MANAGEMENT, Systems, Distributed systems. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Transaction processing.",
}

@Article{Li:1996:HSC,
  author =       "Ming Li and John Tromp and Paul M. B. Vit{\'a}nyi",
  title =        "How to Share Concurrent Wait-Free Variables",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "4",
  pages =        "723--746",
  month =        jul,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q10 (68N25)",
  MRnumber =     "1 409 216",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/234556.html",
  abstract =     "Sharing data between multiple asynchronous
                 users---each of which can atomically read and write the
                 data---is a feature that may help to increase the
                 amount of parallelism in distributed systems. An
                 algorithm implementing this feature is presented. The
                 main construction of an $n$-user atomic variable
                 directly from single-writer, single-reader atomic
                 variables uses $O(n)$ control bits and $O(n)$ accesses
                 per Read/Write running in $O(1)$ parallel time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "management",
  subject =      "{\bf B.3.2}: Hardware, MEMORY STRUCTURES, Design
                 Styles. {\bf B.4.3}: Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Interconnections (subsystems). {\bf
                 D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management. {\bf D.4.4}: Software, OPERATING SYSTEMS,
                 Communications Management.",
}

@Article{Bshouty:1996:FSM,
  author =       "Nader H. Bshouty and Christino Tamon",
  title =        "On the {Fourier} Spectrum of Monotone Functions",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "4",
  pages =        "747--770",
  month =        jul,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  MRclass =      "68Q25 (68Q15 68T05)",
  MRnumber =     "1 409 217",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/234564.html",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Probabilistic
                 computation. {\bf F.2.1}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Numerical Algorithms and Problems, Computation of
                 transforms. {\bf F.2.1}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Numerical Algorithms and Problems, Computations on
                 polynomials. {\bf G.3}: Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Probabilistic algorithms
                 (including Monte Carlo). {\bf I.2.6}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Learning,
                 Concept learning.",
}

@Article{Vitter:1996:OPD,
  author =       "Jeffrey Scott Vitter and P. Krishnan",
  title =        "Optimal prefetching via data compression",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "5",
  pages =        "771--793",
  month =        sep,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/234753.html",
  abstract =     "Caching and prefetching are important mechanisms for
                 speeding up access time to data on secondary storage.
                 Recent work in competitive online algorithms has
                 uncovered several promising new algorithms for caching.
                 In this paper, we apply a form of the competitive
                 philosophy for the first time to the problem of
                 prefetching to develop an optimal universal prefetcher
                 in terms of fault rate, with particular applications to
                 large-scale databases and hypertext systems. Our
                 prediction algorithms with particular applications to
                 large-scale databases and hypertext systems. Our
                 prediction algorithms for prefetching are novel in that
                 they are based on data compression techniques that are
                 both theoretically optimal and good in practice.
                 Intuitively, in order to compress data effectively, you
                 have to be able to predict future data well, and thus
                 good data compressors should be able to predict well
                 for purposes of prefetching. We show for powerful
                 models such as Markov sources and $m$th order Markov
                 sources that the page fault rate incurred by our
                 prefetching algorithms are optimal in the limit for
                 almost all sequences of page requests.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; performance; theory",
  subject =      "{\bf D.4.2}: Software, OPERATING SYSTEMS, Storage
                 Management, Swapping. {\bf D.4.2}: Software, OPERATING
                 SYSTEMS, Storage Management, Virtual memory. {\bf
                 D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Stochastic analysis. {\bf E.4}: Data, CODING AND
                 INFORMATION THEORY, Data compaction and compression.
                 {\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning.",
}

@Article{Busch:1996:CTB,
  author =       "Costas Busch and Marios Mavronicolas",
  title =        "A combinatorial treatment of balancing networks",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "5",
  pages =        "794--839",
  month =        sep,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/234754.html",
  abstract =     "Balancing networks, originally introduced by Aspnes et
                 al. ({\em Proceedings of the 23rd Annual ACM Symposium
                 on Theory of Computing}, pp. 348-358, May 1991),
                 represent a new class of distributed, low-contention
                 data structures suitable for solving many fundamental
                 multi-processor coordination problems that can be
                 expressed as {\em balancing problems}. In this work, we
                 present a mathematical study of the combinatorial
                 structure of balancing networks, and a variety of its
                 applications.\par

                 Our study identifies important combinatorial {\em
                 transfer parameters\/} of balancing networks. In turn,
                 necessary and sufficient combinatorial conditions are
                 established, expressed in terms of transfer parameters,
                 which precisely characterize many important and well
                 studied classes of balancing networks such as {\em
                 counting networks\/} and {\em smoothing networks}. We
                 propose these combinatorial conditions to be
                 ``balancing analogs'' of the well known {\em Zero-One
                 principle\/} holding for {\em sorting
                 networks\/}\par

                 Within the combinatorial framework we develop, our
                 first application is in deriving combinatorial
                 conditions, involving the transfer parameters, which
                 precisely delimit the boundary between counting
                 networks and sorting networks.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory; verification",
  subject =      "{\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks. {\bf C.2.1}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Network Architecture and Design, Network topology. {\bf
                 C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed applications. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sorting and searching. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Counting problems. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms. {\bf G.2.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory, Network
                 problems.",
}

@Article{Hellerstein:1996:HMQ,
  author =       "Lisa Hellerstein and Krishnan Pillaipakkamnatt and
                 Vijay Raghavan and Dawn Wilkins",
  title =        "How many queries are needed to learn?",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "5",
  pages =        "840--862",
  month =        sep,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/234755.html",
  abstract =     "We investigate the query complexity of exact learning
                 in the membership and (proper) equivalence query model.
                 We give a complete characterization of concept classes
                 that are learnable with a polynomial number of
                 polynomial sized queries in this model. We give
                 applications of this characterization, including
                 results on learning a natural subclass of DNF formulas,
                 and on learning with membership queries alone. Query
                 complexity has previously been used to prove lower
                 bounds on the time complexity of exact learning. We
                 show a new relationship between query complexity and
                 time complexity in exact learning: If any ``honest''
                 class is exactly and properly learnable with polynomial
                 query complexity, but not learnable in polynomial time,
                 then P = NP. In particular, we show that an honest
                 class is exactly polynomial-query learnable if and only
                 if it is learnable using an oracle for
                 $[Gamma]^{p}_{4}$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; theory",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Relations
                 among models. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Relativized computation. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Interactive computation. {\bf F.1.3}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Complexity hierarchies. {\bf
                 I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Concept learning. {\bf I.2.6}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Learning, Induction.",
}

@Article{Bol:1996:MNP,
  author =       "Roland Bol and Jan Friso Groote",
  title =        "The meaning of negative premises in transition system
                 specifications",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "5",
  pages =        "863--914",
  month =        sep,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 5 11:52:29 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/234756.html",
  abstract =     "We present a general theory for the use of negative
                 premises in the rules of Transition System
                 Specifications (TSSs). We formulate a criterion that
                 should be satisfied by a TSS in order to be meaningful,
                 that is, to unequivocally define a transition relation.
                 We also provide powerful techniques for proving that a
                 TSS satisfies this criterion, meanwhile constructing
                 this transition relation. Both the criterion and the
                 techniques originate from logic programming [van Gelder
                 et al. 1988; Gelfond and Lifschitz 1988] to which TSSs
                 are close. In an appendix we provide an extensive
                 comparison between them.\par

                 As in Groote [1993], we show that the bisimulation
                 relation induced by a TSS is a congruence, provided
                 that it is in {\em ntyft/ntyxt\/}-format and can be
                 proved meaningful using our techniques. We also
                 considerably extend the conservativity theorems of
                 Groote[1993] and Groote and Vaandrager [1992]. As a
                 running example, we study the combined addition of
                 priorities and abstraction to Basic Process Algebra
                 (BPA). Under some reasonable conditions we show that
                 this TSS is indeed meaningful, which could not be shown
                 by other methods [Bloom et al. 1995; Groote 1993].
                 Finally, we provide a sound and complete axiomatization
                 for this example.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf D.3.1}: Software, PROGRAMMING LANGUAGES, Formal
                 Definitions and Theory. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs.
                 {\bf F.3.2}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Semantics of Programming Languages. {\bf
                 I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving.",
}

@Article{Baeza-Yates:1996:FTS,
  author =       "Richardo A. Baeza-Yates and Gaston H. Gonnet",
  title =        "Fast text searching for regular expressions or
                 automaton searching on tries",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "6",
  pages =        "915--936",
  month =        nov,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 27 15:34:59 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/235810.html",
  abstract =     "We present algorithms for efficient searching of
                 regular expressions on preprocessed text, using a
                 Patricia tree as a logical model for the index. We
                 obtain searching algorithms that run in logarithmic
                 expected time in the size of the text for a wide
                 subclass of regular expressions, and in sublinear
                 expected time for any regular expression. This is the
                 first such algorithm to be found with this
                 complexity.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Omlin:1996:CDF,
  author =       "Christian W. Omlin and C. Lee Giles",
  title =        "Constructing deterministic finite-state automata in
                 recurrent neural networks",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "6",
  pages =        "937--972",
  month =        nov,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 27 15:34:59 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/235811.html",
  abstract =     "Recurrent neural networks that are {\em trained\/} to
                 behave like deterministic finite-state automata (DFAs)
                 can show deteriorating performance when tested on long
                 strings. This deteriorating performance can be
                 attributed to the instability of the internal
                 representation of the learned DFA states. The use of a
                 sigmoidal discriminant function together with the
                 recurrent structure contribute to this instability. We
                 prove that a simple algorithm can {\em construct\/}
                 second-order recurrent neural networks with a sparse
                 interconnection topology and sigmoidal discriminant
                 function such that the internal DFA state
                 representations are stable, that is, the constructed
                 network correctly classifies strings of {\em arbitrary
                 length}. The algorithm is based on encoding strengths
                 of weights directly into the neural network. We derive
                 a relationship between the weight strength and the
                 number of DFA states for robust string classification.
                 For a DFA with $n$ state and $m$ input alphabet
                 symbols, the constructive algorithm generates a
                 ``programmed'' neural network with $O(n)$ neurons and
                 $O(m n)$ weights. We compare our algorithm to other
                 methods proposed in the literature.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory; verification",
  subject =      "{\bf B.2.2}: Hardware, ARITHMETIC AND LOGIC
                 STRUCTURES, Performance Analysis and Design Aids,
                 Simulation. {\bf B.2.2}: Hardware, ARITHMETIC AND LOGIC
                 STRUCTURES, Performance Analysis and Design Aids,
                 Verification. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Automata. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
                 Relations among models. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Self-modifying machines. {\bf G.1.0}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, General,
                 Stability (and instability). {\bf G.1.2}: Mathematics
                 of Computing, NUMERICAL ANALYSIS, Approximation,
                 Nonlinear approximation.",
}

@Article{Aggarwal:1996:ERO,
  author =       "Alok Aggarwal and Amotz Bar-Noy and Don Coppersmith
                 and Rajiv Ramaswami and Baruch Schieber and Madhu
                 Sudan",
  title =        "Efficient routing in optical networks",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "6",
  pages =        "973--1001",
  month =        nov,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 27 15:34:59 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/235812.html",
  abstract =     "This paper studies the problem of dedicating routes to
                 connections in optical networks. In optical networks,
                 the vast bandwidth available in an optical fiber is
                 utilized by partitioning it into several channels, each
                 at a different optical wavelength. A connection between
                 two nodes is assigned a specific wavelength, with the
                 constraint that no two connections sharing a link in
                 the network can be assigned the same wavelength. This
                 paper considers optical networks with and without
                 switches, and different types of routing in these
                 networks. It presents optimal or near-optimal
                 constructions of optical networks in these cases and
                 algorithms for routing connections, specifically
                 permutation routing for the networks constructed
                 here.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics. {\bf
                 G.2.2}: Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory.",
}

@Article{Basu:1996:CAC,
  author =       "Saugata Basu and Marie-Fran{\c{c}}oise Roy",
  title =        "On the combinatorial and algebraic complexity of
                 quantifier elimination",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "6",
  pages =        "1002--1045",
  month =        nov,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 27 15:34:59 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/235813.html",
  abstract =     "In this paper, a new algorithm for performing
                 quantifier elimination from first order formulas over
                 real closed fields in given. This algorithm improves
                 the complexity of the asymptotically fastest algorithm
                 for this problem, known to this data. A new feature of
                 this algorithm is that the role of the algebraic part
                 (the dependence on the degrees of the input
                 polynomials) and the combinatorial part (the dependence
                 on the number of polynomials) are separated. Another
                 new feature is that the degrees of the polynomials in
                 the equivalent quantifier-free formula that is output,
                 are independent of the number of input polynomials. As
                 special cases of this algorithm new and improved
                 algorithms for deciding a sentence in the first order
                 theory over real closed fields, and also for solving
                 the existential problem in the first order theory over
                 real closed fields, are obtained.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.4.3}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Formal Languages, Decision
                 problems.",
}

@Article{Sippu:1996:AMS,
  author =       "Seppo Sippu and Eljas Soisalon-Soininen",
  title =        "An analysis of magic sets and related optimization
                 strategies for logic queries",
  journal =      j-J-ACM,
  volume =       "43",
  number =       "6",
  pages =        "1046--1088",
  month =        nov,
  year =         "1996",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 27 15:34:59 MST 1996",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/jacm/235814.html",
  abstract =     "We analyze the optimization effect of the ``magic
                 sets'' rewriting technique for datalog queries and
                 present some supplementary or alternative techniques
                 that avoid many shortcomings of the basic technique.
                 Given a magic sets rewritten query, the set of facts
                 generated for the original, nonmagic predicates by the
                 seminaive bottom-up evaluation is characterized
                 precisely. It is shown that---because of the additional
                 magic facts---magic sets processing may result in
                 generating an order of magnitude more facts than the
                 straightforward naive evaluation. A refinement of magic
                 sets in {\em factorized magic sets\/} is defined. These
                 magic sets retain most of the efficiency of original
                 magic sets in regards to the number of nonmagic facts
                 generated and have the property that a linear-time
                 bound with respect to seminaive evaluation is
                 guaranteed in all cases. An alternative technique for
                 magic sets, called {\em envelopes}, which has several
                 desirable properties over magic sets, is introduced.
                 Envelope predicates are never recursive with the
                 original predicates; thus, envelopes can be computed as
                 a preprocessing task. Envelopes also allow the
                 utilization of multiple sideways information passing
                 strategies (sips) for a rule. An envelope-transformed
                 program may be ``readorned'' according to another
                 choice of sips and reoptimized by magic sets (or
                 envelopes), thus making possible an optimization effect
                 that cannot be achieved by magic sets based on a
                 particular choice of sips.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; languages; theory",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Logic programming.",
}

@Article{Miller:1997:SSP,
  author =       "Gary L. Miller and Shang-Hua Teng and William Thurston
                 and Stephen A. Vavasis",
  title =        "Separators for Sphere-Packings and Nearest Neighbor
                 Graphs",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "1",
  pages =        "1--29",
  month =        jan,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:02:36 MDT 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Abiteboul:1997:FLR,
  author =       "Serge Abiteboul and Moshe Y. Vardi and Victor Vianu",
  title =        "Fixpoint Logics, Relational Machines, and
                 Computational Complexity",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "1",
  pages =        "30--56",
  month =        jan,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:02:36 MDT 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Morishita:1997:ACP,
  author =       "Shinichi Morishita",
  title =        "Avoiding {Cartesian} Products for Multiple Joins",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "1",
  pages =        "57--85",
  month =        jan,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:02:36 MDT 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Awerbuch:1997:MCD,
  author =       "Baruch Awerbuch and Leonard J. Schulman",
  title =        "The Maintenance of Common Data in a Distributed
                 System",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "1",
  pages =        "86--103",
  month =        jan,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:02:36 MDT 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Koch:1997:WPE,
  author =       "Richard R. Koch and F. T. Leighton and Bruce M. Maggs
                 and Satish B. Rao and Arnold L. Rosenberg and Eric J.
                 Schwabe",
  title =        "Work-Preserving Emulations of Fixed-Connection
                 Networks",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "1",
  pages =        "104--147",
  month =        jan,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:02:36 MDT 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ishii:1997:OTP,
  author =       "Alexander T. Ishii and Charles E. Leiserson and Marios
                 C. Papaefthymiou",
  title =        "Optimizing Two-Phase, Level-Clocked Circuitry",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "1",
  pages =        "148--199",
  month =        jan,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:02:36 MDT 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bistarelli:1997:SBC,
  author =       "Stefano Bistarelli and Ugo Montanari and Francesca
                 Rossi",
  title =        "Semiring-Based Constraint Satisfaction and
                 Optimization",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "2",
  pages =        "201--236",
  month =        mar,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:14:06 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jiang:1997:THB,
  author =       "Tao Jiang and Joel I. Seiferas and Paul M. B.
                 Vit{\'a}nyi",
  title =        "Two Heads Are Better than Two Tapes",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "2",
  pages =        "237--256",
  month =        mar,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:14:06 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Frandsen:1997:DWP,
  author =       "Gudmund Skovbjerg Frandsen and Peter Bro Miltersen and
                 Sven Skyum",
  title =        "Dynamic Word Problems",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "2",
  pages =        "257--271",
  month =        mar,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:14:06 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{VandenBussche:1997:COC,
  author =       "Jan {Van den Bussche} and Dirk {Van Gucht} and Marc
                 Andries and Marc Gyssens",
  title =        "On the Completeness of Object-Creating Database
                 Transformation Languages",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "2",
  pages =        "272--319",
  month =        mar,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:14:06 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bibel:1997:DTR,
  author =       "W. Bibel and E. Eder",
  title =        "Decomposition of Tautogies into Regular Formulas and
                 Strong Completeness of Connection-Graph Resolution",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "2",
  pages =        "320--344",
  month =        mar,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 28 11:23:54 2001",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Dedicated to J. A. Robinson. See erratum
                 \cite{Siekmann:2001:ECW}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wagner:1997:EUE,
  author =       "Robert A. Wagner",
  title =        "Evaluating Uniform Expressions Within Two Steps of
                 Minimum Parallel Time",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "2",
  pages =        "345--361",
  month =        mar,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jun 26 19:14:06 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Halpern:1997:BEC,
  author =       "Joseph Halpern",
  title =        "On Becoming {Editor-in-Chief} of {JACM}",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "3",
  pages =        "363--365",
  month =        may,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 07:50:52 1997",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Liu:1997:EBA,
  author =       "Zhen Liu and Philippe Nain and Don Towsley",
  title =        "Exponential bounds with applications to call
                 admission",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "3",
  pages =        "366--394",
  month =        may,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 08:00:21 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/1997-44-3/p366-liu/",
  abstract =     "In this paper, we develop a framework for computing
                 upper and lower bounds of an exponential form for a
                 large class of single resource systems with Markov
                 additive inputs. Specifically, the bounds are on
                 quantities such as backlog, queue length, and response
                 time. Explicit or computable expressions for our bounds
                 are given in the context of queuing theory and
                 numerical comparisons with other bounds and exact
                 results are presented. The paper concludes with two
                 applications to admission control in multimedia
                 systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "performance; theory",
  subject =      "{\bf C.2.0} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.4}
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS,
                 Modeling techniques. {\bf I.6.5} Computing
                 Methodologies, SIMULATION AND MODELING, Model
                 Development",
}

@Article{Mohring:1997:MRB,
  author =       "Rolf H. M{\"o}hring and Matthias M{\"u}ller-Hannemann
                 and Karsten Weihe",
  title =        "Mesh refinement via bidirected flows: modeling,
                 complexity, and computational results",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "3",
  pages =        "395--426",
  month =        may,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 08:00:30 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/1997-44-3/p395-hohring/",
  abstract =     "We investigate a problem arising in the computer-aided
                 design of cars, planes, ships, trains, and other motor
                 vehicles and machines: refine a mesh of curved
                 polygons, which approximates the surface of a
                 workpiece, into quadrilaterals so that the resulting
                 mesh is suitable for a numerical analysis. This mesh
                 refinement problem turns out to be strongly {\em
                 NP\/}-hard In commercial CAD systems, this problem is
                 usually solved using a gree dy approach. However, these
                 algorithms leave the user a lot of patchwork to do
                 afterwards. We introduce a new global approach, which
                 is based on network flow techniques. Abstracting from
                 all geometric and numerical aspects, we obtain an
                 undirected graph with upper and lower capacities on the
                 edges and some additional node constraints. We reduce
                 this problem to a sequence of bidirected flwo problems
                 (or, equivalently, to $b$-matching problems). For the
                 first time, network flow techniques are applied to a
                 mesh refinement problem. This approach avoids the local
                 traps of greedy approaches and yields solutions that
                 require significantly less additional patchwork.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; experimentation",
  subject =      "{\bf G.2.2} Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 G.2.2} Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Graph algorithms. {\bf J.6} Computer
                 Applications, COMPUTER-AIDED ENGINEERING,
                 Computer-aided design (CAD). {\bf F.2.2} Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures",
}

@Article{Cesa-Bianchi:1997:HUE,
  author =       "Nicol{\`o} Cesa-Bianchi and Yoav Freund and David
                 Haussler and David P. Helmbold and Robert E. Schapire
                 and Manfred K. Warmuth",
  title =        "How to use expert advice",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "3",
  pages =        "427--485",
  month =        may,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 08:00:35 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/1997-44-3/p427-cesa-bianchi/",
  abstract =     "We analyze algorithms that predict a binary value by
                 combining the predictions of several prediction
                 strategies, called {\em experts}. Our analysis is for
                 worst-case situations, i.e., we make no assumptions
                 about the way the sequence of bits to be predicted is
                 generated. We measure the performance of the algorithm
                 by the difference between the expected number of
                 mistakes it makes on the bit sequence and the expected
                 number of mistakes made by the best expert on this
                 sequence, where the expectation is taken with respect
                 to the randomization in the predictions. We show that
                 the minimum achievable difference is on the order of
                 the square root of the number of mistakes of the best
                 expert, and we give efficient algorithms that achieve
                 this. Our upper and lower bounds have matching leading
                 constants in most cases. We then show how this leads to
                 certain kinds of pattern recognition/learning
                 algorithms with performance bounds that improve on the
                 best results currently know in this context. We also
                 compare our analysis to the case in which log loss is
                 used instead of the expected number of mistakes",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf I.2.2} Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Automatic Programming, Automatic analysis
                 of algorithms. {\bf I.2.1} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Applications and Expert
                 Systems. {\bf I.2.6} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Learning, Knowledge
                 acquisition",
}

@Article{Aspnes:1997:LRV,
  author =       "James Aspnes and Yossi Azar and Amos Fiat and Serge
                 Plotkin and Orli Waarts",
  title =        "On-line routing of virtual circuits with applications
                 to load balancing and machine scheduling",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "3",
  pages =        "486--504",
  month =        may,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 08:00:39 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/1997-44-3/p486-aspnes/",
  abstract =     "In this paper we study the problem of on-line
                 allocation of routes to virtual circuits (both {\em
                 point-to-point\/} and {\em multicast\/}) where the goal
                 is to route all requests while minimizing the required
                 bandwidth. We concentrate on the case of {\em
                 Permanent\/} virtual circuits (i.e., once a circuit is
                 established it exists forever), and describe an
                 algorithm that achieves on $O(\log n)$ competitive
                 ratio with respect to maximum congestion, where $n$ is
                 the number of nodes in the network. Informally, our
                 results show that instead of knowing all of the future
                 requests, it is sufficient to increase the bandwidth of
                 the communication links by an $O(\log n)$ factor. We
                 also show that this result is tight, that is, for any
                 on-line algorithm there exists a scenario in which
                 $O(\log n)$ increase in bandwidth is necessary in
                 directed networks. We view virtual circuit routing as a
                 generalization of an on-line load balancing problem,
                 defined as follows: jobs arrive on line and each job
                 must be assigned to one of the machines immediately
                 upon arrival. Assigning a job to a machine increases
                 the machine's load by an amount that depends both on
                 the job and on the machine. The goal is to minimize the
                 maximum load. For the {\em related machines\/} case, we
                 describe the first algorithm that achieves constant
                 competitive ratio. for the {\em unrelated\/} case (with
                 $n$ machines), we describe a new method that yields
                 $O(\log n)$-competitive algorithm. This stands in
                 contrast to the natural greed approach, whose
                 competitive ratio is exactly $n$. show that this result
                 is tight, that is, for any on-line algorithm there
                 exists a scenario in which $(\log n)$ increase in
                 bandwidth is necessary in directed networks.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Routing and layout. {\bf
                 C.2.1} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design",
}

@Article{Sekar:1997:PLS,
  author =       "R. Sekar and I. V. Ramakrishnan and P. Mishra",
  title =        "On the power and limitations of strictness analysis",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "3",
  pages =        "505--525",
  month =        may,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 09 08:00:47 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/1997-44-3/p505-sekar/",
  abstract =     "Strictness analysis is an important technique for
                 optimization of lazy functional languages. It is well
                 known that all strictness analysis methods are {\em
                 incomplete}, i.e., fail to report some strictness
                 properties. In this paper, we provide a precise and
                 formal characterization of the loss of information that
                 leads to this incompleteness. Specifically, we
                 establish the following characterization theorem for
                 Mycroft's strictness analysis method and a
                 generalization of this method, called {\em
                 ee-analysis}, that reasons about exhaustive evaluation
                 in nonflat domains: {\em Mycroft's method will deduce a
                 strictness property for program $P$ iff the property is
                 independent of any constant appearing in any evaluation
                 of $P$.\/} To prove this, we specify a small set of
                 equations, called {\em E-axioms}, that capture the
                 information loss in Mycroft's method and develop a new
                 proof technique called {\em E-rewriting}. $E$-rewriting
                 extends the standard notion of rewriting to permit the
                 use of reductions using $E$-axioms interspersed with
                 standard reduction steps. $E$-axioms are a syntactic
                 characterization of information loss and $E$-rewriting
                 provides and {\em algorithm-independent\/} proof
                 technique for characterizing the power of analysis
                 methods. It can be used to answer questions on
                 completeness and incompleteness of Mycroft's method on
                 certain natural classes of programs. Finally, the
                 techniques developed in this paper provide a general
                 principle for establishing similar results for other
                 analysis methods such as those based on abstract
                 interpretation. As a demonstration of the generality of
                 our technique, we give a characterization theorem for
                 another variation of Mycroft's method called {\em
                 dd\/}-analysis.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; measurement; theory",
  subject =      "{\bf D.3.4} Software, PROGRAMMING LANGUAGES,
                 Processors, Optimization. {\bf D.3.1} Software,
                 PROGRAMMING LANGUAGES, Formal Definitions and Theory.
                 {\bf D.3.2} Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Applicative languages. {\bf D.3.4}
                 Software, PROGRAMMING LANGUAGES, Processors,
                 Compilers",
}

@Article{Jeavons:1997:CPC,
  author =       "Peter Jeavons and David Cohen and Marc Gyssens",
  title =        "Closure properties of constraints",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "4",
  pages =        "527--548",
  month =        jul,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 26 06:43:32 MST 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-4/p527-jeavons/",
  abstract =     "Many combinatorial search problems can be expressed as
                 ``constraint satisfaction problems'' and this class of
                 problems is known to be NP-complete in general. In this
                 paper, we investigate the subclasses that arise from
                 restricting the possible constraint types. We first
                 show that any set of constraints that does not give
                 rise to an NP-complete class of problems must satisfy a
                 certain type of algebraic closure condition. We then
                 investigate all the different possible forms of this
                 algebraic closure property, and establish which of
                 these are sufficient to ensure tractability. As
                 examples, we show that all known classes of tractable
                 constraints over finite domains can be characterized by
                 such an algebraic closure property. Finally, we
                 describe a simple computational procedure that can be
                 used to determine the closure properties of a given set
                 of constraints. This procedure involves solving a
                 particular constraint satisfaction problem, which we
                 call an ``indicator problem.''",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; languages; theory; verification",
  subject =      "{\bf F.1.3} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Measures and Classes,
                 Reducibility and completeness. {\bf F.2.2} Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Complexity of proof procedures. {\bf F.4.1} Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic. {\bf G.2.1} Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics.",
}

@Article{vanBeek:1997:CTL,
  author =       "Peter {van Beek} and Rina Dechter",
  title =        "Constraint tightness and looseness versus local and
                 global consistency",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "4",
  pages =        "549--566",
  month =        jul,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 12 19:07:56 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See erratum \cite{Zhang:2003:EPV}.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-4/p549-van_beek/",
  abstract =     "Constraint networks are a simple representation and
                 reasoning framework with diverse applications. In this
                 paper, we identify two new complementary properties on
                 the restrictiveness of the constraints in a
                 network---{\em constraint tightness\/} and {\em
                 constraint looseness\/}---and we show their usefulness
                 for estimating the level of local consistency needed to
                 ensure global consistency, and for estimating the level
                 of local consistency present in a network. In
                 particular, we present a sufficient condition, based on
                 constraint tightness and the level of local
                 consistency, that guarantees that a solution can be
                 found in a backtrack-free manner. The condition can be
                 useful in applications where a knowledge base will be
                 queried over and over and the preprocessing costs can
                 be amortized over many queries. We also present a
                 sufficient condition for local consistency, based on
                 constraint looseness, that is straightforward and
                 inexpensive to determine. The condition can be used to
                 estimate the level of local consistency of a network.
                 This in turn can be used in deciding whether it would
                 be useful to preprocess the network before a
                 backtracking search, and in deciding which local
                 consistency conditions, if any, still need to be
                 enforced if we want to ensure that a solution can be
                 found in a backtrack-free manner. Two definitions of
                 local consistency are employed in characterizing the
                 conditions: the traditional variable-based notion and a
                 recently introduced definition of local consistency
                 called {\em relational consistency}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.1} Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Permutations and
                 combinations. {\bf I.2.4} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Knowledge Representation
                 Formalisms and Methods, Relation systems.",
}

@Article{Agarwal:1997:ASP,
  author =       "Pankaj K. Agarwal and Sariel Har-Peled and Micha
                 Sharir and Kasturi R. Varadarajan",
  title =        "Approximating shortest paths on a convex polytope in
                 three dimensions",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "4",
  pages =        "567--584",
  month =        jul,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 26 06:43:32 MST 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-4/p567-agarwal/",
  abstract =     "Given a convex polytope $P$ with $n$ faces in $R^3$,
                 points $s,t \in \partial P$, and a parameter
                 $0<\epsilon\le1$, we present an algorithm that
                 constructs a path on $\partial P$ from $s$ to $t$ whose
                 length is at most $(1+\epsilon)d_P(s,t)$, where
                 $d_P(s,t)$ is the length of the shortest path between
                 $s$ and $t$ on $\partial P$. The algorithm runs in
                 $O(n\log1/\epsilon + 1/\epsilon^3)$ time, and is
                 relatively simple. The running time is
                 $O(n+1/\epsilon^3)$ if we only want the approximate
                 shortest path distance and not the path itself. We also
                 present an extension of the algorithm that computes
                 approximate shortest path distances from a given source
                 point on $\partial P$ to all vertices of $P$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations.",
}

@Article{Stoer:1997:SMC,
  author =       "Mechthild Stoer and Frank Wagner",
  title =        "A simple min-cut algorithm",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "4",
  pages =        "585--591",
  month =        jul,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 26 06:43:32 MST 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-4/p585-stoer/",
  abstract =     "We present an algorithm for finding the minimum cut of
                 an undirected edge-weighted graph. It is simple in
                 every respect. It has a short and compact description,
                 is easy to implement, and has a surprisingly simple
                 proof of correctness. Its runtime matches that of the
                 fastest algorithm known. The runtime analysis is
                 straightforward. In contrast to nearly all approaches
                 so far, the algorithm uses no flow techniques. Roughly
                 speaking, the algorithm consists of about $|V|$ nearly
                 identical phases each of which is a {\em maximum
                 adjacency search}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf G.2.2} Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms.",
}

@Article{Jayanti:1997:RWF,
  author =       "Prasad Jayanti",
  title =        "Robust wait-free hierarchies",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "4",
  pages =        "592--614",
  month =        jul,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 26 06:43:32 MST 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-4/p592-jayanti/",
  abstract =     "The problem of implementing a shared object of one
                 type from shared objects of other types has been
                 extensively researched. Recent focus has mostly been on
                 {\em wait-free implementations}, which permit every
                 process to complete its operations on implemented
                 objects, regardless of the speeds of other processes.
                 It is known that shared objects of different types have
                 differing abilities to support wait-free
                 implementations. It is therefore natural to want to
                 arrange types in a hierarchy that reflects their
                 relative abilities to support wait-free
                 implementations. In this paper, we formally define
                 robustness and other desirable properties of
                 hierarchies. Roughly speaking, a hierarchy is robust if
                 each type is ``stronger'' than any combination of lower
                 level types. We study two specific hierarchies: one,
                 that we call {\em hrm\/} in which the level of a type
                 is based on the ability of an {\em unbounded\/} number
                 of objects of that type, and another hierarchy, that we
                 call {\em hr1}, in which a type's level is based on the
                 ability of a {\em fixed\/} number of objects of that
                 type. We prove that resource bounded hierarchies, such
                 as {\em hr1\/} and its variants, are not robust. We
                 also establish the unique importance of {\em hrm\/}:
                 every nontrivial robust hierarchy, if one exists, is
                 necessarily a ``coarsening'' of {\em hrm}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; reliability; theory",
  subject =      "{\bf B.3.2} Hardware, MEMORY STRUCTURES, Design
                 Styles, Virtual memory. {\bf B.4.3} Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Interconnections
                 (Subsystems), Asynchronous/synchronous operation. {\bf
                 C.1.2} Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Multiple-instruction-stream,
                 multiple-data-stream processors (MIMD). {\bf D.1.3}
                 Software, PROGRAMMING TECHNIQUES, Concurrent
                 Programming. {\bf D.3.3} Software, PROGRAMMING
                 LANGUAGES, Language Constructs and Features, Abstract
                 data types. {\bf D.3.3} Software, PROGRAMMING
                 LANGUAGES, Language Constructs and Features, Concurrent
                 programming structures. {\bf D.4.1} Software, OPERATING
                 SYSTEMS, Process Management, Concurrency. {\bf D.4.1}
                 Software, OPERATING SYSTEMS, Process Management,
                 Multiprocessing/multiprogramming/multitasking. {\bf
                 D.4.7} Software, OPERATING SYSTEMS, Organization and
                 Design, Distributed systems. {\bf D.4.1} Software,
                 OPERATING SYSTEMS, Process Management, Synchronization.
                 {\bf D.4.1} Software, OPERATING SYSTEMS, Process
                 Management, Synchronization.",
}

@Article{Alon:1997:SSD,
  author =       "Noga Alon and Shai Ben-David and Nicol{\`o}
                 Cesa-Bianchi and David Haussler",
  title =        "Scale-sensitive dimensions, uniform convergence, and
                 learnability",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "4",
  pages =        "615--631",
  month =        jul,
  year =         "1997",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/263867.263927",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 26 06:43:32 MST 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-4/p615-alon/",
  abstract =     "Learnability in Valiant's PAC learning model has been
                 shown to be strongly related to the existence of
                 uniform laws of large numbers. These laws define a
                 distribution-free convergence property of means to
                 expectations uniformly over classes of random
                 variables. Classes of real-valued functions enjoying
                 such a property are also known as uniform
                 Glivenko--Cantelli classes. In this paper, we prove,
                 through a generalization of Sauer's lemma that may be
                 interesting in its own right, a new characterization of
                 uniform Glivenko-Cantelli classes. Our characterization
                 yields Dudley, Gin{\'e}, and Zinn's previous
                 characterization as a corollary. Furthermore, it is the
                 first based on a Gin{\'e}, and Zinn's previous
                 characterization as a corollary. Furthermore, it is the
                 first based on a simple combinatorial quantity
                 generalizing the Vapnik--Chervonenkis dimension. We
                 apply this result to obtain the weakest combinatorial
                 condition known to imply PAC learnability in the
                 statistical regression (or ``agnostic'') framework.
                 Furthermore, we find a characterization of learnability
                 in the probabilistic concept model, solving an open
                 problem posed by Kearns and Schapire. These results
                 show that the accuracy parameter plays a crucial role
                 in determining the effective complexity of the
                 learner's hypothesis class.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf I.2.6} Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Concept learning.",
}

@Article{Brafman:1997:ALK,
  author =       "Ronen I. Brafman and Jean-Claude Latombe and Yoram
                 Moses and Yoav Shoham",
  title =        "Applications of a logic of knowledge to motion
                 planning under uncertainty",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "5",
  pages =        "633--668",
  month =        sep,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 30 06:06:57 MST 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-5/p633-brafman/",
  abstract =     "Inspired by the success of the distributed computing
                 community in apply logics of knowledge and time to
                 reasoning about distributed protocols, we aim for a
                 similarly powerful and high-level abstraction when
                 reasoning about control problems involving uncertainty.
                 This paper concentrates on robot motion planning with
                 uncertainty in both control and sensing, a problem that
                 has already been well studied within the robotics
                 community. First, a new and natural problem in this
                 domain is defined: does there exists a sound and
                 complete termination condition for a motion, given
                 initial and goal locations? If yes, how to construct
                 it? Then we define a high-level language, a logic of
                 time and knowledge, which we use to reason about
                 termination conditions and to state general conditions
                 for the existence of sound and complete termination
                 conditions in a broad domain. Finally, we show that
                 sound termination conditions that are optimal in a
                 precise sense provide a natural example of
                 knowledge-based programs with multiple
                 implementations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "design; theory",
  subject =      "{\bf I.2.9} Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Robotics. {\bf I.2.4} Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Knowledge
                 Representation Formalisms and Methods. {\bf F.3.1}
                 Theory of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about
                 Programs.",
}

@Article{Estein:1997:STS,
  author =       "David Estein and Zvi Galil and Giusee F. Italiano and
                 Amnon Nissenzweig",
  title =        "Sparsification --- a technique for speeding up dynamic
                 graph algorithms",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "5",
  pages =        "669--696",
  month =        sep,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 30 06:06:57 MST 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-5/p669-eppstein/",
  abstract =     "We provide data structures that maintain a graph as
                 edges are inserted and deleted, and keep track of the
                 following properties with the following times: minimum
                 spanning forests, graph connectivity, graph 2-edge
                 connectivity, and bipartiteness in time $O(n^{1/2})$
                 per change; 3-edge connectivity, in time $O(n^{2/3})$
                 per change; 4-edge connectivity, in time
                 $O(n\alpha(n))$ per change; $k$-edge connectivity for
                 constant $k$, in time $O(n\log n)$ per change;2-vertex
                 connectivity, and 3-vertex connectivity, in the $O(n)$
                 per change; and 4-vertex connectivity, in time
                 $O(n\alpha(n))$ per change. Further results speed up
                 the insertion times to match the bounds of known
                 partially dynamic algorithms.\par

                 All our algorithms are based on a new technique that
                 transforms an algorithm for sparse graphs into one that
                 will work on any graph, which we call {\em
                 sparsification}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.2} Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory.",
}

@Article{Khardon:1997:LR,
  author =       "Roni Khardon and Dan Roth",
  title =        "Learning to reason",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "5",
  pages =        "697--725",
  month =        sep,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 30 06:06:57 MST 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-5/p697-khardon/",
  abstract =     "We introduce a new framework for the study of
                 reasoning. The Learning (in order) to Reason approach
                 developed here views learning as an integral part of
                 the inference process, and suggests that learning and
                 reasoning should be studied together.\par

                 The Learning to Reason framework combines the
                 interfaces to the world used by known learning models
                 with the reasoning task and a performance criterion
                 suitable for it. In this framework, the intelligent
                 agent is given access to its favorite learning
                 interface, and is also given a grace period in with it
                 can interact with this interface and construct a
                 representation KB of the world $W$. The reasoning
                 performance is measured only after this period, when
                 the agent is presented with queries [alpha] from some
                 query language, relevant to the world, and has to
                 answer whether $W$ implies $\alpha$.\par

                 The approach is meant to overcome the main
                 computational difficulties in the traditional treatment
                 of reasoning which stem from its separation from the
                 ``world''. Since the agent interacts with the world
                 when construction its knowledge representation it can
                 choose a representation that is useful for the task at
                 hand. Moreover, we can now make explicit the dependence
                 of the reasoning performance on the environment the
                 agent interacts with.\par

                 We show how previous results from learning theory and
                 reasoning fit into this framework and illustrate the
                 usefulness of the Learning to Reason approach by
                 exhibiting new results that are not possible in the
                 traditional setting. First, we give Learning to Reason
                 algorithms for classes of propositional languages for
                 which there are no efficient reasoning algorithms, when
                 represented as a traditional (formula-based) knowledge
                 base. Second, we exhibit a Learning to Reason algorithm
                 for a class of propositional languages that is not know
                 to be learnable in the traditional sense.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf I.2.3} Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Deduction.
                 {\bf I.2.4} Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods. {\bf I.2.6} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Learning, Knowledge
                 acquisition.",
}

@Article{Borodini:1997:HMC,
  author =       "Allan Borodini and Prabhakar Raghavan and Baruch
                 Schieber and Eli Upfal",
  title =        "How much can hardware help routing?",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "5",
  pages =        "726--741",
  month =        sep,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 30 06:06:57 MST 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-5/p726-borodini/",
  abstract =     "We study the extent to which complex hardware can
                 speed up routing. Specifically, we consider the
                 following questions. How much does adaptive routing
                 improve over oblivious routing? How much does
                 randomness help? How does it help if each node can have
                 a large number of neighbors? What benefit is available
                 if a node can send packets to several neighbors within
                 a single time step? Some of these features require
                 complex networking hardware, and it is thus important
                 to investigate whether the performance justifies the
                 investment. By varying these hardware parameters, we
                 obtain a hierarchy of time bounds for worst-case
                 permutation routing.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf C.2.1} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design. {\bf F.2.2} Theory of Computation, ANALYSIS
                 OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.3} Mathematics of
                 Computing, PROBABILITY AND STATISTICS.",
}

@Article{Spencer:1997:TWT,
  author =       "Thomas H. Spencer",
  title =        "Time-work tradeoffs for parallel algorithms",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "5",
  pages =        "742--778",
  month =        sep,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 30 06:06:57 MST 1997",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-5/p742-spencer/",
  abstract =     "Some parallel algorithms have the property that, as
                 they are allowed to take more time, the total work that
                 they do is reduced. This paper describes several
                 algorithms with this property. These algorithms solve
                 important problems on directed graphs, including
                 breadth-first search, topological sort, strong
                 connectivity, and the single source shortest path
                 problem. All of the algorithms run on the EREW PRAM
                 model of parallel computer, except the algorithm for
                 strong connectivity, which runs on the probabilistic
                 EREW PRAM.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.2} Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Graph algorithms.",
}

@Article{Dwork:1997:CSM,
  author =       "Cynthia Dwork and Maurice Herlihy and Orli Waarts",
  title =        "Contention in shared memory algorithms",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "6",
  pages =        "779--805",
  month =        nov,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Feb 13 15:58:32 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-6/p779-dwork/",
  abstract =     "Most complexity measures for concurrent algorithms for
                 asynchronous shared-memory architectures focus on
                 process steps and memory consumption. In practice,
                 however, performance of multiprocessor algorithms is
                 heavily influenced by {\em contention}, the extent to
                 which processes access the same location at the same
                 time. Nevertheless, even though contention is one of
                 the principal considerations affecting the performance
                 of real algorithms on real multiprocessors, there are
                 no formal tools for analyzing the contention of
                 asynchronous shared-memory algorithms. This paper
                 introduces the first formal complexity model for
                 contention in shared-memory multiprocessors. We focus
                 on the standard multiprocessor architecture in which
                 $n$ asynchronous processes communicate by applying {\em
                 read, write,\/} and {\em read-modify-write\/}
                 operations to a shared memory. To illustrate the
                 utility of our model, we use it to derive two kinds of
                 results: (1) lower bounds on contention for well-known
                 basic problems such as agreement and mutual exclusion,
                 and (2) trade-offs between the length of the critical
                 path (maximal number of accesses to shared variables
                 performed by a single process in executing the
                 algorithm) and contention for these algorithms.
                 Furthermore, we give the first formal contention
                 analysis of a variety of counting networks, a class of
                 concurrent data structures implementing shared
                 counters. Experiments indicate that certain counting
                 networks outperform conventional single-variable
                 counters at high levels of contention. Our analysis
                 provides the first formal model explaining this
                 phenomenon.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.3} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Measures and Classes,
                 Relations among complexity measures. {\bf C.1.2}
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors).
                 {\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems.",
}

@Article{Hemaspaandra:1997:EAD,
  author =       "Edith Hemaspaandra and Lane A. Hemaspaandra and
                 J{\"o}rg Rothe",
  title =        "Exact analysis of {Dodgson} elections: {Lewis
                 Carroll}'s 1876 voting system is complete for parallel
                 access to {NP}",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "6",
  pages =        "806--825",
  month =        nov,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Feb 13 15:58:32 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-6/p806-hemaspaandra/",
  abstract =     "In 1876, Lewis Carroll proposed a voting system in
                 which the winner is the candidate who with the fewest
                 changes in voters' preferences becomes a Condorcet
                 winner---a candidate who beats all other candidates in
                 pairwise majority-rule electrons. Bartholdi, Tovey, and
                 Trick provided a lower bound---NP-hardness---on the
                 computational complexity of determining the election
                 winner in Carroll's system. We provide a stronger lower
                 bound and an upper bound that matches our lower bound.
                 In particular, determining the winner in Carroll's
                 system is complete for parallel access to NP, that is,
                 it is complete for [Theta];2$p$ for which it becomes
                 the most natural complete problem known. It follows
                 that determining the winner in Carroll's elections is
                 not NP-complete unless the polynomial hierarchy
                 collapses.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf F.1.3} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Measures and Classes. {\bf
                 F.2.2} Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems. {\bf J.4} Computer Applications, SOCIAL AND
                 BEHAVIORAL SCIENCES.",
}

@Article{Wasserman:1997:SRR,
  author =       "Hal Wasserman and Manuel Blum",
  title =        "Software reliability via run-time result-checking",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "6",
  pages =        "826--849",
  month =        nov,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Feb 13 15:58:32 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-6/p826-wasserman/",
  abstract =     "We review the field of result-checking, discussing
                 simple checkers and self-correctors. We argue that such
                 checkers could profitably be incorporated in software
                 as an aid to efficient debugging and enhanced
                 reliability. We consider how to modify traditional
                 checking methodologies to make them more appropriate
                 for use in real-time, real-number computer systems. In
                 particular, we suggest that checkers should be allowed
                 to use stored randomness: that is, that they should be
                 allowed to generate, preprocess, and store random bits
                 prior to run-time, and then to use this information
                 repeatedly in a series of run-time checks. In a case
                 study of checking a general real-number linear
                 transformation (e.g., a Fourier Transform), we present
                 a simple checker which uses stored randomness, and a
                 self-corrector which is particularly efficient if
                 stored randomness is employed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; reliability; verification",
  subject =      "{\bf D.2.5} Software, SOFTWARE ENGINEERING, Testing
                 and Debugging. {\bf F.2.1} Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Numerical Algorithms and Problems, Computation of
                 transforms. {\bf F.3.1} Theory of Computation, LOGICS
                 AND MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs.",
}

@Article{Broy:1997:CRI,
  author =       "Manfred Broy",
  title =        "Compositional refinement of interactive systems",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "6",
  pages =        "850--891",
  month =        nov,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Feb 13 15:58:32 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-6/p850-broy/",
  abstract =     "We introduce a method to describe systems and their
                 components by functional specification techniques. We
                 define notions of interface and interaction refinement
                 for interactive systems and their components. These
                 notions of refinement allow us to change both the
                 syntactic (the number of channels and sorts of messages
                 at the channels) and the semantic interface (causality
                 flow between messages and interaction granularity) of
                 an interactive system component. We prove that these
                 notions of refinement are compositional with respect to
                 sequential and parallel composition of system
                 components, communication feedback and recursive
                 declarations of system components. According to these
                 proofs, refinements of networks can be accomplished in
                 a modular way by refining their components. We
                 generalize the notions of refinement to refining
                 contexts. Finally, full abstraction for specifications
                 is defined, and compositionality with respect to this
                 abstraction is shown, too.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "design; verification",
  subject =      "{\bf C.1.4} Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Parallel Architectures, Distributed
                 architectures. {\bf D.1.4} Software, PROGRAMMING
                 TECHNIQUES, Sequential Programming. {\bf D.2.1}
                 Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications, Methodologies (e.g.,
                 object-oriented, structured). {\bf D.2.10} Software,
                 SOFTWARE ENGINEERING, Design, Methodologies. {\bf
                 F.3.1} Theory of Computation, LOGICS AND MEANINGS OF
                 PROGRAMS, Specifying and Verifying and Reasoning about
                 Programs, Specification techniques.",
}

@Article{Anonymous:1997:AI,
  author =       "Anonymous",
  title =        "Author Index",
  journal =      j-J-ACM,
  volume =       "44",
  number =       "6",
  pages =        "892--892",
  month =        nov,
  year =         "1997",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Feb 13 15:58:32 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1997-44-6/p892-author_index/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Benedikt:1998:REP,
  author =       "Michael Benedikt and Guozhu Dong and Leonid Libkin and
                 Limsoon Wong",
  title =        "Relational expressive power of constraint query
                 languages",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "1",
  pages =        "1--34",
  month =        jan,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 10 17:54:32 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-1/p1-benedikt/",
  abstract =     "The expressive power of first-order query languages
                 with several classes of equality and inequality
                 constraints is studied in this paper. We settle the
                 conjecture that recursive queries such as parity test
                 and transitive closure cannot be expressed in the
                 relational calculus augmented with polynomial
                 inequality constraints over the reals. Furthermore,
                 noting that relational queries exhibit several forms of
                 genericity, we establish a number of collapse results
                 of the following form: The class of generic Boolean
                 queries expressible in the relational calculus
                 augmented with a given class of constraints coincides
                 with the class of queries expressible in the relational
                 calculus (with or without an order relation). We prove
                 such results for both the natural and active-domain
                 semantics. As a consequence, the relational calculus
                 augmented with polynomial inequalities expresses the
                 same classes of generic Boolean queries under both the
                 natural and active-domain semantics. In the course of
                 proving these results for the active-domain semantics,
                 we establish Ramsey-type theorems saying that any query
                 involving certain kinds of constraints coincides with a
                 constraint-free query on databases whose elements come
                 from a certain infinite subset of the domain. To prove
                 the collapse results for the natural semantics, we make
                 use of techniques from nonstandard analysis and from
                 the model theory of ordered structures.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf F.4.1} Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Model theory.
                 {\bf H.2.3} Information Systems, DATABASE MANAGEMENT,
                 Languages, Query languages.",
}

@Article{Fekete:1998:ISC,
  author =       "Alan Fekete and M. Frans Kaashoek and Nancy Lynch",
  title =        "Implementing sequentially consistent shared objects
                 using broadcast and point-to-point communication",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "1",
  pages =        "35--69",
  month =        jan,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 10 17:54:32 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-1/p35-fekete/",
  abstract =     "This paper presents and proves correct a distributed
                 algorithm that implements a sequentially consistent
                 collection of shared read/update objects. This
                 algorithm is a generalization of one used in the Orca
                 shared object system. The algorithm caches objects in
                 the local memory of processors according to application
                 needs; each read operation accesses a single copy of
                 the objects, while each update accesses all copies. The
                 algorithm uses broadcast communication when it sends
                 messages to replicated copies of an object, and it uses
                 point-to-point communication when a message is sent to
                 a single copy, and when a reply is returned. Copies of
                 all objects are kept consistent using a strategy based
                 on sequence numbers for broadcasts. The algorithm is
                 presented in two layers. The lower layer uses the given
                 broadcast and point-to-point communication services,
                 plus sequence numbers, to provide a new communication
                 service called a {\em context multicast channel}. The
                 higher layer uses a context multicast channel to manage
                 the object replication in a consistent fashion. Both
                 layers and their combination are described and verified
                 formally, using the I/O automation model for
                 asynchronous concurrent systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; verification",
  subject =      "{\bf C.2.2} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf C.2.4} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Network operating systems. {\bf D.4.7} Software,
                 OPERATING SYSTEMS, Organization and Design. {\bf F.3.1}
                 Theory of Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about
                 Programs.",
}

@Article{Arora:1998:PCP,
  author =       "Sanjeev Arora and Shmuel Safra",
  title =        "Probabilistic checking of proofs: a new
                 characterization of {NP}",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "1",
  pages =        "70--122",
  month =        jan,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 10 17:54:32 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-1/p70-arora/",
  abstract =     "We give a new characterization of NP; the class NP
                 contains exactly those languages $L$ for which
                 membership proofs (a proof that an input $x$ is in $L$)
                 can be verified probabilistically in polynomial time
                 using {\em logarithmic\/} number of random bits and by
                 reading {\em sublogarithmic\/} number of bits from the
                 proof. We discuss implications of this
                 characterization; specifically, we show that
                 approximating Clique and independent Set, even in a
                 very weak sense, is NP-hard.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory; verification",
  subject =      "{\bf F.1.2} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation. {\bf F.1.3}
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Measures and Classes. {\bf F.2.1} Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Numerical Algorithms and Problems. {\bf
                 F.2.2} Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems. {\bf F.4.1} Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic.",
}

@Article{Saks:1998:EDP,
  author =       "Michael Saks and Aravind Srinivasan and Shiyu Zhou",
  title =        "Explicit {OR-dispersers} with polylogarithmic degree",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "1",
  pages =        "123--154",
  month =        jan,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 10 17:54:32 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-1/p123-saks/",
  abstract =     "An $(N, M, T)$-OR-disperser is a bipartite multigraph
                 $G = (V, W, E)$ with $|V| = N$, and $|W| = M$, having
                 the following expansion property: any subset of $V$
                 having at least $T$ vertices has a neighbor set of size
                 at least $M/2$. For any pair of constants $\chi$,
                 $\lambda$, $1 \geq \lambda \geq 0$, any sufficiently
                 large $N$, and for any $T \geq 2(\log N) \chi$, we give
                 an explicit elementary construction of an $(N, M,
                 T)$-OR-disperser such that the out-degree of any vertex
                 in $V$ is at most polylogarithmic in $N$. Using this
                 with known applications of OR-dispersers yields several
                 result. First, our construction implies that the
                 complexity class Strong-RP defined by Sipser, equals
                 RP. Second, for any fixed $n > 0$, we give the first
                 polynomial-time simulation of RP algorithms using the
                 output of any ``$n$-minimally random'' source. For any
                 integral $R > 0$, such a source accepts a single
                 request for an $R$-bit string and generates the string
                 according to a distribution that assigns probability at
                 most $2 - R_n$ to any string. It is minimally random in
                 the sense that any weaker source is insufficient to do
                 a black-box polynomial-time simulation of RP
                 algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.3} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Measures and Classes,
                 Relations among complexity classes. {\bf G.2.1}
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Combinatorial algorithms. {\bf G.3}
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Probabilistic algorithms (including Monte Carlo).",
}

@Article{Sima:1998:TN,
  author =       "Ji{\v{r}}{\'\i} {\v{S}}{\'\i}ma and Ji{\v{r}}{\'\i}
                 Wiedermann",
  title =        "Theory of neuromata",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "1",
  pages =        "155--178",
  month =        jan,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 10 17:54:32 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-1/p155-scaronima/",
  abstract =     "A finite automaton-the so-called neuromation, realized
                 by a finite discrete recurrent neural network, working
                 in parallel computation mode, is considered. Both the
                 size of neuromata (i.e., the number of neurons) and
                 their descriptional complexity (i.e., the number of
                 bits in the neuromaton representation) are studied. It
                 is proved that a constraint time delay of the
                 neuromaton output does not play a role within a
                 polynomial descriptional complexity. It is shown that
                 any regular language given by a regular expression of
                 length $n$ is recognized by a neuromaton with ($n$)
                 neurons. Further, it is proved that this network size
                 is, in the worst case, optimal. On the other hand,
                 generally there is not an equivalent polynomial length
                 regular expression for a given neuromaton. Then, two
                 specialized constructions of neural acceptors of the
                 optimal descriptional complexity ($n$) for a single
                 $n$-bit string recognition are described. They both
                 require $O(n^{1/2})$ neurons and either $O(n)$
                 connections with constant weights or $O(n^{1/2})$ edges
                 with weights of the $O(2)$ size. Furthermore, the
                 concept of Hopfield languages is introduced by means of
                 so-called Hopfield neuromata (i.e., of neural networks
                 with symmetric weights). It is proved that the class of
                 Hopfield languages is strictly contained in the class
                 of regular languages. The necessary and sufficient
                 so-called Hopfield condition stating when a regular
                 language is a Hopfield language, is formulated. A
                 construction of a Hopfield neuromaton is presented for
                 a regular language satisfying the Hopfield condition.
                 The class of Hopfield languages is shown to be closed
                 under union, intersection, concatenation and
                 complement, and it is not closed under iteration.
                 Finally, the problem whether a regular language given
                 by a neuromaton (or by a Hopfield acceptor) is
                 nonempty, is proved to be PSPACE-complete. As a
                 consequence, the same result for a neuromaton
                 equivalence problem is achieved.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf F.1.1} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Automata. {\bf
                 F.1.1} Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Relations between
                 models. {\bf F.1.1} Theory of Computation, COMPUTATION
                 BY ABSTRACT DEVICES, Models of Computation,
                 Self-modifying machines. {\bf F.4.3} Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Formal Languages, Classes defined by grammars or
                 automata. {\bf F.4.3} Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Formal
                 Languages, Classes defined by resource-bounded
                 automata. {\bf F.4.3} Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Formal
                 Languages, Decision problems. {\bf F.4.3} Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Formal Languages, Operations on languages.",
}

@Article{Andreev:1998:NGD,
  author =       "Alexander E. Andreev and Andrea E. F. Clementi and
                 Jos{\'e} D. P. Rolim",
  title =        "A new general derandomization method",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "1",
  pages =        "179--213",
  month =        jan,
  year =         "1998",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/273865.273933",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 10 17:54:32 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-1/p179-andreev/",
  abstract =     "We show that {\em quick hitting set generators\/} can
                 replace {\em quick pseudorandom generators\/} to
                 derandomize any probabilistic {\em two-sided error\/}
                 algorithms. Up to now {\em quick hitting set
                 generators\/} have been known as the general and
                 uniform derandomization method for probabilistic {\em
                 one-sided error\/} algorithms, while {\em quick
                 pseudorandom generators\/} as the generators as the
                 general and uniform method to derandomize probabilistic
                 {\em two-sided error\/} algorithms. Our method is based
                 on a deterministic algorithm that, given a Boolean
                 circuit $C$ and given access to a hitting set
                 generator, constructs a {\em discrepancy\/} set for
                 $C$. The main novelty is that the discrepancy set
                 depends on $C$, so the new derandomization method is
                 not uniform (i.e., not oblivious). The algorithm works
                 in time exponential in $k(p(n))$ where $k(*)$ is the
                 {\em price\/} of the hitting set generator and {\em
                 p(*)\/} is a polynomial function in the size of $C$. We
                 thus prove that if a logarithmic price quick hitting
                 set generator exists then BPP = P.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.3} Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Probabilistic algorithms
                 (including Monte Carlo).",
}

@Article{Fagin:1998:CRA,
  author =       "Ronald Fagin and Joseph Y. Halpern",
  title =        "Corrigendum: {``Reasoning about Knowledge and
                 Probability''}",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "1",
  pages =        "214--214",
  month =        jan,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 10 17:54:32 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Fagin:1994:RAK}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Die:1998:HLU,
  author =       "Xiaotie Die and Tiko Kameda and Christos
                 Papadimitriou",
  title =        "How to learn an unknown environment. {I}: the
                 rectilinear case",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "2",
  pages =        "215--245",
  month =        mar,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat May 16 06:54:28 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-2/p215-die/",
  abstract =     "We consider the problem faced by a robot that must
                 explore and learn an unknown room with obstacles in it.
                 We seek algorithms that achieve a bounded ratio of the
                 worst-case distance traversed in order to see all
                 visible points of the environment (thus creating a
                 map), divided by the optimum distance needed to verify
                 the map, if we had it in the beginning. The situation
                 is complicated by the fact that the latter off-line
                 problem (the problem of optimally verifying a map) is
                 NP-hard. Although we show that there is no such
                 ``competitive'' algorithm for general obstacle courses,
                 we give a competitive algorithm for the case of a
                 polygonal room with a bounded number of obstacles in
                 it. We restrict ourselves to the rectilinear case,
                 where each side of the obstacles and the room is
                 parallel to one of the coordinates, and the robot must
                 also move either parallel or perpendicular to the
                 sides. (In a subsequent paper, we will discuss the
                 extension to polygons of general shapes.) We also
                 discuss the off-line problem for simple rectilinear
                 polygons and find an optimal solution (in the L1
                 metric) in polynomial time, in the case where the entry
                 and the exit are different points.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf I.2.9} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Robotics. {\bf I.2.6}
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Learning. {\bf I.2.10} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Vision and Scene
                 Understanding, Perceptual reasoning.",
}

@Article{Karger:1998:AGC,
  author =       "David Karger and Rajeev Motwani and Madhu Sudan",
  title =        "Approximate graph coloring by semidefinite
                 programming",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "2",
  pages =        "246--265",
  month =        mar,
  year =         "1998",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/274787.274791",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat May 16 06:54:28 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-2/p246-karger/",
  abstract =     "We consider the problem of coloring $k$-colorable
                 graphs with the fewest possible colors. We present a
                 randomized polynomial time algorithm that colors a
                 3-colorable graph on $n$ vertices with
                 $\min\{O(\Delta^{1/3} \log {1/2} \Delta \log n),
                 O(n^{1/4} \log^{1/2} n)\}$ colors where $\Delta$ is the
                 maximum degree of any vertex. Besides giving the best
                 known approximation ratio in terms of $n$, this marks
                 the first nontrivial approximation result as a function
                 of the maximum degree $\Delta$. This result can be
                 generalized to $k$-colorable graphs to obtain a
                 coloring using $\min\{O(\Delta^{1 - 2 / k} \log^{1/2}
                 \Delta \log n), O(n^{1 - 3 / (k + 1)} \log^{1/2} n)\}$
                 colors. Our results are inspired by the recent work of
                 Goemans and Williamson who used an algorithm for {\em
                 semidefinite optimization problems}, which generalize
                 linear programs, to obtain improved approximations for
                 the MAX CUT and MAX 2-SAT problems. An intriguing
                 outcome of our work is a duality relationship
                 established between the value of the optimum solution
                 to our semidefinite program and the Lov{\'a}sz
                 [theta]-function. We show lower bounds on the gap
                 between the optimum solution of our semidefinite
                 program and the actual chromatic number; by duality
                 this also demonstrates interesting new facts about the
                 [theta]-function.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf G.2.2} Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory. {\bf F.2.2} Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems. {\bf
                 G.2.1} Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics.",
}

@Article{Dey:1998:CHG,
  author =       "Tamal K. Dey and Sumanta Guha",
  title =        "Computing homology groups of simplicial complexes in
                 {{\boldmath $R^3$}}",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "2",
  pages =        "266--287",
  month =        mar,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Mar 07 19:40:31 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-2/p266-dey/",
  abstract =     "Recent developments in analyzing molecular structures
                 and representing solid models using simplicial
                 complexes have further enhanced the need for computing
                 structural information about simplicial complexes in
                 {\bf R}3. This paper develops basic techniques required
                 to manipulate and analyze structures of complexes in
                 {\bf R}3. A new approach to analyze simplicial
                 complexes in Euclidean 3-space {\bf R}3 is described.
                 First, methods from topology are used to analyze
                 triangulated 3-manifolds in {\bf R}3. Then, it is shown
                 that these methods can, in fact, be applied to
                 arbitrary simplicial complexes in {\bf R}3 after
                 (simulating) the process of thickening a complex to a
                 3-manifold homotopic to it. As a consequence
                 considerable structural information about the complex
                 can be determined and certain discrete problems solved
                 as well. For example, it is shown how to determine
                 homology groups, as well as concrete representations of
                 their generators, for a given complex in {\bf R}3",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf I.3.5} Computing Methodologies, COMPUTER
                 GRAPHICS, Computational Geometry and Object Modeling.
                 {\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems.",
}

@Article{Martinez:1998:RBS,
  author =       "Conrado Mart{\'\i}nez and Salvador Roura",
  title =        "Randomized binary search trees",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "2",
  pages =        "288--323",
  month =        mar,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat May 16 06:54:28 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-2/p288-martinez/",
  abstract =     "In this paper, we present randomized algorithms over
                 binary search trees such that: (a) the insertion of a
                 set of keys, in any fixed order, into an initially
                 empty tree always produces a random binary search tree;
                 (b) the deletion of any key from a random binary search
                 tree results in a random binary search tree; (c) the
                 random choices made by the algorithms are based upon
                 the sizes of the subtrees of the tree; this implies
                 that we can support accesses by rank without additional
                 storage requirements or modification of the data
                 structures; and (d) the cost of any elementary
                 operation, measured as the number of visited nodes, is
                 the same as the expected cost of its standard
                 deterministic counterpart; hence, all search and update
                 operations have guaranteed expected cost $O(\log n)$,
                 but now irrespective of any assumption on the input
                 distribution.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf E.1} Data, DATA STRUCTURES, Trees. {\bf F.2.0}
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, General.",
}

@Article{MacKenzie:1998:CRP,
  author =       "P. D. MacKenzie and C. G. Plaxton and R. Rajaraman",
  title =        "On contention resolution protocols and associated
                 probabilistic phenomena",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "2",
  pages =        "324--378",
  month =        mar,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat May 16 06:54:28 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-2/p324-mackenzie/",
  abstract =     "Consider an on-line scheduling problem in which a set
                 of abstract processes are competing for the use of a
                 number of resources. Further assume that it is either
                 prohibitively expensive or impossible for any two of
                 the processes to directly communicate with one another.
                 If several processes simultaneously attempt to allocate
                 a particular resource (as may be expected to occur,
                 since the processes cannot easily coordinate their
                 allocations), then none succeed. In such a framework,
                 it is a challenge to design efficient contention
                 resolution protocols. Two recently-proposed approaches
                 to the problem of PRAM emulation give rise to
                 scheduling problems of the above kind. In one approach,
                 the resources (in this case, the shared memory cells)
                 are duplicated and distributed randomly. We analyze a
                 simple and efficient deterministic algorithm for
                 accessing some subset of the duplicated resources. In
                 the other approach, we analyze how quickly we can
                 access the given (nonduplicated) resource using a
                 simple randomized strategy. We obtain precise bounds on
                 the performance of both strategies. We anticipate that
                 our results with find other applications.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf F.1.2} Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency.",
}

@Article{Halpern:1998:TPP,
  author =       "Joseph Y. Halpern",
  title =        "Time to publication: a progress report",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "3",
  pages =        "379--380",
  month =        may,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 11 08:06:49 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-3/p379-halpern/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fernandes:1998:EDV,
  author =       "Paulo Fernandes and Brigitte Plateau and William J.
                 Stewart",
  title =        "Efficient descriptor-vector multiplications in
                 stochastic automata networks",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "3",
  pages =        "381--414",
  month =        may,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 11 08:06:49 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-3/p381-fernandes/",
  abstract =     "This paper examines numerical issues in computing
                 solutions to networks of stochastic automata. It is
                 well-known that when the matrices that represent the
                 automata contain only constant values, the cost of
                 performing the operation basic to all iterative
                 solution methods, that of matrix-vector multiply, is
                 given by \begin{displaymath} \rho_N = \prod_{i=1}^N n_i
                 \times \sum_{i=1}^N n_im \end{displaymath} where $n_i$
                 is the number of states in the $i$th automaton and $N$
                 is the number of automata in the network. We introduce
                 the concept of a generalized tensor product and prove a
                 number of lemmas concerning this product. The result of
                 these lemmas allows us to show that this relatively
                 small number of operations is sufficient in many
                 practical cases of interest in which the automata
                 contain functional and not simply constant transitions.
                 Furthermore, we show how the automata should be ordered
                 to achieve this.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; theory",
  subject =      "{\bf C.4} Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Modeling techniques. {\bf G.1.3}
                 Mathematics of Computing, NUMERICAL ANALYSIS, Numerical
                 Linear Algebra. {\bf G.3} Mathematics of Computing,
                 PROBABILITY AND STATISTICS. {\bf I.6.5} Computing
                 Methodologies, SIMULATION AND MODELING, Model
                 Development.",
}

@Article{Aspnes:1998:LBD,
  author =       "James Aspnes",
  title =        "Lower bounds for distributed coin-flipping and
                 randomized consensus",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "3",
  pages =        "415--450",
  month =        may,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 11 08:06:49 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-3/p415-aspnes/",
  abstract =     "We examine a class of {\em collective coin-flipping
                 games\/} that arises from randomized distributed
                 algorithms with halting failures. In these games, a
                 sequence of {\em local coin flips\/} is generated,
                 which must be combined to form a single {\em global
                 coin flip}. An adversary monitors the game and may
                 attempt to bias its outcome by hiding the result of up
                 to $t$ local coin flips. We show that to guarantee at
                 most constant bias, $\omega(t^2)$ local coins are
                 needed, even if (a) the local coins can have arbitrary
                 distributions and ranges, (b) the adversary is required
                 to decide immediately wheter to hide or reveal each
                 local coin, and (c) the game can detect which local
                 coins have been hidden. If the adversary is permitted
                 to control the outcome of the coin except for cases
                 whose probability is polynomial in $t$,
                 $\omega(t^2/\log^2t)$ local coins are needed. Combining
                 this fact with an extended version of the well-known
                 Fischer-Lynch-Paterson impossibility proof of
                 deterministic consensus, we show that given an adaptive
                 adversary, any $t$-resilient asynchronous consensus
                 protocol requires $\omega(t^2/\log^2t)$ local coin
                 flips in any model that can be simulated
                 deterministically using atomic registers. This gives
                 the first nontrivial lower bound on the total work
                 required by wait-free consensus and is tight to within
                 logarithmic factors.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; reliability; theory",
  subject =      "{\bf B.3.2} Hardware, MEMORY STRUCTURES, Design
                 Styles, Shared memory. {\bf B.4.3} Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Interconnections
                 (Subsystems), Asynchronous/synchronous operation. {\bf
                 D.1.3} Software, PROGRAMMING TECHNIQUES, Concurrent
                 Programming, Distributed programming. {\bf D.4.1}
                 Software, OPERATING SYSTEMS, Process Management,
                 Synchronization. {\bf D.4.7} Software, OPERATING
                 SYSTEMS, Organization and Design, Distributed systems.
                 {\bf F.2.m} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Miscellaneous. {\bf
                 C.1.2} Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Multiple-instruction-stream,
                 multiple-data-stream processors (MIMD). {\bf D.4.1}
                 Software, OPERATING SYSTEMS, Process Management,
                 Concurrency.",
}

@Article{Jayanti:1998:FTW,
  author =       "Prasad Jayanti and Tushar Deepak Chandra and Sam
                 Toueg",
  title =        "Fault-tolerant wait-free shared objects",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "3",
  pages =        "451--500",
  month =        may,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 11 08:06:49 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-3/p451-jayanti/",
  abstract =     "Wait-free implementations of shared objects tolerate
                 the failure of processes, but not the failure of base
                 objects from which they are implemented. We consider
                 the problem of implementing shared objects that
                 tolerate the failure of both processes and base
                 objects.\par

                 We identify two classes of object failures: {\em
                 responsive\/} and {\em nonresponsive}. With responsive
                 failures, a faulty object responds to every operation,
                 but its responses may be incorrect. With nonresponsive
                 failures, a faulty object may also ``hang'' without
                 responding. In each class, we define {\em crash}, {\em
                 omission}, and {\em arbitrary\/} modes of
                 failure.\par

                 We show that all responsive failure modes can be
                 tolerated. More precisely, for all responsive failure
                 modes $\cal F$, object types $T$, and $t \ge 0$, we
                 show how to implement a shared object of type $T$ which
                 is $t$-tolerant for $\cal F$. Such an object remains
                 correct and wait-free even if up to $t$ base objects
                 fail according to $\cal F$. In contrast to responsive
                 failures, we show that even the most benign
                 non-responsive failure mode cannot be tolerated. We
                 also show that randomization can be used to circumvent
                 this impossibility result.\par

                 {\em Graceful degradation\/} is a desirable property of
                 fault-tolerant implementations: the implemented object
                 never fails more severely than the base objects it is
                 derived from, even if all the base objects fail. For
                 several failure modes, we show wheter this property can
                 be achieved, and, if so, how.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arora:1998:PVH,
  author =       "Sanjeev Arora and Carsten Lund and Rajeev Motwani and
                 Madhu Sudan and Mario Szegedy",
  title =        "Proof verification and the hardness of approximation
                 problems",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "3",
  pages =        "501--555",
  month =        may,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 11 08:06:49 MDT 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-3/p501-arora/",
  abstract =     "We show that every language in NP has a probabilistic
                 verifier that checks membership proofs for it using
                 logarithmic number of random bits and by examining a
                 {\em constant\/} number of bits in the proof. If a
                 string is in the language, then there exists a proof
                 such that the verifier accepts with probability 1
                 (i.e., for every choice of its random string). For
                 strings not in the language, the verifier rejects every
                 provided ``proof'' with probability at least 1/2. Our
                 result builds upon and improves a recent result of
                 Arora and Safra [1998] whose verifiers examine a
                 nonconstant number of bits in the proof (though this
                 number is a very slowly growing function of the input
                 length).\par

                 As a consequence, we prove that no MAX SNP-hard problem
                 has a polynomial time approximation scheme, unless NP =
                 P. The class MAX SNP was defined by Papadimitriou and
                 Yannakakis [1991] and hard problems for this class
                 include vertex cover, maximum satisfiability, maximum
                 cut, metric TSP, Steiner trees and shortest
                 superstring. We also improve upon the clique hardness
                 results of Feige et al. [1996] and Arora and Safra
                 [1998] and show that there exists a positive $\epsilon$
                 such that approximating the maximum clique size in an
                 $N$-vertex graph to within a factor of $N^\epsilon$ is
                 NP-hard.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.2} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation. {\bf F.1.3}
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Measures and Classes. {\bf F.2.1} Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Numerical Algorithms and Problems. {\bf
                 F.2.2} Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems. {\bf F.4.1} Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic.",
}

@Article{Pong:1998:FVC,
  author =       "Fong Pong and Michel Dubois",
  title =        "Formal verification of complex coherence protocols
                 using symbolic state models",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "4",
  pages =        "557--587",
  month =        jul,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:11:23 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-4/p557-pong/",
  abstract =     "Directory-based coherence protocols in shared-memory
                 multiprocessors are so complex that verification
                 techniques based on automated procedures are required
                 to establish their correctness. State enumeration
                 approaches are well-suited to the verification of cache
                 protocols but they face the problem of state space
                 explosion, leading to unacceptable verification time
                 and memory consumption even for small system
                 configurations. One way to manage this complexity and
                 make the verification feasible is to map the system
                 model to verify onto a symbolic state model (SSM).
                 Since the number of symbolic states is considerably
                 less than the number of system states, an exhaustive
                 state search becomes possible, even for large-scale
                 sytems and complex protocols. In this paper, we develop
                 the concepts and notations to verify some properties of
                 a directory-based protocol designed for non-FIFO
                 interconnection networks. We compare the verification
                 of the protocol with SSM and with the Stanford Mur{\em
                 4}, a verification tool enumerating system states. We
                 show that SSM is much more efficient in terms of
                 verification time and memory consumption and therefore
                 holds that promise of verifying much more complex
                 protocols. A unique feature of SSM is that it verifies
                 protocols for any system size and therefore provides
                 reliable verification results in one run of the tool.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "design; verification",
  subject =      "{\bf B.8.2} Hardware, PERFORMANCE AND RELIABILITY,
                 Performance Analysis and Design Aids. {\bf B.3.2}
                 Hardware, MEMORY STRUCTURES, Design Styles, Cache
                 memories. {\bf B.3.2} Hardware, MEMORY STRUCTURES,
                 Design Styles, Shared memory. {\bf C.1.2} Computer
                 Systems Organization, PROCESSOR ARCHITECTURES, Multiple
                 Data Stream Architectures (Multiprocessors),
                 Multiple-instruction-stream, multiple-data-stream
                 processors (MIMD).",
}

@Article{Kifer:1998:DAQ,
  author =       "Michael Kifer",
  title =        "On the decidability and axiomatization of query
                 finiteness in deductive databases",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "4",
  pages =        "588--633",
  month =        jul,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:11:23 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-4/p588-kifer/",
  abstract =     "A database query is {\em finite\/} if its result
                 consists of a finite sets tuples. For queries
                 formulated as sets of pure Horn rules, the problem of
                 determining finiteness is, in general, undecidable. In
                 this paper, we consider {\em superfiniteness\/}---a
                 stronger kind of finiteness, which applies to Horn
                 queries whose function symbols are replaced by the
                 abstraction of {\em infinite relations\/} with {\em
                 finiteness constraints\/} (abbr., FC's). We show that
                 superfiniteness is not only decidable but also {\em
                 axiomatizable}, and the axiomatization yields an
                 effective decision procedure. Although there are finite
                 queries that are not superfinite, we demonstrate that
                 superfinite queries represent an interesting and
                 nontrivial subclass within the class of all finite
                 queries. The we turn to the issue of inference of
                 finiteness constraints---an important practical problem
                 that is instrumental in deciding if a query is
                 evaluable by a bottom-up algorithm. Although it is not
                 known whether FC-entailment is decidable for sets of
                 function-free Horn rules, we show that {\em
                 super-entailment}, a stronger form of entailment, is
                 decidable. We also show how a decision procedure for
                 super-entailment can be used to enhance tests for query
                 finiteness.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; languages; theory",
  subject =      "{\bf H.2.4} Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf I.2.3} Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Logic programming. {\bf H.2.1}
                 Information Systems, DATABASE MANAGEMENT, Logical
                 Design, QIKSYS.",
}

@Article{Feige:1998:TAS,
  author =       "Uriel Feige",
  title =        "A threshold of $\ln n$ for approximating set cover",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "4",
  pages =        "634--652",
  month =        jul,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 21 15:15:26 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-4/p634-feige/",
  abstract =     "Given a collection $F$ of subsets of $S = {1,
                 \ldots{},n}$, set cover is the problem of selecting as
                 few as possible subsets from $F$ such that their union
                 covers $S$, and max $k$-cover is the problem of
                 selecting $k$ subsets from $F$ such that their union
                 has maximum cardinality. Both these problems are
                 NP-hard. We prove that $(1 - o(1)) \ln n$ is a
                 threshold below which set cover cannot be approximated
                 efficiently, unless NP has slightly superpolynomial
                 time algorithms. This closes the gap (up to low-order
                 terms) between the ratio of approximation achievable by
                 the greedy algorithm (which is $(1 - o(1)) \ln n$), and
                 previous results of Lund and Yanakakis, that showed
                 hardness of approximation within a ratio of $\log_2 n/2
                 \simeq 0.72 \ln n$. For max $k$-cover, we show an
                 approximation threshold of $(1 - 1/e)$ (up to low-order
                 terms), under assumption that ${\rm P} \neq {\rm
                 NP}$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; performance; theory",
  subject =      "{\bf F.1.2} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Probabilistic
                 computation. {\bf F.2.2} Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Computations on
                 discrete structures. {\bf F.1.3} Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Measures
                 and Classes.",
}

@Article{Goldreich:1998:PTC,
  author =       "Oded Goldreich and Shari Goldwasser and Dana Ron",
  title =        "Property testing and its connection to learning and
                 approximation",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "4",
  pages =        "653--750",
  month =        jul,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Dec 16 07:11:23 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-4/p653-goldreich/",
  abstract =     "In this paper, we consider the question of determining
                 whether a function $f$ has property P or is
                 $\epsilon$-far from any function with property P. A
                 {\em property testing\/} algorithm is given a sample of
                 the value of $f$ on instances drawn according to some
                 distribution. In some cases, it is also allowed to
                 query $f$ on instances of its choice. We study this
                 question for different properties and establish some
                 connections to problems in learning theory and
                 approximation. In particular, we focus our attention on
                 testing graph properties. Given access to a graph $G$
                 in the form of being able to query whether an edge
                 exists or not between a pair of vertices, we devise
                 algorithms to test whether the underlying graph has
                 properties such as being bipartite, $k$-Colorable, or
                 having a $p$-Clique (clique of density $p$ with respect
                 to the vertex set). Our graph property testing
                 algorithms are probabilistic and make assertions that
                 are correct with high probability, while making a
                 number of queries that is {\em independent\/} of the
                 size of the graph. Moreover, the property testing
                 algorithms can be used to efficiently (i.e., in time
                 linear in the number of vertices) construct partitions
                 of the graph that correspond to the property being
                 tested, if it holds for the input graph.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.1.2} Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Probabilistic computation.",
}

@Article{Anonymous:1998:MPC,
  author =       "Anonymous",
  title =        "In Memoriam: {Paris C. Kanellakis}",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "5",
  pages =        "751--751",
  month =        sep,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 23 08:47:21 1999",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arora:1998:PTA,
  author =       "Sanjeev Arora",
  title =        "Polynomial time approximation schemes for {Euclidean}
                 traveling salesman and other geometric problems",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "5",
  pages =        "753--782",
  month =        sep,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 23 08:47:21 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-5/p1-arora/",
  abstract =     "We present a polynomial time approximation scheme for
                 Euclidean TSP in fixed dimensions. For every fixed $c >
                 1$ and given any $n$ nodes in $R^2$, a randomized
                 version of the scheme finds a $(1 +1/ c)$-approximation
                 to the optimum traveling salesman tour in $O(n \log n
                 O(c))$ time. When the nodes are in $R^d$, the running
                 time increases to $O(n(\log n)(O(dc))d-1)$. For every
                 fixed $c, d$ the running time is $n \cdot
                 \mbox{poly}(\log n)$, that is {\em nearly linear\/} in
                 $n$. The algorithm can be derandomized, but this
                 increases the running time by a factor $O(nd)$. The
                 previous best approximation algorithm for the problem
                 (due to Christofides) achieves a $3/2$-approximation in
                 polynomial time. We also give similar approximation
                 schemes for some other NP-hard Euclidean problems:
                 Minimum Steiner Tree, $k$-TSP, and $k$-MST. (The
                 running times of the algorithm for $k$-TSP and $k-MST
                 involve an additional multiplicative factor $k.) The
                 previous best approximation algorithms for all these
                 problems achieved a constant-factor approximation. We
                 also give efficient approximation schemes for Euclidean
                 Min-Cost Matching, a problem that can be solved exactly
                 in polynomial time. All our algorithms also work, with
                 almost no modification, when distance is measured using
                 any geometric norm (such as $l^p$ for $p > = 1$ or
                 other Minkowski norms). They also have simple parallel
                 (i.e., NC) implementations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf F.2.2} Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Routing and
                 layout. {\bf G.2.2} Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Path and circuit problems.
                 {\bf G.2.2} Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Trees.",
}

@Article{Goldberg:1998:BFD,
  author =       "Andrew V. Goldberg and Satish Rao",
  title =        "Beyond the flow decomposition barrier",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "5",
  pages =        "783--797",
  month =        sep,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 21 15:15:46 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-5/p1-goldberg/",
  abstract =     "We introduce a new approach to the maximum flow
                 problem. This approach is based on assigning arc
                 lengths based on the residual flow value and the
                 residual arc capacities. Our approach leads to an
                 $O(\min(n^{2/3}, m^{1/2}m\log(n^2/m)\log(U)))$ time
                 bound for a network with $n$ vertices, $m$ arcs, and
                 integral arc capacities in the range $[1, \ldots{},
                 U]$. This is a fundamental improvement over the
                 previous time bounds. We also improve bounds for the
                 Gomory--Hu tree problem, the parametric flow problem,
                 and the approximate $s-t$ cut problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.2} Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory.",
}

@Article{Abiteboul:1998:OIQ,
  author =       "Serge Abiteboul and Paris C. Kanellakis",
  title =        "Object identity as a query language primitive",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "5",
  pages =        "798--842",
  month =        sep,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 23 08:47:21 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-5/p1-abiteboul/",
  abstract =     "We demonstrate the power of object identities (oids)
                 as a database query language primitive. We develop an
                 object-based data model, whose structural part
                 generalizes most of the known complex-object data
                 models: cyclicity is allowed in both its schemas and
                 instances. Our main contribution is the operational
                 part of the data model, the query language IQL, which
                 uses oids for three critical purposes: (1) to represent
                 data-structures with sharing and cycles, (2) to
                 manipulate sets, and (3) to express any computable
                 database query. IQL can be type checked, can be
                 evaluated bottom-up, and naturally generalizes most
                 popular rule-based languages. The model can also be
                 extended to incorporate type inheritance, without
                 changes to IQL. Finally, we investigate an analogous
                 value-based data model, whose structural part is
                 founded on regular infinite trees and whose operational
                 part is IQL.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "{\bf H.2.3} Information Systems, DATABASE MANAGEMENT,
                 Languages, Query languages. {\bf H.2.4} Information
                 Systems, DATABASE MANAGEMENT, Systems, Object-oriented
                 databases. {\bf H.2.1} Information Systems, DATABASE
                 MANAGEMENT, Logical Design.",
}

@Article{Fich:1998:SCR,
  author =       "Faith Fich and Maurice Herlihy and Nir Shavit",
  title =        "On the space complexity of randomized
                 synchronization",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "5",
  pages =        "843--862",
  month =        sep,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 23 08:47:21 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-5/p1-fich/",
  abstract =     "The ``wait-free hierarchy'' provides a classification
                 of multiprocessor synchronization primitives based on
                 the values of $n$ for which there are deterministic
                 wait-free implementations of $n$-process consensus
                 using instances of these objects and {\em read-write\/}
                 registers. In a randomized wait-free setting, this
                 classification is degenerate, since $n$-process
                 consensus can be solved using only {\em $O(n)$
                 read-write\/} registers. In this paper, we propose a
                 classification of synchronization primitives based on
                 the {\em space complexity\/} of randomized solutions to
                 $n$-process consensus. A {\em historyless object,\/}
                 such as a {\em read-write\/} register, a {\em swap\/}
                 register, or a {\em test\&set\/} register, is an object
                 whose state depends only on the lost nontrivial
                 operation that was applied to it. We show that, using
                 {\em historyless\/} objects, $\Omega(n)$ object
                 instances are necessary to solve $n$-process consensus.
                 This lower bound holds even if the objects have
                 unbounded size and the termination requirement is {\em
                 nondeterministic solo termination}, a property strictly
                 weaker than randomized wait-freedom. We then use this
                 result to related the randomized space complexity of
                 basic multiprocessor synchronization primitives such as
                 {\em shared counters, fetch\&add\/} registers, and {\em
                 compare\&swap\/} registers. Viewed collectively, our
                 results imply that there is a separation based on space
                 complexity for synchronization primitives in randomized
                 computation, and that this separation differs from that
                 implied by the deterministic ``wait-free hierarchy.''",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.3} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Measures and Classes,
                 Complexity hierarchies. {\bf F.1.2} Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency.",
}

@Article{Bshouty:1998:NTD,
  author =       "Nader H. Bshouty and Sally A. Goldman and H. David
                 Mathias and Subhash Suri and Hisao Tamaki",
  title =        "Noise-tolerant distribution-free learning of general
                 geometric concepts",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "5",
  pages =        "863--890",
  month =        sep,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 21 15:16:07 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-5/p1-bshouty/",
  abstract =     "We present an efficient algorithm for PAC-learning a
                 very general class of geometric concepts over ${\cal
                 R}^d$ for fixed $d$. More specifically, let {${\cal
                 T}$} be any set of $s$ halfspaces. Let $x =(x_1,
                 \ldots{}, x_d)$ be an arbitrary point in {${\cal
                 R}^d$}. With each $t$ in {${\cal T}$} we associate a
                 Boolean indicator function {$I_t(x)$} which is 1 if and
                 only if $x$ is in the halfspace $t$. The concept class,
                 {\em Cds }, that we study consists of all concepts
                 formed by any Boolean function over {$I_{t_1},
                 \ldots{}, I_{t_s}$} for {$t_i \in {\cal T}$}. This
                 class is much more general than any geometric concept
                 class known to be PAC-learnable. Our results can be
                 extended easily to learn efficiently any Boolean
                 combination of a polynomial number of concepts selected
                 from any concept class {${\cal C}$} over {${\cal R}$}
                 given that the VC-dimension of {${\cal C}$} has
                 dependence only on $d$ and there is a polynomial time
                 algorithm to determine if there is a concept from
                 {${\cal C}$} consistent with a given set of labeled
                 examples. We also present a statistical query version
                 of our algorithm that can tolerate random
                 classification noise. Finally we present a
                 generalization of the standard $\epsilon$-net result of
                 Haussler and Welzl [1987] and apply it to give an
                 alternative noise-tolerant algorithm for $d = 2$ based
                 on geometric subdivisions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf I.2.6} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Learning, Concept learning.",
}

@Article{Arya:1998:OAA,
  author =       "Sunil Arya and David M. Mount and Nathan S. Netanyahu
                 and Ruth Silverman and Angela Y. Wu",
  title =        "An optimal algorithm for approximate nearest neighbor
                 searching fixed dimensions",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "6",
  pages =        "891--923",
  month =        nov,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 21 15:58:36 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-6/p891-arya/",
  abstract =     "Consider a set of $S$ of $n$ data points in real
                 $d$-dimensional space, $R^d$, where distances are
                 measured using any Minkowski metric. In nearest
                 neighbor searching, we preprocess $S$ into a data
                 structure, so that given any query point {$q \in R^d$},
                 is the closest point of $S$ to $q$ can be reported
                 quickly. Given any positive real $\epsilon$, data point
                 $p$ is a $(1 +\epsilon)$-{\em approximate nearest
                 neighbor\/} of $q$ if its distance from $q$ is within a
                 factor of $(1 + \epsilon)$ of the distance to the true
                 nearest neighbor. We show that it is possible to
                 preprocess a set of $n$ points in $R^d$ in $O(dn \log
                 n)$ time and $O(dn)$ space, so that given a query point
                 $q \in R^d$, and $\epsilon > 0$, a $(1 +
                 \epsilon)$-approximate nearest neighbor of $q$ can be
                 computed in $O(c_{d, \epsilon} \log n)$ time, where
                 $c_{d,\epsilon} \leq d \lceil 1 + 6d / \epsilon
                 \rceil^d$ is a factor depending only on dimension and
                 $\epsilon$. In general, we show that given an integer
                 $k \geq 1$, $(1 + \epsilon)$-approximations to the $k$
                 nearest neighbors of $q$ can be computed in additional
                 {$O(kd \log n)$} time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf E.1} Data, DATA STRUCTURES. {\bf F.2.2} Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems. {\bf
                 H.3.3} Information Systems, INFORMATION STORAGE AND
                 RETRIEVAL, Information Search and Retrieval.",
}

@Article{Pellegrini:1998:EFS,
  author =       "Marco Pellegrini",
  title =        "Electrostatic fields without singularities: theory,
                 algorithms and error analysis",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "6",
  pages =        "924--964",
  month =        nov,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 29 14:44:34 MST 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "The author compares his methods against fast multipole
                 methods for point-to-volume integrals.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-6/p924-pellegrini/",
  abstract =     "The following problems that arise in the computation
                 of electrostatic forces and in the Boundary Element
                 Method are considered. Given two convex
                 interior-disjoint polyhedra in 3-space endowed with a
                 volume charge density which is a polynomial in the
                 Cartesian coordinates of $R^3$, compute the Coulomb
                 force acting on them. Given two interior-disjoint
                 polygons in 3-space endowed with a surface charge
                 density which is polynomial in the Cartesian
                 coordinates of $R^3$, compute the normal component of
                 the Coulomb force acting on them. For both problems
                 adaptive Gaussian approximation algorithms are given,
                 which, for $n$ Gaussian points, in time {$O(n)$},
                 achieve absolute error {$O(c^{\sqrt{n}})$} for a
                 constant $c > 1$. Such a result improves upon
                 previously known best asymptotic bounds. This result is
                 achieved by blending techniques from integral geometry,
                 computational geometry and numerical analysis. In
                 particular, integral geometry is used in order to
                 represent the forces as integrals whose kernel is free
                 from singularities.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf G.1.4} Mathematics of Computing,
                 NUMERICAL ANALYSIS, Quadrature and Numerical
                 Differentiation, Error analysis.",
}

@Article{Chor:1998:PIR,
  author =       "Benny Chor and Eyal Kushilevitz and Oded Goldreich and
                 Madhu Sudan",
  title =        "Private information retrieval",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "6",
  pages =        "965--981",
  month =        nov,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 29 14:44:34 MST 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-6/p965-chor/",
  abstract =     "Publicly accessible databases are an indispensable
                 resource for retrieving up-to-date information. But
                 they also pose a significant risk to the privacy of the
                 user, since a curious database operator can follow the
                 user's queries and infer what the user is after.
                 Indeed, in cases where the users' intentions are to be
                 kept secret, users are often cautious about accessing
                 the database. It can be shown that when accessing a
                 single database, to completely guarantee the privacy of
                 the user, the whole database should be down-loaded;
                 namely $n$ bits should be communicated (where $n$ is
                 the number of bits in the database). In this work, we
                 investigate whether by replicating the database, more
                 efficient solutions to the private retrieval problem
                 can be obtained. We describe schemes that enable a user
                 to access $k$ replicated copies of a database ($k \geq
                 2$) and {\em privately\/} retrieve information stored
                 in the database. This means that each individual server
                 (holding a replicated copy of the database) gets no
                 information on the identity of the item retrieved by
                 the user. Our schemes use the replication to gain
                 substantial saving. In particular, we present a
                 two-server scheme with communication complexity
                 $O(n^{1/3})$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "security",
  subject =      "{\bf C.2.4} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed databases. {\bf D.4.6} Software, OPERATING
                 SYSTEMS, Security and Protection, Information flow
                 controls. {\bf H.3.3} Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Information Search and
                 Retrieval, Retrieval models. {\bf K.4.1} Computing
                 Milieux, COMPUTERS AND SOCIETY, Public Policy Issues,
                 Privacy.",
}

@Article{Kearns:1998:ENT,
  author =       "Michael Kearns",
  title =        "Efficient noise-tolerant learning from statistical
                 queries",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "6",
  pages =        "983--1006",
  month =        nov,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 29 14:44:34 MST 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-6/p983-kearns/",
  abstract =     "In this paper, we study the problem of learning in the
                 presence of classification noise in the probabilistic
                 learning model of Valiant and its variants. In order to
                 identify the class of ``robust'' learning algorithms in
                 the most general way, we formalize a new but related
                 model of learning from {\em statistical queries}.
                 Intuitively, in this model a learning algorithm is
                 forbidden to examine individual examples of the unknown
                 target function, but is given access to an oracle
                 providing estimates of probabilities over the sample
                 space of random examples. One of our main results shows
                 that any class of functions learnable from statistical
                 queries is in fact learnable with classification noise
                 in Valiant's model, with a noise rate approaching the
                 information-theoretic barrier of 1/2. We then
                 demonstrate the generality of the statistical query
                 model, showing that practically every class learnable
                 in Valiant's model and its variants can also be learned
                 in the new model (and thus can be learned in the
                 presence of noise). A notable exception to this
                 statement is the class of parity functions, which we
                 prove is not learnable from statistical queries, and
                 for which no noise-tolerant algorithm is known.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf G.3} Mathematics of Computing, PROBABILITY AND
                 STATISTICS. {\bf I.2} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE. {\bf I.5} Computing
                 Methodologies, PATTERN RECOGNITION.",
}

@Article{Bachmair:1998:OCC,
  author =       "Leo Bachmair and Harald Ganzinger",
  title =        "Ordered chaining calculi for first-order theories of
                 transitive relations",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "6",
  pages =        "1007--1049",
  month =        nov,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 29 14:44:34 MST 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-6/p1007-bachmair/",
  abstract =     "We propose inference systems for binary relations that
                 satisfy composition laws such as transitivity. Our
                 inference mechanisms are based on standard techniques
                 from term rewriting and represent a refinement of
                 chaining methods as they are used in the context of
                 resolution-type theorem proving. We establish the
                 refutational completeness of these calculi and prove
                 that our methods are compatible with the usual
                 simplification techniques employed in refutational
                 theorem provers, such as subsumption or tautology
                 deletion. Various optimizations of the basic chaining
                 calculus will be discussed for theories with equality
                 and for total orderings. A key to the practicality of
                 chaining methods is the extent to which so-called
                 variable chaining can be avoided. We demonstrate that
                 rewrite techniques considerably restrict variable
                 chaining and that further restrictions are possible if
                 the transitive relation under consideration satisfies
                 additional properties, such as symmetry. But we also
                 show that variable chaining cannot be completely
                 avoided in general.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf F.4.1} Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Computational
                 logic. {\bf F.4.1} Theory of Computation, MATHEMATICAL
                 LOGIC AND FORMAL LANGUAGES, Mathematical Logic,
                 Mechanical theorem proving. {\bf F.4.1} Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic, Proof theory. {\bf I.2.3} Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Deduction. {\bf I.2.3} Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving, Inference engines. {\bf I.2.3}
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Resolution.",
}

@Article{Karp:1998:PEG,
  author =       "Richard M. Karp and Yangun Zhang",
  title =        "On parallel evaluation of game trees",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "6",
  pages =        "1050--1075",
  month =        nov,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 29 14:44:34 MST 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1998-45/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1998-45-6/p1050-karp/",
  abstract =     "A class of parallel algorithms for evaluating game
                 trees is presented. These algorithms parallelize a
                 standard sequential algorithm for evaluating AND\slash
                 OR trees and the $\alpha$-$\beta$ pruning procedure for
                 evaluating MIN\slash MAX trees. It is shown that,
                 uniformly on all instances of uniform AND\slash OR
                 trees, the parallel AND\slash OR tree algorithm
                 achieves an asymptotic linear speedup using a
                 polynomial number of processors in the height of the
                 tree. The analysis of linear speedup using more than a
                 linear number of processors is due to J. Harting. A
                 numerical lower bound rigorously establishes a good
                 speedup for the uniform AND\slash OR trees with
                 parameters that are typical in practice. The
                 performance of the parallel $\alpha$-$\beta$ algorithm
                 on best-ordered MIN\slash MAX trees is analyzed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf I.2.8} Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search.",
}

@Article{Anonymous:1998:SI,
  author =       "Anonymous",
  title =        "Subject Index",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "6",
  pages =        "1076--1077",
  month =        nov,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu May 06 10:59:57 1999",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Anonymous:1998:AI,
  author =       "Anonymous",
  title =        "Author Index",
  journal =      j-J-ACM,
  volume =       "45",
  number =       "6",
  pages =        "1078--1079",
  month =        nov,
  year =         "1998",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu May 06 10:59:57 1999",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hannenhalli:1999:TCT,
  author =       "Sridhar Hannenhalli and Pavel A. Pevzner",
  title =        "Transforming cabbage into turnip: polynomial algorithm
                 for sorting signed permutations by reversals",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "1",
  pages =        "1--27",
  month =        jan,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue May 25 18:51:21 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1999-46/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-1/p1-hannenhalli/",
  abstract =     "Genomes frequently evolve by reversals $\rho(i,j)$
                 that transform a gene order $\pi+1 \cdots
                 \pi_i\pi_{i+1} \cdots \pi_{j-1}\pi_j \cdots \pi_n$ into
                 $\pi_1 \cdots \pi_i\pi_{j-1} \cdots \pi_{i+1}\pi_j
                 \cdots \pi_n$. Reversal distance between permutations
                 $\pi$ and $\sigma$ is the minimum number of reversals
                 to transform $\pi$ into $\sigma$. Analysis of genome
                 rearrangements in molecular biology started in the late
                 1930's, when Dobzhansky and Sturtevant published a
                 milestone paper presenting a rearrangement scenario
                 with 17 inversions between the species of {\em
                 Drosophilia}. Analysis of genomes evolving by
                 inversions leads to a combinatorial problem of {\em
                 sorting by reversals\/} studied in detail recently. We
                 study sorting of {\em signed\/} permutations by
                 reversals, a problem that adequately models
                 rearrangements in a small genomes like chloroplast or
                 mitochondrial DNA. The previously suggested
                 approximation algorithms for sorting signed
                 permutations by reversals compute the {\em reversal
                 distance\/} between permutations with an astonishing
                 accuracy for both simulated and biological data. We
                 prove a duality theorem explaining this intriguing
                 performance and show that there exists a ``hidden''
                 parameter that allows one to compute the reversal
                 distance between signed permutations in polynomial
                 time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf J.3} Computer Applications, LIFE AND MEDICAL
                 SCIENCES, Biology and genetics. {\bf G.2.1} Mathematics
                 of Computing, DISCRETE MATHEMATICS, Combinatorics. {\bf
                 F.1.3} Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Complexity Measures and Classes.",
}

@Article{Galil:1999:FDP,
  author =       "Zvi Galil and Giuseppe F. Italiano and Neil Sarnak",
  title =        "Fully dynamic planarity testing with applications",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "1",
  pages =        "28--91",
  month =        jan,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue May 25 18:51:21 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1999-46/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-1/p28-galil/",
  abstract =     "This paper introduces compressed certificates for
                 planarity, biconnectivity and triconnectivity in planar
                 graphs, and proves many structural properties of
                 certificates in planar graphs. As an application of our
                 compressed certificates, we develop efficient dynamic
                 planar algorithms. In particular, we consider the
                 following three operations on a planar graph $G$: (i)
                 insert an edge if the resultant graph remains planar;
                 (ii) delete an edge; and (iii) test whether an edge
                 could be added to the graph without violating
                 planarity. We show how to support each of the above
                 operations in $O(n^{2/3})$ time, where $n$ is the
                 number of vertices in the graph. The bound for tests
                 and deletions is worst-case, while the bound for
                 insertions is amortized. This is the first algorithm
                 for this problem with sub-linear running time, and it
                 affirmatively answers a question posed in Epstein et
                 al. [1992]. We use our compressed certificates for
                 biconnectivity and triconnectivity to maintain the
                 biconnected and triconnected components of a dynamic
                 planar graph. The time bounds are the same:
                 $O(n^{2/3})$ worst-case time per edge deletion,
                 $O(n^{2/3})$ amortized time per edge insertion, and
                 $O(n^{2/3})$ worst-case time to check whether two
                 vertices are either biconnected or triconnected.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.2} Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory.",
}

@Article{ONeil:1999:OPL,
  author =       "Elizabeth J. O'Neil and Patrick E. O'Neil and Gerhard
                 Weikum",
  title =        "An optimality proof of the {LRU-$K$} page replacement
                 algorithm",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "1",
  pages =        "92--112",
  month =        jan,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue May 25 18:51:21 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1999-46/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-1/p92-o_neil/",
  abstract =     "This paper analyzes a recently published algorithm for
                 page replacement in hierarchical paged memory systems
                 [O'Neil et al. 1993]. The algorithm is called the
                 LRU-$K$ method, and reduces to the well-known LRU
                 (Least Recently Used) method for $K = 1$. Previous work
                 [O'Neil et al. 1993; Weikum et al. 1994; Johnson and
                 Shasha 1994] has shown the effectiveness for $K>1$ by
                 simulation, especially in the most common case of
                 $K=2$. The basic idea in LRU-$K$ is to keep track of
                 the times of the last $K$ references to memory pages,
                 and to use this statistical information to rank-order
                 the pages as to their expected future behavior. Based
                 on this the page replacement policy decision is made:
                 which memory-resident page to replace when a newly
                 accessed page must be read into memory. In the current
                 paper, we prove, under the assumptions of the
                 independent reference model, that LRU-$K$ is optimal.
                 Specifically we show: given the times of the (up to)
                 $K$ most recent references to each disk page, no other
                 algorithm $A$ making decisions to keep pages in a
                 memory buffer holding $n-1$ pages based on this
                 information can improve on the expected number of I/Os
                 to access pages over the LRU-$K$ algorithm using a
                 memory buffer holding $n$ pages. The proof uses the
                 Bayesian formula to relate the space of actual page
                 probabilities of the model to the space of observable
                 page numbers on which the replacement decision is
                 actually made.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design; performance; theory",
  subject =      "{\bf H.2.2} Information Systems, DATABASE MANAGEMENT,
                 Physical Design.",
}

@Article{Cucker:1999:CED,
  author =       "Felipe Cucker and Steve Smale",
  title =        "Complexity estimates depending on condition and
                 round-off error",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "1",
  pages =        "113--184",
  month =        jan,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue May 25 18:51:21 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1999-46/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-1/p113-cucker/",
  abstract =     "This paper has two agendas. One is to develop the
                 foundations of round-off in computation. The other is
                 to describe an algorithm for deciding feasibility for
                 polynomial systems of equations and inequalities
                 together with its complexity analysis and its round-off
                 properties. Each role reinforces the other.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.1} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems. {\bf G.1.5} Mathematics of Computing,
                 NUMERICAL ANALYSIS, Roots of Nonlinear Equations.",
}

@Article{Hass:1999:CCK,
  author =       "Joel Hass and Jeffrey C. Lagarias and Nicholas
                 Pippenger",
  title =        "The computational complexity of knot and link
                 problems",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "2",
  pages =        "185--211",
  month =        mar,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue May 25 18:51:21 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1999-46/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-2/p185-hass/",
  abstract =     "We consider the problem of deciding whether a
                 polygonal knot in 3-dimensional Euclidean space is
                 unknotted, ie., capable of being continuously deformed
                 without self-intersection so that it lies in a plane.
                 We show that this problem, UNKNOTTING PROBLEM is in NP.
                 We also consider the problem, SPLITTING PROBLEM of
                 determining whether two or more such polygons can be
                 split, or continuously deformed without
                 self-intersection so that they occupy both sides of a
                 plane without intersecting it. We show that it also is
                 in NP. Finally, we show that the problem of determining
                 the genus of a polygonal knot (a generalization of the
                 problem of determining whether it is unknotted) is in
                 PSPACE. We also give exponential worst-case running
                 time bounds for deterministic algorithms to solve each
                 of these problems. These algorithms are based on the
                 use of normal surfaces and decision procedures due to
                 W. Haken, with recent extensions by W. Jaco and J. L.
                 Tollefson.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.2} Mathematics of
                 Computing, DISCRETE MATHEMATICS, Graph Theory.",
}

@Article{Berger:1999:RTD,
  author =       "Bonnie Berger and Jon Kleinberg and Tom Leighton",
  title =        "Reconstructing a three-dimensional model with
                 arbitrary errors",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "2",
  pages =        "212--235",
  month =        mar,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue May 25 18:51:21 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1999-46/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-2/p212-berger/",
  abstract =     "A number of current technologies allow for the
                 determination of interatomic distance information in
                 structures such as proteins and RNA. Thus, the
                 reconstruction of a three-dimensional set of points
                 using information about its interpoint distances has
                 become a task of basic importance in determining
                 molecular structure. The distance measurements one
                 obtains from techniques such as NMR are typically
                 sparse and error-prone, greatly complicating the
                 reconstruction task. Many of these errors result in
                 distance measurements that can be safely assumed to lie
                 within certain fixed tolerances. But a number of
                 sources of systematic error in these experiments lead
                 to inaccuracies in the data that are very hard to
                 quantify; in effect, one must treat certain entries of
                 the measured distance matrix as being arbitrarily
                 ``corrupted''. The existence of arbitrary errors leads
                 to an interesting sort of error-correction problem ---
                 how many corrupted entries in a distance matrix can be
                 efficiently corrected to produce a consistent
                 three-dimensional structure? For the case of an $n
                 \times n$ matrix in which every entry is specified, we
                 provide a randomized algorithm running in time $O(n\log
                 n)$ that enumerates all structures consistent with at
                 most $(1/2-e)n$ errors per row, with high probability.
                 In the case of randomly located errors, we can correct
                 errors of the same density in a sparse matrix-one in
                 which only a $B$ fraction of the entries in each row
                 are given, for any constant $B>0$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; theory",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.2.1} Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics. {\bf
                 J.2} Computer Applications, PHYSICAL SCIENCES AND
                 ENGINEERING, Chemistry. {\bf J.3} Computer
                 Applications, LIFE AND MEDICAL SCIENCES, Biology and
                 genetics.",
}

@Article{Ferragina:1999:SBT,
  author =       "Paolo Ferragina and Roberto Grossi",
  title =        "The string {B}-tree: a new data structure for string
                 search in external memory and its applications",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "2",
  pages =        "236--280",
  month =        mar,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue May 25 18:51:21 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1999-46/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-2/p236-ferragina/",
  abstract =     "We introduce a new text-indexing data structure, the
                 {\em String B-Tree}, that can be seen as a link between
                 some traditional external-memory and string-matching
                 data structures. In a short phrase, it is a combination
                 of B-trees and Patricia tries for internal-node indices
                 that is made more effective by adding extra pointers to
                 speed up search and update operations. Consequently,
                 the String B-Tree overcomes the theoretical limitations
                 of inverted files, B-trees, prefix B-trees, suffix
                 arrays, compacted tries and suffix trees. String
                 B-trees have the same worst-case performance as B-trees
                 but they manage unbounded-length strings and perform
                 much more powerful search operations such as the ones
                 supported by suffix trees. String B-trees are also
                 effective in main memory (RAM model) because they
                 improve the online suffix tree search on a dynamic set
                 of strings. They also can be successfully applied to
                 database indexing and software duplication.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; design",
  subject =      "{\bf B.3.2} Hardware, MEMORY STRUCTURES, Design
                 Styles, Mass storage. {\bf B.4.2} Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Input/Output
                 Devices. {\bf D.4.2} Software, OPERATING SYSTEMS,
                 Storage Management, Secondary storage. {\bf E.1} Data,
                 DATA STRUCTURES. {\bf E.5} Data, FILES,
                 Sorting/searching. {\bf F.2.2} Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Pattern matching.
                 {\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 H.2.4} Information Systems, DATABASE MANAGEMENT,
                 Systems, Textual databases. {\bf H.3.1} Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Content
                 Analysis and Indexing, Dictionaries. {\bf H.3.1}
                 Information Systems, INFORMATION STORAGE AND RETRIEVAL,
                 Content Analysis and Indexing, Indexing methods. {\bf
                 H.3.3} Information Systems, INFORMATION STORAGE AND
                 RETRIEVAL, Information Search and Retrieval. {\bf
                 H.3.7} Information Systems, INFORMATION STORAGE AND
                 RETRIEVAL, Digital Libraries.",
}

@Article{Blelloch:1999:PES,
  author =       "Guy E. Blelloch and Phillip B. Gibbons and Yossi
                 Matias",
  title =        "Provably efficient scheduling for languages with
                 fine-grained parallelism",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "2",
  pages =        "281--321",
  month =        mar,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue May 25 18:51:21 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/1999-46/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-2/p281-blelloch/",
  abstract =     "Many high-level parallel programming languages allow
                 for fine-grained parallelism. As in the popular
                 work-time framework for parallel algorithm design,
                 programs written in such languages can express the full
                 parallelism in the program without specifying the
                 mapping of program tasks to processors. A common
                 concern in executing such programs is to schedule tasks
                 to processors dynamically so as to minimize not only
                 the execution time, but also the amount of space
                 (memory) needed. Without careful scheduling, the
                 parallel execution on $p$ processors can use a factor
                 of $p$ or larger more space than a sequential
                 implementation of the same program. This paper first
                 identifies a class of parallel schedules that are
                 provably efficient in both time and space. For any
                 computation with $w$ units of work and critical path
                 length $d$, and for any sequential schedule that takes
                 space $s_1$, we provide a parallel schedule that takes
                 fewer than $w/p + d$ steps on $p$ processors and
                 requires less than $s_1 + p^d$ space. This matches the
                 lower bound that we show, and significantly improves
                 upon the best previous bound of $s_1^p$ spaces for the
                 common case where $d>1$. The paper then describes a
                 scheduler for implementing high-level languages with
                 nested parallelism, that generates schedules in this
                 case. During program execution, as the structure of the
                 computation is revealed, the scheduler keeps track of
                 the active tasks, allocates the tasks to the
                 processors, and performs the necessary task
                 synchronization. The scheduler is itself a parallel
                 algorithm, and incurs at most a constant factor
                 overhead in time and space, even when the scheduling
                 granularity is individual units of work. The algorithm
                 is the first efficient solution to the scheduling
                 problem discussed here, even if space considerations
                 are ignored.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; languages; performance",
  subject =      "{\bf B.3.2} Hardware, MEMORY STRUCTURES, Design
                 Styles, Shared memory. {\bf D.3.2} Software,
                 PROGRAMMING LANGUAGES, Language Classifications,
                 Parallel C. {\bf D.4.1} Software, OPERATING SYSTEMS,
                 Process Management,
                 Multiprocessing/multiprogramming/multitasking. {\bf
                 D.4.1} Software, OPERATING SYSTEMS, Process Management,
                 Scheduling. {\bf D.4.1} Software, OPERATING SYSTEMS,
                 Process Management, Threads. {\bf D.4.1} Software,
                 OPERATING SYSTEMS, Process Management.",
  xxnote =       "Check math in abstract.",
}

@Article{Halpern:1999:ETS,
  author =       "J. Halpern",
  title =        "Editorial: Taking Stock",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "3",
  pages =        "323--324",
  month =        mar,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 18:25:27 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See corrigendum \cite{Halpern:1999:CET}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pirri:1999:SCM,
  author =       "Fiora Pirri and Ray Reiter",
  title =        "Some contributions to the metatheory of the situation
                 calculus",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "3",
  pages =        "325--361",
  month =        may,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 7 12:04:29 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-3/p325-pirri/",
  abstract =     "We focus on a rich axiomatization for actions in the
                 situation calculus that includes, among other features,
                 a solution to the frame problem for deterministic
                 actions. Our work is foundational in nature, directed
                 at simplifying the entailment problem for these axioms.
                 Specifically, we make four contributions to the
                 metatheory of situation calculus axiomatizations of
                 dynamical systems: (1) We prove that the
                 above-mentioned axiomatization for actions has a
                 relative satisfiability property; the full
                 axiomatization is satisfiable iff the axioms for the
                 initial state are. (2) We define the concept of
                 regression relative to these axioms, and prove a
                 soundness and completeness theorem for a
                 regression-based approach to the entailment problem for
                 a wide class of queries. (3) Our formalization of the
                 situation calculus requires certain foundational axioms
                 specifying the domain of situations. These include an
                 induction axiom, whose presence complicates human and
                 automated reasoning in the situation calculus. We
                 characterize various classes of sentences whose proofs
                 do not require induction, and in some cases, some of
                 the other foundational axioms. (4) We prove that the
                 logic programming language GOLOG never requires any of
                 the foundational axioms for the evaluation of
                 programs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "{\bf F.3} Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS. {\bf F.4.1} Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic. {\bf I.2.4} Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods.",
}

@Article{Thorup:1999:USS,
  author =       "Mikkel Thorup",
  title =        "Undirected single-source shortest paths with positive
                 integer weights in linear time",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "3",
  pages =        "362--394",
  month =        may,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 7 12:04:29 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-3/p362-thorup/",
  abstract =     "The single-source shortest paths problem (SSSP) is one
                 of the classic problems in algorithmic graph theory:
                 given a positively weighted graph {$G$} with a source
                 vertex {$s$}, find the shortest path from $s$ to all
                 other vertices in the graph. Since 1959, all
                 theoretical developments in SSSP for general directed
                 and undirected graphs have been based on Dijkstra's
                 algorithm, visiting the vertices in order of increasing
                 distance from $s$. Thus, any implementation of
                 Dijkstra's algorithm sorts the vertices according to
                 their distances from $s$. However, we do not know how
                 to sort in linear time. Here, a deterministic linear
                 time and linear space algorithm is presented for the
                 undirected single source shortest paths problem with
                 positive integer weights. The algorithm avoids the
                 sorting bottleneck by building a hierarchical bucketing
                 structure, identifying vertex pairs that may be visited
                 in any order.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms",
  subject =      "{\bf F.1.1} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation, Bounded-action
                 devices. {\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf F.2.2} Theory of Computation, ANALYSIS
                 OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 G.2.2} Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Graph algorithms.",
}

@Article{Myers:1999:FBV,
  author =       "Gene Myers",
  title =        "A fast bit-vector algorithm for approximate string
                 matching based on dynamic programming",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "3",
  pages =        "395--415",
  month =        may,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 7 12:04:29 MDT 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-3/p395-myers/",
  abstract =     "The approximate string matching problem is to find all
                 locations at which a query of length $m$ matches a
                 substring of a text of length $n$ with $k$-or-fewer
                 differences. Simple and practical bit-vector algorithms
                 have been designed for this problem, most notably the
                 one used in {\em agrep}. These algorithms compute a bit
                 representation of the current state-set of the
                 $k$-difference automaton for the query, and
                 asymptotically run in either {$O(nm/w)$} or {$O(nm \log
                 \sigma/w)$} time where $w$ is the word size of the
                 machine (e.g., 32 or 64 in practice), and [sigma] is
                 the size of the pattern alphabet. Here we present an
                 algorithm of comparable simplicity that requires only
                 {$O(nm/w)$} time by virtue of computing a bit
                 representation of the {\em relocatable\/} dynamic
                 programming matrix for the problem. Thus, the
                 algorithm's performance is independent of $k$, and it
                 is found to be more efficient than the previous results
                 for many choices of $k$ and small $m$. Moreover,
                 because the algorithm is not dependent on $k$, it can
                 be used to rapidly compute blocks of the dynamic
                 programming matrix as in the 4-Russians algorithm of Wu
                 et al. (1996). This gives rise to an {$O(kn/w)$}
                 expected-time algorithm for the case where $m$ may be
                 arbitrarily large. In practice this new algorithm, that
                 computes a region of the dynamic programming (d.p.)
                 matrix $w$ entries at a time using the basic algorithm
                 as a subroutine is significantly faster than our
                 previous 4-Russians algorithm, that computes the same
                 region 4 or 5 entries at a time using table lookup.
                 This performance improvement yields a code that is
                 either superior or competitive with {\em all\/}
                 existing algorithms except for some filtration
                 algorithms that are superior when $k/m$ is sufficiently
                 small.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "design",
  subject =      "{\bf G.4} Mathematics of Computing, MATHEMATICAL
                 SOFTWARE. {\bf H.3.3} Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Information Search and
                 Retrieval.",
}

@Article{Young:1999:GUS,
  author =       "F. Y. Young and Chris C. N. Chu and D. F. Wong",
  title =        "Generation of universal series-parallel {Boolean}
                 functions",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "3",
  pages =        "416--435",
  month =        may,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 21 15:16:54 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/jacm/1999-46-3/p416-young/",
  abstract =     "The structural tree-based mapping algorithm is an
                 efficient and popular technique for technology mapping.
                 In order to make good use of this mapping technique in
                 FTGA design, it is desirable to design FPGA logic
                 modules based on Boolean functions which can be
                 represented by a tree of gates (i.e., series-parallel
                 or SP functions). Thakur and Wong [1996a; 1996b]
                 studied this issue and they demonstrated the advantages
                 of designing logic modules as universal SP functions,
                 that is, SP functions which can implement all SP
                 functions with a certain number of inputs. The number
                 of variables in the universal function corresponds to
                 the number of inputs to the FPGA module, so it is
                 desirable to have as few variables as possible in the
                 constructed functions. The universal SP functions
                 presented in Thakur and Wong [1996a; 1966b] were
                 designed manually. Recently, there is an algorithm that
                 can generate these functions automatically [Young and
                 Wong 1997], but the number of variables in the
                 generated functions grows exponentially. In this paper,
                 we present an algorithm to generate, for each $n > 0$,
                 a universal SP function $f_n$ for implementing all SP
                 functions with $n$ inputs or less. The number of
                 variables in $f_n$ is less than $n^{2.376}$ and the
                 constructions are the smallest possible when $n$ is
                 small $(n\le 7)$. We also derived a nontrivial lower
                 bound on the sizes of the optimal universal SP
                 functions {($\Omega(n \log n)$)}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "design",
  subject =      "{\bf B.7.1} Hardware, INTEGRATED CIRCUITS, Types and
                 Design Styles, VLSI (very large scale integration).",
}

@Article{Farach:1999:EAI,
  author =       "Martin Farach and Sampath Kannan",
  title =        "Efficient algorithms for inverting evolution",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "4",
  pages =        "437--449",
  month =        jul,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Jan 23 12:19:49 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/1999-46-4/p437-farach/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldwasser:1999:PTU,
  author =       "Shafi Goldwasser and Joe Kilian",
  title =        "Primality testing using elliptic curves",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "4",
  pages =        "450--472",
  month =        jul,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Jan 23 12:19:49 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-4/p450-goldwasser/p450-goldwasser.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/1999-46-4/p450-goldwasser/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fredman:1999:EPH,
  author =       "Michael L. Fredman",
  title =        "On the efficiency of pairing heaps and related data
                 structures",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "4",
  pages =        "473--501",
  month =        jul,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Jan 23 12:19:49 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-4/p473-fredman/p473-fredman.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/1999-46-4/p473-fredman/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Henzinger:1999:RFD,
  author =       "Monika R. Henzinger and Valerie King",
  title =        "Randomized fully dynamic graph algorithms with
                 polylogarithmic time per operation",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "4",
  pages =        "502--516",
  month =        jul,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Jan 23 12:19:49 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/1999-46-4/p502-henzinger/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Buhrman:1999:MS,
  author =       "Harry Buhrman and Matthew Franklin and Juan A. Garay
                 and Jaap-Henk Hoepman and John Tromp and Paul
                 Vit{\'a}nyi",
  title =        "Mutual search",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "4",
  pages =        "517--536",
  month =        jul,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Jan 23 12:19:49 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-4/p517-buhrman/p517-buhrman.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/1999-46-4/p517-buhrman/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Basu:1999:NRQ,
  author =       "Saugata Basu",
  title =        "New results on quantifier elimination over real closed
                 fields and applications to constraint databases",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "4",
  pages =        "537--555",
  month =        jul,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Jan 23 12:19:49 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-4/p537-basu/p537-basu.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/1999-46-4/p537-basu/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rodeh:1999:FCA,
  author =       "Michael Rodeh and Mooly Sagiv",
  title =        "Finding circular attributes in attribute grammars",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "4",
  pages =        "556--575",
  month =        jul,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Jan 23 12:19:49 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-4/p556-rodeh/p556-rodeh.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/1999-46-4/p556-rodeh/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Halpern:1999:CET,
  author =       "J. Halpern",
  title =        "Corrigendum: Editorial: Taking Stock",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "4",
  pages =        "576--576",
  month =        mar,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 06 18:25:27 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Halpern:1999:ETS}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kaplan:1999:PFR,
  author =       "Haim Kaplan and Robert E. Tarjan",
  title =        "Purely functional, real-time deques with catenation",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "5",
  pages =        "577--603",
  month =        sep,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 6 18:19:41 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kleinberg:1999:ASH,
  author =       "Jon M. Kleinberg",
  title =        "Authoritative sources in a hyperlinked environment",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "5",
  pages =        "604--632",
  month =        sep,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 6 18:19:41 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-5/p604-kleinberg/p604-kleinberg.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/1999-46-5/p604-kleinberg/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dwork:1999:SEB,
  author =       "Cynthia Dwork and Orli Waarts",
  title =        "Simple and efficient bounded concurrent timestamping
                 and the traceable use abstraction",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "5",
  pages =        "633--666",
  month =        sep,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 6 18:19:41 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alon:1999:LHF,
  author =       "Noga Alon and Martin Dietzfelbinger and Peter Bro
                 Miltersen and Erez Petrank and G{\'a}bor Tardos",
  title =        "Linear hash functions",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "5",
  pages =        "667--683",
  month =        sep,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 6 18:19:41 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-5/p667-alon/p667-alon.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/1999-46-5/p667-alon/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cesa-Bianchi:1999:SES,
  author =       "Nicol{\`o} Cesa-Bianchi and Eli Dichterman and Paul
                 Fischer and Eli Shamir and Hans Ulrich Simon",
  title =        "Sample-efficient strategies for learning in the
                 presence of noise",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "5",
  pages =        "684--719",
  month =        sep,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 6 18:19:41 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-5/p684-cesa-bianchi/p684-cesa-bianchi.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/1999-46-5/p684-cesa-bianchi/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blumofe:1999:SMC,
  author =       "Robert D. Blumofe and Charles E. Leiserson",
  title =        "Scheduling multithreaded computations by work
                 stealing",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "5",
  pages =        "720--748",
  month =        sep,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 6 18:19:41 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-5/p720-blumofe/p720-blumofe.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/1999-46-5/p720-blumofe/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Abadi:1999:STS,
  author =       "Mart{\'\i}n Abadi",
  title =        "Secrecy by typing in security protocols",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "5",
  pages =        "749--786",
  month =        sep,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 6 18:19:41 MST 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Leighton:1999:MMF,
  author =       "Tom Leighton and Satish Rao",
  title =        "Multicommodity max-flow min-cut theorems and their use
                 in designing approximation algorithms",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "6",
  pages =        "787--832",
  month =        nov,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 28 18:17:55 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-6/p787-leighton/p787-leighton.pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "approximation algorithms; divide and conquer; graph
                 bisection; graph partitioning; maximum flow; minimum
                 cut; multicommodity flow; routing; VLSI layout",
  subject =      "Theory of Computation ---- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2); General Terms: Algorithms",
}

@Article{Zhou:1999:ABB,
  author =       "Yunhong Zhou and Subhash Suri",
  title =        "Analysis of a bounding box heuristic for object
                 intersection",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "6",
  pages =        "833--857",
  month =        nov,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 28 18:17:55 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-6/p833-zhou/p833-zhou.pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "aspect ratio; bounding box; collision detection; scale
                 factor",
  subject =      "Theory of Computation ---- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2); Mathematics of Computing ----
                 Discrete Mathematics --- Combinatorics (G.2.1);
                 Computing Methodologies ---- Computer Graphics ---
                 Computational Geometry and Object Modeling (I.3.5);
                 General Terms: Performance, Theory",
}

@Article{Herlihy:1999:TSA,
  author =       "Maurice Herlihy and Nir Shavit",
  title =        "The topological structure of asynchronous
                 computability",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "6",
  pages =        "858--923",
  month =        nov,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 28 18:17:55 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-6/p858-herlihy/p858-herlihy.pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algebraic topology; asynchronous distributed
                 computation; decision tasks; distributed computing;
                 homology; simplicial complex; wait-tree algorithms",
  subject =      "Theory of Computation ---- Computation by Abstract
                 Devices --- Models of Computation (F.1.1):
                 Computability theory; Theory of Computation ----
                 Computation by Abstract Devices --- Modes of
                 Computation (F.1.2): Parallelism and concurrency",
}

@Article{Mohring:1999:ASS,
  author =       "Rolf H. M{\"o}hring and Andreas S. Schulz and Marc
                 Uetz",
  title =        "Approximation in stochastic scheduling: the power of
                 {LP}-based priority policies",
  journal =      j-J-ACM,
  volume =       "46",
  number =       "6",
  pages =        "924--942",
  month =        nov,
  year =         "1999",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 28 18:17:55 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/1999-46-6/p924-mohring/p924-mohring.pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "approximation; asymptotic optimality; LP-relaxation;
                 priority policy; stochastic scheduling; worst-case
                 performance; WSEPT rule",
  subject =      "Theory of Computation ---- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2): Sequencing and scheduling;
                 Mathematics of Computing ---- Discrete Mathematics ---
                 Combinatorics (G.2.1): Combinatorial algorithms;
                 Mathematics of Computing ---- Numerical Analysis ---
                 Optimization (G.1.6): Linear programming; Theory of
                 Computation ---- Computation by Abstract Devices ---
                 Modes of Computation (F.1.2): Online computation",
}

@Article{Bartal:2000:HSA,
  author =       "Yair Bartal and Eddie Grove",
  title =        "The harmonic $k$-server algorithm is competitive",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "1",
  pages =        "1--15",
  month =        jan,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 25 10:44:32 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-1/p1-bartal/",
  abstract =     "The $k$-server problem is a generalization of the
                 paging problems, and is the most studied problem in the
                 area of competitive online problems. The Harmonic
                 algorithm is a very natural and simple randomized
                 algorithm for the $k$-server problem. We give a simple
                 proof that the Harmonic $k$-server algorithm is
                 competitive. The competitive ratio we prove is the best
                 currently known fo the algorithm. The Harmonic
                 algorithm is memoryless and time-efficient. This is the
                 only such algorithm known to be competitive for the
                 $k$-server problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Algorithms; Performance; Theory; Verification",
  subject =      "Software --- Operating Systems --- Storage Management
                 (D.4.2); Mathematics of Computing --- Probability and
                 Statistics (G.3): {\bf Probabilistic algorithms
                 (including Monte Carlo)}",
}

@Article{Dymond:2000:PRO,
  author =       "Patrick W. Dymond and Walter L. Ruzzo",
  title =        "Parallel {RAMs} with owned global memory and
                 deterministic context-free language recognition",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "1",
  pages =        "16--45",
  month =        jan,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 28 17:49:18 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-1/p16-dymond/",
  abstract =     "We identify and study a natural and frequently
                 occurring subclass of Concurrent Read, Exclusive Write
                 Parallel Random Access Machines (CREW-PRAMs). Called
                 Concurrent Read, Owner Write, or CROW-PRAMS, these are
                 machines in which each global memory location is
                 assigned a unique ``owner and rdquo processor, which is
                 the only processor allowed to write into it.
                 Considering the difficulties that would be involved in
                 physically realizing a full CREW-PRAM model and
                 demonstrate its stability under several definitional
                 changes. Second, we precisely characterize the power of
                 the CROW-PRAM by showing that the class of languages
                 recognizable by it in time $ O(\log n) $ (and
                 implicitly with a polynomial number of processors) is
                 exactly the class LOGDCFL of languages log space
                 reducible to deterministic context-free languages.
                 Third, using the same basic machinery, we show that the
                 recognition problem for deterministic context-free
                 languages can be solved quickly on a deterministic
                 auxilliary pushdown automation having random access to
                 its input tape, a $ \log n $ space work tape, and
                 pushdown store of small maximum height. For example,
                 time $ O(n^{1 + \epsilon }) $ is achievable with
                 pushdown height $ O(\log^2 n) $. These result extend
                 and unify work of von Braunm{\"o}hl, Cook, Mehlhorn,
                 and Verbeek; Klein and Reif; Rytter.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "CROW-PRAM; DCFL recognition; owner write; parallel
                 algorithms",
  subject =      "Theory of Computation --- Computation by Abstract
                 Devices --- Models of Computation (F.1.1): Automata;
                 Theory of Computation --- Computation by Abstract
                 Devices --- Models of Computation (F.1.1):
                 Unbounded-action devices; Theory of Computation ---
                 Computation by Abstract Devices --- Modes of
                 Computation (F.1.2): Parallelism and concurrency;
                 Theory of Computation --- Computation by Abstract
                 Devices --- Complexity Measures and Classes (F.1.3):
                 Relations among complexity classes; Theory of
                 Computation --- Analysis of Algorithms and Problem
                 Complexity --- Nonnumerical Algorithms and Problems
                 (F.2.2): Computations on discrete structures; Theory of
                 Computation --- Mathematical Logic and Formal Languages
                 --- Grammars and Other Rewriting Systems (F.4.2):
                 Parsing; General Terms: Algorithms, Theory",
}

@Article{Karger:2000:MCN,
  author =       "David R. Karger",
  title =        "Minimum cuts in near-linear time",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "1",
  pages =        "46--76",
  month =        jan,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 28 17:49:18 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-1/p46-karger/",
  abstract =     "We significantly improve known time bounds for solving
                 the minimum cut problem on undirected graphs. We use a
                 ``semiduality'' between minimum cuts and maximum
                 spanning tree packings combined with our previously
                 developed random sampling techniques. We give a
                 randomized (Monte Carlo) algorithm that finds a minimum
                 cut in an $m$-edge, $n$-vertex graph with high
                 probability in $ O(m \log^3 n)$ time. We also give a
                 simpler randomized algorithm that finds all minimum
                 cuts with high probability in $ O(m \log^3 n)$ time.
                 This variant has an optimal RNC parallelization. Both
                 variants improve on the previous best time bound of $
                 O(n^2 \log^3 n)$. Other applications of the
                 tree-packing approach are new, nearly tight bounds on
                 the number of near-minimum cuts a graph may have and a
                 new data structure for representing them in a
                 space-efficient manner.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "connectivity; min-cut; Monte Carlo algorithm;
                 optimization; tree packing",
  subject =      "Data --- Data Structures (E.1); Theory of Computation
                 --- Analysis of Algorithms and Problem Complexity ---
                 Nonnumerical Algorithms and Problems (F.2.2);
                 Mathematics of Computing --- Discrete Mathematics ---
                 Combinatorics (G.2.1); Mathematics of Computing ---
                 Discrete Mathematics --- Graph Theory (G.2.2);
                 Mathematics of Computing --- Probability and Statistics
                 (G.3); General Terms: Algorithms, Theory",
}

@Article{Eiter:2000:ESO,
  author =       "Thomas Eiter and Yuri Gurevich and Georg Gottlob",
  title =        "Existential second-order logic over strings",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "1",
  pages =        "77--131",
  month =        jan,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 28 17:49:18 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-1/p77-eiter/",
  abstract =     "Existential second-order logic (ESO) and monadic
                 second-order logic(MSO) have attracted much interest in
                 logic and computer science. ESO is a much expressive
                 logic over successor structures than MSO. However,
                 little was known about the relationship between MSO and
                 syntactic fragments of ESO. We shed light on this issue
                 by completely characterizing this relationship for the
                 prefix classes of ESO over strings, (i.e., finite
                 successor structures). Moreover, we determine the
                 complexity of model checking over strings, for all
                 ESO-prefix classes. Let ESO(\sc Q) denote the prefix
                 class containing all sentences of the shape $ \exists
                 {\bf R}Q \phi $, where $ {\bf R} $ is a list of
                 predicate variables, $Q$ is a first-order quantifier
                 prefix from the prefix set ($ \sc Q$), and ($ \phi $)
                 is quantifier-free. We show that ESO($ \exists *
                 \forall \exists *$) and ESO($ \exists * \forall \forall
                 $) are the maximal standard ESO-prefix classes
                 contained in MSO, thus expressing only regular
                 languages. We also give a precise characterization of
                 those ESO-prefix classes that are {\em equivalent\/} to
                 MSO over strings, and of the ESO-prefix classes which
                 are closed under complementation on strings.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "decision problem; descriptive complexity; existential
                 fragment; finite model theory; finite satisfiability;
                 finite words; model checking; NP; prefix classes;
                 regular languages; S1S; second-order logic; SIS;
                 strings",
  subject =      "Theory of Computation --- Computation by Abstract
                 Devices --- Models of Computation (F.1.1): Automata;
                 Theory of Computation --- Computation by Abstract
                 Devices --- Models of Computation (F.1.1): Relations
                 between models; Theory of Computation --- Analysis of
                 Algorithms and Problem Complexity --- Nonnumerical
                 Algorithms and Problems (F.2.2): Computations on
                 discrete structures; Theory of Computation ---
                 Mathematical Logic and Formal Languages ---
                 Mathematical Logic (F.4.1): Computational logic; Theory
                 of Computation --- Mathematical Logic and Formal
                 Languages --- Mathematical Logic (F.4.1): Model theory;
                 Theory of Computation --- Mathematical Logic and Formal
                 Languages --- Formal Languages (F.4.3): Classes defined
                 by grammars or automata; General Terms: Theory",
}

@Article{Cohen:2000:PTN,
  author =       "Edith Cohen",
  title =        "Polylog-time and near-linear work approximation scheme
                 for undirected shortest paths",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "1",
  pages =        "132--166",
  month =        jan,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Oct 21 15:17:10 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-1/p132-cohen/",
  abstract =     "Shortest paths computations constitute one of the most
                 fundamental network problems. Nonetheless, known
                 parallel shortest-paths algorithms are generally
                 inefficient: they perform significantly more work
                 (product of time and processors) than their sequential
                 counterparts. This gap, known in the literature as the
                 ``transitive closure bottleneck,'' poses a
                 long-standing open problem. Our main result is an $ O(m
                 n^{\epsilon_0} + s(m + n^{1 + \epsilon_0})) $ work
                 polylog-time randomized algorithm \ldots{}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  subject =      "Categories and Subject Descriptors: Theory of
                 Computation --- Computation by Abstract Devices ---
                 Modes of Computation (F.1.2); Theory of Computation ---
                 Analysis of Algorithms and Problem Complexity ---
                 Nonnumerical Algorithms and Problems (F.2.2);
                 Mathematics of Computing --- Discrete Mathematics ---
                 Graph Theory (G.2.2); General Terms: Algorithms,
                 Theory",
}

@Article{OHearn:2000:APL,
  author =       "Peter W. O'Hearn and John C. Reynolds",
  title =        "From {Algol} to polymorphic linear Lambda-calculus",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "1",
  pages =        "167--223",
  month =        jan,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 28 17:49:18 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-1/p167-o_hearn/",
  abstract =     "In a linearly-typed functional language, one can
                 define functions that consume their arguments in the
                 process of computing their results. This is reminiscent
                 of state transformations in imperative languages, where
                 execution of an assignment statement alters the
                 contents of the store. We explore this connection by
                 translating two variations on Algol 60 into a purely
                 functional language with polymorphic linear types. On
                 the one hand, the translations lead to a semantic
                 analysis of Algol-like programs, in terms of a model of
                 the linear language. On the other hand, they
                 demonstrate that a linearly-typed functional language
                 can be at least as expressive as Algol.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "linear logic; local state; logical relations;
                 parametric polymorphism",
  subject =      "Software --- Programming Languages --- Formal
                 Definitions and Theory (D.3.1): Semantics; Theory of
                 Computation --- Logics and Meanings of Programs ---
                 Semantics of Programming Languages (F.3.2):
                 Denotational semantics; General Terms: Languages,
                 Theory",
}

@Article{Franklin:2000:EGG,
  author =       "Matthew Franklin and Zvi Galil and Moti Yung",
  title =        "Eavesdropping games: a graph-theoretic approach to
                 privacy in distributed systems",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "2",
  pages =        "225--243",
  month =        mar,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-2/p225-franklin/",
  abstract =     "We initiate a graph-theoretic study of privacy in
                 distributed environments with mobile eavesdroppers
                 (``bugs''). For two privacy tasks --- distributed
                 database maintenance and message transmission --- a
                 computationally unbounded adversary ``plays an
                 eavesdropping game,'' coordinating the moment of the
                 bugs among the sites to learn the current memory
                 contents. Many different adversaries are considered,
                 motivated by differences in eavesdropping technologies.
                 We characterize the feasibility of the two privacy
                 tasks combinatorially, construct protocols for the
                 feasible cases, and analyze their computational
                 complexity.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; security; theory",
  subject =      "Mathematics of Computing --- Discrete Mathematics ---
                 Graph Theory (G.2.2); Mathematics of Computing ---
                 Discrete Mathematics --- Graph Theory (G.2.2): {\bf
                 Graph algorithms}",
}

@Article{Varghese:2000:FSC,
  author =       "George Varghese and Mahesh Jayaram",
  title =        "The fault span of crash failures",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "2",
  pages =        "244--293",
  month =        mar,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-2/p244-varghese/",
  abstract =     "A crashing network protocol is an asynchronous
                 protocol whose memory does not survive crashes. We show
                 that a crashing network protocol that works over
                 unreliable links can be driven to arbitrary global
                 states, where each node is in a state reached in some
                 (possibly different) execution, and each link has an
                 arbitrary mixture of packets sent in (possibly
                 different) executions. Our theorem considerably
                 generalizes an earlier result, due to Fekete et al.,
                 which states that there is no correct crashing Data
                 Link Protocol. For example, we prove that there is no
                 correct crashing protocol for token passing and for
                 many other resource allocation protocols such as
                 $k$-exclusion, and the drinking and dining philosophers
                 problems. We further characterize the reachable states
                 caused by crash failures using reliable non-FIFO and
                 reliable FIFO links. We show that with reliable
                 non-FIFO links any acyclic subset of nodes and links
                 can be driven to arbitrary states. We show that with
                 reliable FIFO links, only nodes can be driven to
                 arbitrary states. Overall, we show a strict hierarchy
                 in terms of the set of states reachable by crash
                 failures in the three link models.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "theory",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2): {\bf Computations on discrete
                 structures}; Mathematics of Computing --- Discrete
                 Mathematics --- Graph Theory (G.2.2); Mathematics of
                 Computing --- Discrete Mathematics --- Graph Theory
                 (G.2.2): {\bf Graph algorithms}",
}

@Article{Armoni:2000:SAC,
  author =       "Roy Armoni and Amnon Ta-Shma and Avi Widgerson and
                 Shiyu Zhou",
  title =        "An $ {O(\log (n)^{4 / 3})} $ space algorithm for $ (s,
                 t) $ connectivity in undirected graphs",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "2",
  pages =        "294--311",
  month =        mar,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-2/p294-armoni/",
  abstract =     "We present a deterministic algorithm that computes $ s
                 t$-connectivity in undirected graphs using $ O(\log^{4
                 / 3}n)$ space. This improves the previous $ O(\log^{3 /
                 2}n)$ bound of Nisan et al. [1992].",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "computational complexity; derandomization; short
                 pseudorandom walks on graphs; space bounded
                 computations; undirected graph connectivity",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2); Mathematics of Computing --- Discrete
                 Mathematics --- Graph Theory (G.2.2); Mathematics of
                 Computing --- Probability and Statistics (G.3)",
}

@Article{Kupferman:2000:ATA,
  author =       "Orna Kupferman and Moshe Y. Vardi and Pierre Wolper",
  title =        "An automata-theoretic approach to branching-time model
                 checking",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "2",
  pages =        "312--360",
  month =        mar,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-2/p312-kupferman/",
  abstract =     "Translating linear temporal logic formulas to automata
                 has proven to be an effective approach for implementing
                 linear-time model-checking, and for obtaining many
                 extensions and improvements to this verification
                 method. On the other hand, for branching temporal
                 logic, automata-theoretic techniques have long been
                 thought to introduce an exponential penalty, making
                 them essentially useless for model-checking. Recently,
                 Bernholtz and Grumberg [1993] have shown that this
                 exponential penalty can be avoided, though they did not
                 match the linear complexity of non-automata-theoretic
                 algorithms. In this paper, we show that {\em
                 alternating tree automata\/} are the key to a
                 comprehensive automata-theoretic framework for
                 branching temporal logics. Not only can they be used to
                 obtain optimal decision procedures, as was shown by
                 Muller et al., but, as we show here, they also make it
                 possible to derive optimal model-checking algorithms.
                 Moreover, the simple combinatorial structure that
                 emerges from the automata-theoretic approach opens up
                 new possibilities for the implementation of
                 branching-time model checking and has enabled us to
                 derive improved space complexity bounds for this
                 long-standing problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; verification",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2): {\bf Computations on discrete
                 structures}; Mathematics of Computing --- Discrete
                 Mathematics --- Graph Theory (G.2.2); Mathematics of
                 Computing --- Discrete Mathematics --- Graph Theory
                 (G.2.2): {\bf Graph algorithms}",
}

@Article{Giacobazzi:2000:MAI,
  author =       "Roberto Giacobazzi and Francesco Ranzato and Francesca
                 Scozzari",
  title =        "Making abstract interpretations complete",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "2",
  pages =        "361--416",
  month =        mar,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-2/p361-giacobazzi/",
  abstract =     "Completeness is an ideal, although uncommon, feature
                 of abstract interpretations, formalizing the intuition
                 that, relatively to the properties encoded by the
                 underlying abstract domains, there is no loss of
                 information accumulated in abstract computations. Thus,
                 complete abstract interpretations can be rightly
                 understood as optimal. We deal with both pointwise
                 completeness, involving generic semantic operations,
                 and (least) fixpoint completeness. Completeness and
                 fixpoint completeness are shown to be properties that
                 depend on the underlying abstract domains only. Our
                 primary goal is then to solve the problem of making
                 abstract interpretations complete by minimally
                 extending or restricting the underlying abstract
                 domains. Under the weak and reasonable hypothesis of
                 dealing with continuous semantic operations, we provide
                 constructive characterizations for the least complete
                 extensions and the greatest complete restrictions of
                 abstract domains. As far as fixpoint completeness is
                 concerned, for merely monotone semantic operators, the
                 greatest restrictions of abstract domains are
                 constructively characterized, while it is shown that
                 the existence of least extensions of abstract domains
                 cannot be, in general, guaranteed, even under strong
                 hypotheses. These methodologies, which in finite
                 settings give rise to effective algorithms, provide
                 advanced formal tools for manipulating and comparing
                 abstract interpretations, useful both in static program
                 analysis and in semantics design. A number of examples
                 illustrating these techniques are given.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "languages; theory",
  subject =      "Software --- Programming Languages --- Formal
                 Definitions and Theory (D.3.1): {\bf Semantics}; Theory
                 of Computation --- Logics and Meanings of Programs ---
                 Semantics of Programming Languages (F.3.2): {\bf
                 Program analysis}",
}

@Article{Canny:2000:SBA,
  author =       "John F. Canny and Ioannis Z. Emiris",
  title =        "A subdivision-based algorithm for the sparse
                 resultant",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "3",
  pages =        "417--451",
  month =        may,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-3/p417-canny/",
  abstract =     "Multivariate resultants generalize the Sylvester
                 resultant of two polynomials and characterize the
                 solvability of a polynomial system. They also reduce
                 the computation of all common roots to a problem in
                 linear algebra. We propose a determinantal formula for
                 the sparse resultant of an arbitrary system of $ n + 1
                 $ polynomials in $n$ variables. This resultant
                 generalizes the classical one and has significantly
                 lower degree for polynomials that are sparse in the
                 sense that their mixed volume is lower than their
                 B{\'e}zout number. Our algorithm uses a mixed
                 polyhedral subdivision of the Minkowski sum of the
                 Newton polytopes in order to construct a Newton matrix.
                 Its determinant is a nonzero multiple of the sparse
                 resultant and the latter equals the GCD of at most $ n
                 + 1$ such determinants. This construction implies a
                 restricted version of an effective sparse
                 Nullstellensatz. For an arbitrary specialization of the
                 coefficients, there are two methods that use one extra
                 variable and yield the sparse resultant. This is the
                 first algorithm to handle the general case with
                 complexity polynomial in the resultant degree and
                 simply exponential in $n$. We conjecture its extension
                 to producing an exact rational expression for the
                 sparse resultant.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "asymptotic complexity; effective Nullstellensatz;
                 mixed volume; multivariate resultant; Newton polytope;
                 polyhedral subdivision; sparse elimination theory",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Numerical Algorithms and
                 Problems (F.2.1): {\bf Computations on matrices};
                 Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Numerical Algorithms and
                 Problems (F.2.1): {\bf Computations on polynomials};
                 Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2): {\bf Computations on discrete
                 structures}; Theory of Computation --- Analysis of
                 Algorithms and Problem Complexity --- Nonnumerical
                 Algorithms and Problems (F.2.2): {\bf Geometrical
                 problems and computations}; Computing Methodologies ---
                 Symbolic and Algebraic Manipulation --- Algorithms
                 (I.1.2): {\bf Algebraic algorithms}; Computing
                 Methodologies --- Symbolic and Algebraic Manipulation
                 --- Algorithms (I.1.2): {\bf Analysis of algorithms}",
}

@Article{Brafman:2000:ATT,
  author =       "Ronen I. Brafman and Moshe Tennenholtz",
  title =        "An axiomatic treatment of three qualitative decision
                 criteria",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "3",
  pages =        "452--482",
  month =        may,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 25 10:44:32 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p452-brafman/",
  abstract =     "The need for computationally efficient decision-making
                 techniques together with the desire to simplify the
                 processes of knowledge acquisition and agent
                 specification have led various researchers in
                 artificial intelligence to examine qualitative decision
                 tools. However, the adequacy of such tools is not
                 clear. This paper investigates the foundations of {\em
                 maximin}, {\em minmax regret}, and {\em competitive
                 ratio}, three central qualitative decision criteria, by
                 characterizing those behaviors that could result from
                 their use. This characterization provides two important
                 insights: (1) under what conditions can we employ an
                 agent model based on these basic qualitative decision
                 criteria, and (2) how ``rational'' are these decision
                 procedures. For the {\em competitive ratio\/} criterion
                 in particular, this latter issue is of central
                 importance to our understanding of current work on
                 on-line algorithms. Our main result is a constructive
                 representation theorem that uses two choice axioms to
                 characterize {\em maximin}, {\em minmax regret}, and
                 {\em competitive ratio}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "agent models; choice theory; foundations of online
                 algorithms; qualitative decision theory",
  subject =      "Computing Methodologies --- Artificial Intelligence
                 (I.2)",
}

@Article{Karhumaki:2000:ELR,
  author =       "Juhani Karhum{\"a}ki and Filippo Mignosi and Wojciech
                 Plandowski",
  title =        "The expressibility of languages and relations by word
                 equations",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "3",
  pages =        "483--505",
  month =        may,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 25 10:44:32 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p483-karhumaki/",
  abstract =     "Classically, several properties and relations of
                 words, such as ``being a power of the same word'' can
                 be expressed by using word equations. This paper is
                 devoted to a general study of the expressive power of
                 word equations. As main results we prove theorems which
                 allow us to show that certain properties of words are
                 not expressible as components of solutions of word
                 equations. In particular, ``the primitiveness'' and
                 ``the equal length'' are such properties, as well as
                 being ``any word over a proper subalphabet''.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "word equations",
  subject =      "Theory of Computation --- Mathematical Logic and
                 Formal Languages --- Miscellaneous (F.4.m)",
}

@Article{Beimel:2000:LFR,
  author =       "Amos Beimel and Francesco Bergadano and Nader H.
                 Bshouty and Eyal Kushilevitz and Stefano Varricchio",
  title =        "Learning functions represented as multiplicity
                 automata",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "3",
  pages =        "506--530",
  month =        may,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 25 10:44:32 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p506-beimel/",
  abstract =     "We study the learnability of multiplicity automata in
                 Angluin's {\em exact learning model}, and we
                 investigate its applications. Our starting point is a
                 known theorem from automata theory relating the number
                 of states in a minimal multiplicity automaton for a
                 function to the rank of its Hankel matrix. With this
                 theorem in hand, we present a new simple algorithm for
                 learning multiplicity automata with improved time and
                 query complexity, and we prove the learnability of
                 various concept classes. These include (among
                 others):\par

                 \begin{itemize} \item The class of disjoint DNF, and
                 more generally satisfy-$ O(1) $ DNF. \item The class of
                 polynomials over finite fields. \item The class of
                 bounded-degree polynomials over infinite fields. \item
                 The class of XOR of terms. \item Certain classes of
                 boxes in high dimensions. \end{itemize}\par

                 In addition, we obtain the best query complexity for
                 several classes known to be learnable by other methods
                 such as decision trees and polynomials over $ {\rm
                 GF}(2) $.\par

                 While multiplicity automata are shown to be useful to
                 prove the learnability of some subclasses of DNF
                 formulae and various other classes, we study the
                 limitations of this method. We prove that this method
                 cannot be used to resolve the learnability of some
                 other open problems such as the learnability of general
                 DNF formulas or even $k$-term DNF for $ k = \omega
                 (\log n)$ or satisfy-$s$ DNF formulas for $ s = \omega
                 (1)$. These results are proven by exhibiting functions
                 in the above classes that require multiplicity automata
                 with super-polynomial number of states.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "computational learning; DNF; learning disjoint;
                 learning polynomials; multiplicity automata",
  subject =      "Theory of Computation --- Computation by Abstract
                 Devices --- Models of Computation (F.1.1); Theory of
                 Computation --- Analysis of Algorithms and Problem
                 Complexity (F.2); Computing Methodologies ---
                 Artificial Intelligence --- Learning (I.2.6)",
}

@Article{Pierce:2000:BEP,
  author =       "Benjamin C. Pierce and Davide Sangiorgi",
  title =        "Behavioral equivalence in the polymorphic
                 pi-calculus",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "3",
  pages =        "531--584",
  month =        may,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 25 10:44:32 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p531-pierce/",
  abstract =     "We investigate {\em parametric polymorphism\/} in
                 message-based concurrent programming, focusing on
                 behavioral equivalences in a typed process calculus
                 analogous to the polymorphic lambda-calculus of Girard
                 and Reynolds.\par

                 Polymorphism constrains the power of observers by
                 preventing them from directly manipulating data values
                 whose types are abstract, leading to notions of
                 equivalence much coarser than the standard untyped
                 ones. We study the nature of these constraints through
                 simple examples of concurrent abstract data types and
                 develop basic theoretical machinery for establishing
                 bisimilarity of polymorphic processes.\par

                 We also observe some surprising interactions between
                 polymorphism and aliasing, drawing examples from both
                 the polymorphic pi-calculus and ML.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "abstract data types; pi-calculus",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Concurrent
                 programming structures}; Software --- Programming
                 Languages --- Language Constructs and Features (D.3.3):
                 {\bf Polymorphism}; Theory of Computation ---
                 Computation by Abstract Devices --- Modes of
                 Computation (F.1.2): {\bf Parallelism and concurrency};
                 Theory of Computation --- Logics and Meanings of
                 Programs --- Semantics of Programming Languages
                 (F.3.2): {\bf Operational semantics}; Theory of
                 Computation --- Logics and Meanings of Programs ---
                 Studies of Program Constructs (F.3.3): {\bf Type
                 structure}",
}

@Article{Even:2000:DCA,
  author =       "Guy Even and Joseph (Seffi) Naor and Satish Rao and
                 Baruch Schieber",
  title =        "Divide-and-conquer approximation algorithms via
                 spreading metrics",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "4",
  pages =        "585--616",
  month =        jul,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-4/p585-even/",
  abstract =     "We present a novel divide-and-conquer paradigm for
                 approximating NP-hard graph optimization problems. The
                 paradigm models graph optimization problems that
                 satisfy two properties: First, a divide-and-conquer
                 approach is applicable. Second, a fractional spreading
                 metric is computable in polynomial time. The spreading
                 metric assigns lengths to either edges or vertices of
                 the input graph, such that all subgraphs for which the
                 optimization problem is nontrivial have large
                 diameters. In addition, the spreading metric provides a
                 lower bound, $ \tau $, on the cost of solving the
                 optimization problem.\par

                 We present a polynomial time approximation algorithm
                 for problems modeled by our paradigm whose
                 approximation factor is $ O(\min (\log \tau, \log \log
                 \tau, \log k \log \log k)) $ where $k$ denotes the
                 number of ``interesting'' vertices in the problem
                 instance, and is at most the number of vertices. We
                 present seven problems that can be formulated to fit
                 the paradigm. For all these problems our algorithm
                 improves previous results. The problems are: (1) linear
                 arrangement; (2) embedding a graph in a $d$-dimensional
                 mesh; (3) interval graph completion; (4) minimizing
                 storage-time product; (5) subset feedback sets in
                 directed graphs and multicuts in circular networks; (6)
                 symmetric multicuts in directed networks; (7) balanced
                 partitions and $p$-separators (for small values of $
                 \rho $) in directed graphs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "approximation algorithms; divide and conquer; feedback
                 set; linear arrangement; multicut; spreading metrics",
  subject =      "Mathematics of Computing --- Discrete Mathematics ---
                 Graph Theory (G.2.2): {\bf Graph algorithms};
                 Mathematics of Computing --- Discrete Mathematics ---
                 Graph Theory (G.2.2): {\bf Network problems}; Theory of
                 Computation --- Analysis of Algorithms and Problem
                 Complexity --- Nonnumerical Algorithms and Problems
                 (F.2.2): {\bf Computations on discrete structures}",
}

@Article{Kalyanasundaram:2000:SPC,
  author =       "Bala Kalyanasundaram and Kirk Prauhs",
  title =        "Speed is as powerful as clairvoyance",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "4",
  pages =        "617--643",
  month =        jul,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-4/p617-kalyanasundaram/",
  abstract =     "We introduce resource augmentation as a method for
                 analyzing online scheduling problems. In resource
                 augmentation analysis the on-line scheduler is given
                 more resources, say faster processors or more
                 processors, than the adversary. We apply this analysis
                 to two well-known on-line scheduling problems, the
                 classic uniprocessor CPU scheduling problem $ 1 |r_i,
                 {\rm pmtn}| \sum F_i $, and the best-effort firm
                 real-time scheduling problem $ 1 |r_i, {\rm pmtn}| \sum
                 w_i(1 - U_i) $. It is known that there are no constant
                 competitive nonclairvoyant on-line algorithms for these
                 problems. We show that there are simple on-line
                 scheduling algorithms for these problems that are
                 constant competitive if the online scheduler is
                 equipped with a slightly faster processor than the
                 adversary. Thus, a moderate increase in processor speed
                 effectively gives the on-line scheduler the power of
                 clairvoyance. Furthermore, the on-line scheduler can be
                 constant competitive on all inputs that are not closely
                 correlated with processor speed. We also show that the
                 performance of an on-line scheduler is best-effort real
                 time scheduling can be significantly improved if the
                 system is designed in such a way that the laxity of
                 every job is proportional to its length.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "multi-level feedback scheduling; resource
                 augmentation; scheduling",
  subject =      "Software --- Operating Systems --- Process Management
                 (D.4.1): {\bf Scheduling}; Theory of Computation ---
                 Analysis of Algorithms and Problem Complexity ---
                 Nonnumerical Algorithms and Problems (F.2.2): {\bf
                 Sequencing and scheduling}",
}

@Article{Benedikt:2000:RQI,
  author =       "Michael Benedikt and Leonid Libkin",
  title =        "Relational queries over interpreted structures",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "4",
  pages =        "644--680",
  month =        jul,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-4/p644-benedikt/",
  abstract =     "We rework parts of the classical relational theory
                 when the underlying domain is a structure with some
                 interpreted operations that can be used in queries. We
                 identify parts of the classical theory that go through
                 'as before' when interpreted structure is present,
                 parts that go through only for classes of nicely
                 behaved structures, and parts that only arise in the
                 interpreted case. The first category include a number
                 of results on language equivalence and expressive power
                 characterizations for the active-domain semantics for a
                 variety of logics. Under this semantics, quantifiers
                 range over elements of a relational database. The main
                 kind of results we prove here are {\em generic
                 collapse\/} results: for generic queries, adding
                 operations beyond order, does not give us extra
                 power.\par

                 The second category includes results on the natural
                 semantics, under which quantifiers range over the
                 entire interpreted structure. We prove, for a variety
                 of structures, {\em natural-active collapse\/} results,
                 showing that using unrestricted quantification does not
                 give us any extra power. Moreover, for a variety of
                 structures, including the real field, we give a set of
                 algorithms for eliminating unbounded quantifications in
                 favor of bounded ones. Furthermore, we extend these
                 collapse results to a new class of higher-order logics
                 that mix unbounded and bounded quantification. We give
                 a set of normal forms for these logics, under special
                 conditions on the interpreted structures. As a
                 by-product, we obtain an elementary proof of the fact
                 that parity test is not definable in the relational
                 calculus with polynomial inequality constraints. We
                 also give examples of structures with nice
                 model-theoretic properties over which the
                 natural-active collapse fails.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "0-minimality; collapse results; constraints;
                 quantifier elimination; relational calculus",
  subject =      "Information Systems --- Database Management ---
                 Languages (H.2.3): {\bf Query languages}; Theory of
                 Computation --- Mathematical Logic and Formal Languages
                 --- Mathematical Logic (F.4.1): {\bf Logic and
                 constraint programming}; Theory of Computation ---
                 Mathematical Logic and Formal Languages ---
                 Mathematical Logic (F.4.1): {\bf Model theory}",
}

@Article{Mundhenk:2000:CFH,
  author =       "Martin Mundhenk and Judy Goldsmith and Christopher
                 Lusena and Eric Allender",
  title =        "Complexity of finite-horizon {Markov} decision process
                 problems",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "4",
  pages =        "681--720",
  month =        jul,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-4/p681-mundhenk/",
  abstract =     "Controlled stochastic systems occur in science
                 engineering, manufacturing, social sciences, and many
                 other contexts. If the systems is modeled as a Markov
                 decision process (MDP) and will run {\/ad infinitum},
                 the optimal control policy can be computed in
                 polynomial time using linear programming. The problems
                 considered here assume that the time that the process
                 will run is finite, and based on the size of the input.
                 There are many factors that compound the complexity of
                 computing the optimal policy. For instance, there are
                 many factors that compound the complexity of this
                 computation. For instance, if the controller does not
                 have complete information about the state of the
                 system, or if the system is represented in some very
                 succinct manner, the optimal policy is provably not
                 computable in time polynomial in the size of the input.
                 We analyze the computational complexity of evaluating
                 policies and of determining whether a sufficiently good
                 policy exists for a MDP, based on a number of
                 confounding factors, including the observability of the
                 system state; the succinctness of the representation;
                 the type of policy; even the number of actions relative
                 to the number of states. In almost every case, we show
                 that the decision problem is complete for some known
                 complexity class. Some of these results are familiar
                 from work by Papadimitriou and Tsitsiklis and others,
                 but some, such as our PL-completeness proofs, are
                 surprising. We include proofs of completeness for
                 natural problems in the as yet little-studied classes $
                 {\rm NP}^{PP} $.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "computational complexity; Markov decision processes;
                 NP; NP PP; partially observable Markov decision
                 processes; PL; PSPACE; succinct representations",
  subject =      "Mathematics of Computing --- Probability and
                 Statistics (G.3): {\bf Markov processes}; Theory of
                 Computation --- Computation by Abstract Devices ---
                 Complexity Measures and Classes (F.1.3): {\bf
                 Reducibility and completeness}; Theory of Computation
                 --- Analysis of Algorithms and Problem Complexity ---
                 Nonnumerical Algorithms and Problems (F.2.2): {\bf
                 Computations on discrete structures}; Computing
                 Methodologies --- Artificial Intelligence --- Problem
                 Solving, Control Methods, and Search (I.2.8): {\bf Plan
                 execution, formation, and generation}",
}

@Article{Rawling:2000:OQL,
  author =       "J. P. Rawling and S. A. Selesnick",
  title =        "Orthologic and quantum logic: models and computational
                 elements",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "4",
  pages =        "721--751",
  month =        jul,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-4/p721-rawling/",
  abstract =     "Motivated by a growing need to understand the
                 computational potential of quantum devices we suggest
                 an approach to the relevant issues via quantum logic
                 and its model theory. By isolating such notions as
                 quantum parallelism and interference within a
                 model-theoretic setting, quite divorced from their
                 customary physical trappings, we seek to lay bare their
                 logical underpinnings and possible computational
                 ramifications.\par

                 In the first part of the paper, a brief account of the
                 relevant model theory is given, and some new results
                 are derived. In the second part, we model the simplest
                 classical gate, namely the $N$-gate, propose a
                 quantization scheme (which translates between classical
                 and quantum models, and from which emerges a logical
                 interpretation of the notion of quantum parallelism),
                 and apply it to the classical $N$-gate model. A class
                 of physical instantiations of the resulting quantum
                 $N$-gate model is also briefly discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Hilbert spaces; quantum computing; quantum logic;
                 quantum physics",
  subject =      "Theory of Computation --- Mathematical Logic and
                 Formal Languages --- Mathematical Logic (F.4.1): {\bf
                 Modal logic}; Theory of Computation --- Mathematical
                 Logic and Formal Languages --- Mathematical Logic
                 (F.4.1): {\bf Model theory}",
}

@Article{Altman:2000:BSO,
  author =       "Eitan Altman and Bruno Gaujal and Arie Hordijk",
  title =        "Balanced sequences and optimal routing",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "4",
  pages =        "752--775",
  month =        jul,
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-4/p752-altman/",
  abstract =     "The objective pursued in this paper is two-fold. The
                 first part addresses the following combinatorial
                 problem: is it possible to construct an infinite
                 sequence over $n$ letters where each letter is
                 distributed as ``evenly'' as possible and appears with
                 a given rate? The second objective of the paper is to
                 use this construction in the framework of optimal
                 routing in queuing networks. We show under rather
                 general assumptions that the optimal deterministic
                 routing in stochastic event graphs is such a
                 sequence.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "balanced sequences; multimodularity; optimal control;
                 stochastic event graphs",
  subject =      "Hardware --- Input/Output and Data Communications ---
                 Performance Analysis and Design Aids (B.4.4); Hardware
                 --- Performance and Reliability --- Performance
                 Analysis and Design Aids (B.8.2)",
}

@Article{Antoy:2000:NNS,
  author =       "Sergio Antoy and Rachid Echahed and Michael Hanus",
  title =        "A needed narrowing strategy",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "4",
  pages =        "776--822",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Sep 20 16:53:37 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jacm/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-4/p776-antoy/",
  abstract =     "The narrowing relation over terms constitutes the
                 basis of the most important operational semantics of
                 languages that integrate functional and logic
                 programming paradigms. It also plays an important role
                 in the definition of some algorithms of unification
                 modulo equational theories that are defined by
                 confluent term rewriting systems. Due to the
                 inefficiency of simple narrowing, many refined
                 narrowing strategies have been proposed in the last
                 decade. This paper presents a new narrowing strategy
                 that is optimal in several respects. For this purpose,
                 we propose a notion of a needed narrowing step that,
                 for inductively sequential rewrite systems, extends the
                 Huet and L{\'e}vy notion of a needed reduction step. We
                 define a strategy, based on this notion, that computes
                 only needed narrowing steps. Our strategy is sound and
                 complete for a large class of rewrite systems, is
                 optimal with respect to the cost measure that counts
                 the number of distinct steps of a derivation, computes
                 only incomparable and disjoint unifiers, and is
                 efficiently implemented by unification.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "call-by-need; functional logic programming languages;
                 narrowing strategies; rewrite systems",
  subject =      "Software --- Programming Techniques --- Applicative
                 (Functional) Programming (D.1.1); Software ---
                 Programming Techniques --- Logic Programming (D.1.6);
                 Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Control
                 structures}; Software --- Programming Languages ---
                 Processors (D.3.4): {\bf Optimization}; Theory of
                 Computation --- Mathematical Logic and Formal Languages
                 --- Grammars and Other Rewriting Systems (F.4.2): {\bf
                 Grammar types}; Mathematics of Computing --- Discrete
                 Mathematics --- Graph Theory (G.2.2): {\bf Trees};
                 Computing Methodologies --- Symbolic and Algebraic
                 Manipulation --- Expressions and Their Representation
                 (I.1.1): {\bf Simplification of expressions}",
}

@Article{Halpern:2000:EBR,
  author =       "Joe Halpern",
  title =        "Editorial: a bill of rights and responsibilities",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "5",
  pages =        "823--825",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p823-halpern/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cohen:2000:BTD,
  author =       "David Cohen and Peter Jeavons and Peter Jonsson and
                 Manolis Koubarakis",
  title =        "Building tractable disjunctive constraints",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "5",
  pages =        "826--853",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p826-cohen/",
  abstract =     "Many combinatorial search problems can be expressed as
                 `constraint satisfaction problems'. This class of
                 problems is known to be NP-hard in general, but a
                 number of restricted constraint classes have been
                 identified which ensure tractability. This paper
                 presents the first general results on combining
                 tractable constraint classes to obtain larger, more
                 general, tractable classes. We give examples to show
                 that many known examples of tractable constraint
                 classes, from a wide variety of different contexts, can
                 be constructed from simpler tractable classes using a
                 general method. We also construct several new tractable
                 classes that have not previously been identified.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "complexity; constraint satisfaction problem;
                 disjunctive constraints; independence; NP-completeness;
                 relations",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2): {\bf Computations on discrete
                 structures}; Mathematics of Computing --- Discrete
                 Mathematics --- Combinatorics (G.2.1): {\bf
                 Combinatorial algorithms}; Computing Methodologies ---
                 Artificial Intelligence --- Knowledge Representation
                 Formalisms and Methods (I.2.4): {\bf Relation
                 systems}",
}

@Article{Valiant:2000:NAC,
  author =       "Leslie G. Valiant",
  title =        "A neuroidal architecture for cognitive computation",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "5",
  pages =        "854--882",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p854-valiant/",
  abstract =     "An architecture is described for designing systems
                 that acquire and manipulate large amounts of
                 unsystematized, or so-called commonsense, knowledge.
                 Its aim is to exploit to the full those aspects of
                 computational learning that are known to offer powerful
                 solutions in the acquisition and maintenance of robust
                 knowledge bases. The architecture makes explicit the
                 requirements on the basic computational tasks that are
                 to be performed and is designed to make this
                 computationally tractable even for very large
                 databases. The main claims are that (i) the basic
                 learning and deduction tasks are provably tractable and
                 (ii) tractable learning offers viable approaches to a
                 range of issues that have been previously identified as
                 problematic for artificial intelligence systems that
                 are programmed. Among the issues that learning offers
                 to resolve are robustness to inconsistencies,
                 robustness to incomplete information and resolving
                 among alternatives. Attribute-efficient learning
                 algorithms, which allow learning from few examples in
                 large dimensional systems, are fundamental to the
                 approach. Underpinning the overall architecture is a
                 new principled approach to manipulating relations in
                 learning systems. This approach, of independently
                 quantified arguments, allows propositional learning
                 algorithms to be applied systematically to learning
                 relational concepts in polynomial time and in modular
                 fashion.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "cognitive computation; computational learning;
                 learning relations; nonmonotonic reasoning; PAC
                 learning; robust reasoning",
  subject =      "Theory of Computation --- Computation by Abstract
                 Devices --- Models of Computation (F.1.1); Computing
                 Methodologies --- Artificial Intelligence --- General
                 (I.2.0): {\bf Cognitive simulation}; Computing
                 Methodologies --- Artificial Intelligence --- Knowledge
                 Representation Formalisms and Methods (I.2.4);
                 Computing Methodologies --- Artificial Intelligence ---
                 Learning (I.2.6)",
}

@Article{Cheng:2000:SE,
  author =       "Siu-Wing Cheng and Tamal K. Dey and Herbert
                 Edelsbrunner and Michael A. Facello and Shang-Hua
                 Teng",
  title =        "Silver exudation",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "5",
  pages =        "883--904",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p883-cheng/",
  abstract =     "A silver is a tetrahedon whose four vertices lie close
                 to a plane and whose orthogonal projection to that
                 plane is a convex quadrilateral with no short edge.
                 Silvers are notoriously common in 3-dimensional
                 Delaunay triangulations even for well-spaced point
                 sets. We show that, if the Delaunay triangulation has
                 the ratio property introduced in Miller et al. [1995],
                 then there is an assignment of weights so the weighted
                 Delaunay triangulation contains no silvers. We also
                 give an algorithm to compute such a weight
                 assignment.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "(weighted) Delaunay triangulations; algorithms;
                 computational geometry; mesh generation; mesh quality;
                 silvers; tetrahedral meshes",
  subject =      "Mathematics of Computing --- Mathematical Software
                 (G.4); Computing Methodologies --- Computer Graphics
                 --- Computational Geometry and Object Modeling
                 (I.3.5)",
}

@Article{Jiang:2000:LBA,
  author =       "Tao Jiang and Ming Li and Paul Vit{\'a}nyi",
  title =        "A lower bound on the average-case complexity of
                 {Shellsort}",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "5",
  pages =        "905--911",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p905-jiang/",
  abstract =     "We demonstrate an $ \Omega (p n^{1 + 1 / p}) $ lower
                 bound on the average-case running time (uniform
                 distribution) of $p$-pass Shellsort. This is the first
                 nontrivial general lower bound for average-case
                 Shellsort.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Performance; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "average-case complexity; computational complexity;
                 Kolmogorov complexity; Shellsort; sorting",
  subject =      "Data --- Coding and Information Theory (E.4): {\bf
                 Data compaction and compression}; Data --- Files (E.5):
                 {\bf Sorting/searching}; Theory of Computation ---
                 Computation by Abstract Devices --- Complexity Measures
                 and Classes (F.1.3): {\bf Complexity hierarchies};
                 Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2): {\bf Sorting and searching};
                 Computing Methodologies --- Symbolic and Algebraic
                 Manipulation --- Algorithms (I.1.2): {\bf Analysis of
                 algorithms}",
}

@Article{Chaudhuri:2000:TBS,
  author =       "Soma Chaudhuri and Maurice erlihy and Nancy A. Lynch
                 and Mark R. Tuttle",
  title =        "Tight bounds for $k$-set agreement",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "5",
  pages =        "912--943",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/2000-47-5/p912-chaudhuri/p912-chaudhuri.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p912-chaudhuri/",
  abstract =     "We prove tight bounds on the time needed to solve {\em
                 $k$-set agreement}. In this problem, each processor
                 starts with an arbitrary input value taken from a fixed
                 set, and halts after choosing an output value. In every
                 execution, at most $k$ distinct output values may be
                 chosen, and every processor's output value must be some
                 processor's input value. We analyze this problem in a
                 synchronous, message-passing model where processors
                 fail by crashing. We prove a lower bound of $ f / k +
                 1$ degree of coordination required, and the number of
                 faults tolerated, even in idealized models like the
                 synchronous model. The proof of this result is
                 interesting because it is the first to apply
                 topological techniques to the synchronous model.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Design; Performance; Reliability; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- Distributed Systems
                 (C.2.4): {\bf Distributed applications}; Computer
                 Systems Organization --- Performance of Systems (C.4):
                 {\bf Fault tolerance}; Computer Systems Organization
                 --- Performance of Systems (C.4): {\bf Reliability,
                 availability, and serviceability}; Software ---
                 Programming Techniques --- Concurrent Programming
                 (D.1.3): {\bf Distributed programming}; Software ---
                 Software Engineering --- Software Architectures
                 (D.2.11); Software --- Software Engineering ---
                 Interoperability (D.2.12): {\bf Distributed objects};
                 Mathematics of Computing --- Discrete Mathematics ---
                 Combinatorics (G.2.1)",
}

@Article{Kutylowski:2000:PSC,
  author =       "Miros{\l}aw Kuty{\l}owski and Krzysztof Lory{\'s} and
                 Brigitte Oesterdiekhoff and Rolf Wanka",
  title =        "Periodification scheme: constructing sorting networks
                 with constant period",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "5",
  pages =        "944--967",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-5/p944-kutylowski/",
  abstract =     "We consider comparator networks $M$ that are used
                 repeatedly: while the output produced by $M$ is not
                 sorted, it is fed again into $M$. Sorting algorithms
                 working in this way are called {\em periodic}. The
                 number of parallel steps performed during a single run
                 of $M$ is called its {\em period}, the sorting {\em
                 time\/} of $M$ is the total number of parallel steps
                 that are necessary to sort in the worst case. Periodic
                 sorting networks have the advantage that they need
                 little hardware (control logic, wiring, area) and that
                 they are adaptive. We are interested in comparator
                 networks of a constant period, due to their potential
                 applications in hardware design.\par

                 Previously, very little was known on such networks. The
                 fastest solutions required time $ O(n^\epsilon)$ where
                 the depth was roughly $ 1 / \epsilon $. We introduce a
                 general method called {\em periodification scheme\/}
                 that converts automatically an arbitrary sorting
                 network that sorts $n$ items in time $ T(n)$ and that
                 has layout area $ A(n)$ into a sorting network that has
                 period 5, sorts $ \Theta (n \cdot T(n))$ items in time
                 $ O(T(n) \cdot \log n)$, and has layout area $ O(A(n)
                 \cdot T(n))$. In particular, applying this scheme to
                 Batcher's algorithms, we get practical period 5
                 comparator networks that sort in time $ O(\log^3 n)$.
                 For theoretical interest, one may use the AKS network
                 resulting in a period 5 comparator network with runtime
                 $ O(\log^2 n)$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Design",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "comparator network",
  subject =      "Computer Systems Organization --- Computer System
                 Implementation --- VLSI Systems (C.5.4); Theory of
                 Computation --- Analysis of Algorithms and Problem
                 Complexity --- Nonnumerical Algorithms and Problems
                 (F.2.2): {\bf Sorting and searching}",
}

@Article{Albers:2000:MST,
  author =       "Susanne Albers and Naveen Garg and Stefano Leonardi",
  title =        "Minimizing stall time in single and parallel disk
                 systems",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "6",
  pages =        "969--986",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-6/p969-albers/",
  abstract =     "We study integrated prefetching and caching problems
                 following the work of Cao et al. [1995] and Kimbrel and
                 Karlin [1996]. Cao et al. and Kimbrel and Karlin gave
                 approximation algorithms for minimizing the total
                 elapsed time in single and parallel disk settings. The
                 total elapsed time is the sum of the processor stall
                 times and the length of the request sequence to be
                 served.\par

                 We show that an optimum prefetching/caching schedule
                 for a single disk problem can be computed in polynomial
                 time, thereby settling an open question by Kimbrel and
                 Karlin. For the parallel disk problem, we give an
                 approximation algorithm for minimizing stall time. The
                 solution uses a few extra memory blocks in cache. Stall
                 time is an important and harder to approximate measure
                 for this problem. All of our algorithms are based on a
                 new approach which involves formulating the
                 prefetching/caching problems as linear programs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Design; Performance",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "approximation algorithms; caching algorithms;
                 prefetching",
  subject =      "Software --- Operating Systems --- Storage Management
                 (D.4.2): {\bf Storage hierarchies}; Theory of
                 Computation --- Analysis of Algorithms and Problem
                 Complexity --- Nonnumerical Algorithms and Problems
                 (F.2.2): {\bf Sequencing and scheduling}; Mathematics
                 of Computing --- Numerical Analysis --- Optimization
                 (G.1.6): {\bf Linear programming}",
}

@Article{Farach-Colton:2000:SCS,
  author =       "Martin Farach-Colton and Paolo Ferragina and S.
                 Muthukrishnan",
  title =        "On the sorting-complexity of suffix tree
                 construction",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "6",
  pages =        "987--1011",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-6/p987-farach-colton/",
  abstract =     "The suffix tree of a string is the fundamental data
                 structure of combinatorial pattern matching. We present
                 a recursive technique for building suffix trees that
                 yields optimal algorithms in different computational
                 models. Sorting is an inherent bottleneck in building
                 suffix trees and our algorithms match the sorting lower
                 bound. Specifically, we present the following results.
                 (1) Weiner [1973], who introduced the data structure,
                 gave an optimal $ O(n)$-time algorithm for building the
                 suffix tree of an $n$-character string drawn from a
                 constant-size alphabet. In the comparison model, there
                 is a trivial $ (n \log n)$-time lower bound based on
                 sorting, and Weiner's algorithm matches this bound. For
                 integer alphabets, the fastest known algorithm is the $
                 O(n \log n)$ time comparison-based algorithm, but no
                 super-linear lower bound is known. Closing this gap is
                 the main open question in stringology. We settle this
                 open problem by giving a linear time reduction to
                 sorting for building suffix trees. Since sorting is a
                 lower-bound for building suffix trees, this algorithm
                 is time-optimal in every alphabet mode. In particular,
                 for an alphabet consisting of integers in a polynomial
                 range we get the first known linear-time algorithm. (2)
                 All previously known algorithms for building suffix
                 trees exhibit a marked absence of locality of
                 reference, and thus they tend to elicit many page
                 faults (I/Os) when indexing very long strings. They are
                 therefore unsuitable for building suffix trees in
                 secondary storage devices, where I/Os dominate the
                 overall computational cost. We give a linear-I/O
                 reduction to sorting for suffix tree construction.
                 Since sorting is a trivial I/O-lower bound for building
                 suffix trees, our algorithm is I/O-optimal.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Design; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "DAM model; external-memory data structures; RAM model;
                 sorting complexity; suffix array; suffix tree",
  subject =      "Software --- Operating Systems --- Storage Management
                 (D.4.2): {\bf Main memory}; Software --- Operating
                 Systems --- Storage Management (D.4.2): {\bf Secondary
                 storage}; Data --- Data Structures (E.1): {\bf Trees};
                 Data --- Files (E.5): {\bf Sorting/searching}; Theory
                 of Computation --- Computation by Abstract Devices ---
                 Models of Computation (F.1.1); Theory of Computation
                 --- Analysis of Algorithms and Problem Complexity ---
                 Nonnumerical Algorithms and Problems (F.2.2): {\bf
                 Pattern matching}; Theory of Computation --- Analysis
                 of Algorithms and Problem Complexity --- Nonnumerical
                 Algorithms and Problems (F.2.2): {\bf Sorting and
                 searching}; Information Systems --- Information Storage
                 and Retrieval --- Content Analysis and Indexing
                 (H.3.1): {\bf Indexing methods}",
}

@Article{Chazelle:2000:SHA,
  author =       "Bernard Chazelle",
  title =        "The soft heap: an approximate priority queue with
                 optimal error rate",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "6",
  pages =        "1012--1027",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-6/p1012-chazelle/",
  abstract =     "A simple variant of a priority queue, called a {\em
                 soft heap}, is introduced. The data structure supports
                 the usual operations: insert, delete, meld, and
                 findmin. Its novelty is to beat the logarithmic bound
                 on the complexity of a heap in a comparison-based
                 model. To break this information-theoretic barrier, the
                 entropy of the data structure is reduced by
                 artificially raising the values of certain keys. Given
                 any mixed sequence of $n$ operations, a soft heap with
                 error rate $ \epsilon $ (for any $ 0 < \epsilon < 1 /
                 2$) ensures that, at any time, at most $ \epsilon n$ of
                 its items have their keys raised. The amortized
                 complexity of each operation is constant, except for
                 insert, which takes $ O(\log 1 / \epsilon)$ time. The
                 soft heap is optimal for any value of $ \epsilon $ in a
                 comparison-based model. The data structure is purely
                 pointer-based. No arrays are move items across the data
                 structure not individually, as is customary, but in
                 groups, in a data-structuring equivalent of ``car
                 pooling.'' Keys must be raised as a result, in order to
                 preserve the heap ordering of the data structure. The
                 soft heap can be used to compute exact or approximate
                 medians and percentiles optimally. It is also useful
                 for approximate sorting and for computing minimum
                 spanning trees of general graphs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "amortization; heap; priority queue; soft heap",
  subject =      "Data --- Data Structures (E.1)",
}

@Article{Chazelve:2000:MST,
  author =       "Bernard Chazelve",
  title =        "A minimum spanning tree algorithm with
                 {Inverse-Ackermann} type complexity",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "6",
  pages =        "1028--1047",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-6/p1028-chazelve/",
  abstract =     "A deterministic algorithm for computing a minimum
                 spanning tree of a connected graph is presented. Its
                 running time is $ O(m(m, n)) $, where is the classical
                 functional inverse of Ackermann's function and $n$
                 (respectively, $m$) is the number of vertices
                 (respectively, edges). The algorithm is
                 comparison-based: it uses pointers, not arrays, and it
                 makes no numeric assumptions on the edge costs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "graphs; matroids; minimum spanning trees",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2)",
}

@Article{Goldberg:2000:CRC,
  author =       "Leslie Ann Goldberg and Philip D. Mackenzie and Mike
                 Paterson and Aravind Srinivasan",
  title =        "Contention resolution with constant expected delay",
  journal =      j-J-ACM,
  volume =       "47",
  number =       "6",
  pages =        "1048--1096",
  year =         "2000",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 10 19:20:14 MST 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2000-47-6/p1048-goldberg/",
  abstract =     "We study contention resolution in a multiple-access
                 channel such as the Ethernet channel. In the model that
                 we consider, $n$ users generate messages for the
                 channel according to a probability distribution.
                 Raghavan and Upfal have given a protocol in which the
                 expected {\em delay\/} (time to get serviced) of every
                 message is $ O(\log n)$ when messages are generated
                 according to a Bernoulli distribution with generation
                 rate up to about $ 1 / 10$. Our main results are the
                 following protocols: (a) one in which the expected
                 average message delay is $ O(1)$ when messages are
                 generated according to a Bernoulli distribution with a
                 generation rate smaller than $ 1 / e$, and (b) one in
                 which the expected delay of any message is $ O(1)$ for
                 an analogous model in which users are synchronized
                 (i.e., they agree about the time), there are
                 potentially an infinite number of users, and messages
                 are generated according to a Poisson distribution with
                 generation rate up to $ 1 / e$. (Each message
                 constitutes a new user.)\par

                 To achieve (a), we first show how to simulate (b) using
                 $n$ synchronized users, and then show how to build the
                 synchronization into the protocol.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "contention resolution; Ethernet; Markov chains;
                 multiple-access channel",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity (F.2); Mathematics of Computing ---
                 Probability and Statistics (G.3)",
}

@Article{Chan:2001:DPC,
  author =       "Timothy M. Chan",
  title =        "Dynamic planar convex hull operations in
                 near-logarithmic amortized time",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "1",
  pages =        "1--12",
  month =        jan,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:06 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/2001-48-1/p1-chan/p1-chan.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/2001-48-1/p1-chan/",
  abstract =     "We give a data structure that allows arbitrary
                 insertions and deletions on a planar point set $P$ and
                 supports basic queries on the convex hull of $P$, such
                 as membership and tangent-finding. Updates take $
                 O(\log (1 + \epsilon n))$ amortized time and queries
                 take $ O(\log n)$ time each, where $n$ is the maximum
                 size of $P$ and $ \epsilon $ is any fixed positive
                 constant. For some advanced queries such as
                 bridge-finding, both our bounds increase to $ O(\log (3
                 / 2 n))$. The only previous fully dynamic solution was
                 by Overmars and van Leeuwen from 1981 and required $
                 O(\log 2 n)$ time per update and $ O (\log n)$ time per
                 query.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "computational geometry; convex hulls; dynamic data
                 structures",
  subject =      "Data --- Data Structures (E.1); Theory of Computation
                 --- Analysis of Algorithms and Problem Complexity ---
                 Nonnumerical Algorithms and Problems (F.2.2): {\bf
                 Geometrical problems and computations}",
}

@Article{Borodin:2001:AQT,
  author =       "Allan Borodin and Jon Kleinberg and Prabhakar Raghavan
                 and Madhu Sudan and David P. Williamson",
  title =        "Adversarial queuing theory",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "1",
  pages =        "13--38",
  month =        jan,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:06 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/2001-48-1/p13-borodin/p13-borodin.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/2001-48-1/p13-borodin/",
  abstract =     "We consider packet routing when packets are injected
                 continuously into a network. We develop an adversarial
                 theory of queuing aimed at addressing some of the
                 restrictions inherent in probabilistic analysis and
                 queuing theory based on time-invariant stochastic
                 generation. We examine the stability of queuing
                 networks and policies when the arrival process is
                 adversarial, and provide some preliminary results in
                 this direction. Our approach sheds light on various
                 queuing policies in simple networks, and paves the way
                 for a systematic study of queuing with few or no
                 probabilistic assumptions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "packet routing; scheduling protocols; stability",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- Network
                 Architecture and Design (C.2.1): {\bf Store and forward
                 networks}; Mathematics of Computing --- Probability and
                 Statistics (G.3): {\bf Queueing theory}",
}

@Article{Andrews:2001:USR,
  author =       "Matthew Andrews and Baruch Awerbuch and Antonio
                 Fern{\'a}ndez and Tom Leighton and Zhiyong Liu and Jon
                 Kleinberg",
  title =        "Universal-stability results and performance bounds for
                 greedy contention-resolution protocols",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "1",
  pages =        "39--69",
  month =        jan,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:06 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/2001-48-1/p39-andrews/p39-andrews.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/2001-48-1/p39-andrews/",
  abstract =     "In this paper, we analyze the behavior of
                 packet-switched communication networks in which packets
                 arrive dynamically at the nodes and are routed in
                 discrete time steps across the edges. We focus on a
                 basic adversarial model of packet arrival and path
                 determination for which the time-averaged arrival rate
                 of packets requiring the use of any edge is limited to
                 be less than 1. This model can reflect the behavior of
                 connection-oriented networks with transient connections
                 (such as ATM networks) as well as connectionless
                 networks (such as the Internet).\par

                 We concentrate on greedy (also known as
                 work-conserving) contention-resolution protocols. A
                 crucial issue that arises in such a setting is that of
                 {\em stability\/} --- will the number of packets in the
                 system remain bounded, as the system runs for an
                 arbitrarily long period of time? We study the universal
                 stability of network (i.e., stability under all greedy
                 protocols) and universal stability of protocols (i.e.,
                 stability in all networks). Once the stability of a
                 system is granted, we focus on the two main parameters
                 that characterize its performance: maximum queue size
                 required and maximum end-to-end delay experienced by
                 any packet.\par

                 Among other things, we show:\par

                 (i) There exist simple greedy protocols that are stable
                 for all networks.\par

                 (ii) There exist other commonly used protocols (such as
                 FIFO) and networks (such as arrays and hypercubes) that
                 are not stable.\par

                 (iii) The $n$-node ring is stable for all greedy
                 routing protocols (with maximum queue-size and packet
                 delay that is linear in $n$).\par

                 (iv) There exists a simple distributed randomized
                 greedy protocol that is stable for all networks and
                 requires only polynomial queue size and polynomial
                 delay.\par

                 Our results resolve several questions posed by Borodin
                 et al., and provide the first examples of (i) a
                 protocol that is stable for all networks, and (ii) a
                 protocol that is not stable for all networks.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "adversarial queuing theory; end-to-end delay; network
                 stability; packet scheduling",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- Network
                 Architecture and Design (C.2.1): {\bf Packet-switching
                 networks}; Theory of Computation --- Analysis of
                 Algorithms and Problem Complexity --- Nonnumerical
                 Algorithms and Problems (F.2.2): {\bf Sequencing and
                 scheduling}; Computer Systems Organization ---
                 Computer-Communication Networks --- Network
                 Architecture and Design (C.2.1): {\bf Store and forward
                 networks}",
}

@Article{Basin:2001:ACA,
  author =       "David Basin and Harald Ganzinger",
  title =        "Automated complexity analysis based on ordered
                 resolution",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "1",
  pages =        "70--109",
  month =        jan,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:06 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/2001-48-1/p70-basin/p70-basin.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/2001-48-1/p70-basin/",
  abstract =     "We define order locality to be a property of clauses
                 relative to a term ordering. This property generalizes
                 the subformula property for proofs where the terms
                 appearing in proofs can be bounded, under the given
                 ordering, by terms appearing in the goal clause. We
                 show that when a clause set is order local, then the
                 complexity of its ground entailment problem is a
                 function of its structure (e.g., full versus Horn
                 clauses), and the ordering used. We prove that, in many
                 cases, order locality is equivalent to a clause set
                 being saturated under ordered resolution. This provides
                 a means of using standard resolution theorem provers
                 for testing order locality and transforming non-local
                 clause sets into local ones. We have used the Saturate
                 system to automatically establish complexity bounds for
                 a number of nontrivial entailment problems relative to
                 complexity classes which include polynomial and
                 exponential time and co-NP.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Theory; Verification",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "automated theorem proving; complexity analysis;
                 first-order theories; ordered resolution",
  subject =      "Theory of Computation --- Computation by Abstract
                 Devices --- Complexity Measures and Classes (F.1.3);
                 Theory of Computation --- Mathematical Logic and Formal
                 Languages --- Mathematical Logic (F.4.1); Computing
                 Methodologies --- Artificial Intelligence --- Deduction
                 and Theorem Proving (I.2.3)",
}

@Article{Case:2001:LCA,
  author =       "John Case and Dayanand S. Rajan and Anil M. Shende",
  title =        "Lattice computers for approximating {Euclidean}
                 space",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "1",
  pages =        "110--144",
  month =        jan,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:06 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/2001-48-1/p110-case/p110-case.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/2001-48-1/p110-case/",
  abstract =     "In the context of mesh-like, parallel processing
                 computers for (i) approximating continuous space and
                 (ii) {\em analog\/} simulation of the motion of objects
                 and waves in continuous space, the present paper is
                 concerned with {\em which\/} mesh-like interconnection
                 of processors might be particularly suitable for the
                 task and why.\par

                 Processor interconnection schemes based on nearest
                 neighbor connections in geometric lattices are
                 presented along with motivation. Then two major threads
                 are exploded regarding which lattices would be good:
                 the {\em regular lattices}, for their symmetry and
                 other properties in common with continuous space, and
                 the well-known {\em root lattices}, for being, in a
                 sense, the lattices required for physically natural
                 basic algorithms for motion.\par

                 The main theorem of the present paper implies that {\em
                 the well-known lattice} $ A n $ is the regular lattice
                 having the maximum number of nearest neighbors among
                 the $n$-dimensional regular lattices. It is noted that
                 the only $n$-dimensional lattices that are both regular
                 and root are $ A n$ and $ Z n$ ($ Z n$ is the lattice
                 of $n$-cubes). The remainder of the paper specifies
                 other desirable properties of $ A n$ including other
                 ways it is superior to $ Z n$ for our purposes.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Design; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  subject =      "Hardware --- Input/Output and Data Communications ---
                 Interconnections (Subsystems) (B.4.3): {\bf Topology};
                 Theory of Computation --- Computation by Abstract
                 Devices --- Models of Computation (F.1.1): {\bf
                 Unbounded-action devices}; Theory of Computation ---
                 Computation by Abstract Devices --- Modes of
                 Computation (F.1.2): {\bf Parallelism and concurrency};
                 Mathematics of Computing --- Numerical Analysis ---
                 General (G.1.0): {\bf Parallel algorithms}; Computing
                 Methodologies --- Artificial Intelligence --- Vision
                 and Scene Understanding (I.2.10): {\bf Motion}",
}

@Article{Siekmann:2001:ECW,
  author =       "J{\"o}rg H. Siekmann and Graham Wrightson",
  title =        "Erratum: a counterexample to {W. Bibel}'s and {E.
                 Eder}'s strong completeness result for connection graph
                 resolution",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "1",
  pages =        "145--147",
  month =        jan,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:06 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{Bibel:1997:DTR}.",
  URL =          "http://www.acm.org/pubs/articles/journals/jacm/2001-48-1/p145-siekmann/p145-siekmann.pdf;
                 http://www.acm.org/pubs/citations/journals/jacm/2001-48-1/p145-siekmann/",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "computational logic; mathematical logic; mechanical
                 theorem proving",
  subject =      "Theory of Computation --- Computation by Abstract
                 Devices --- Complexity Measures and Classes (F.1.3):
                 {\bf Machine-independent complexity}; Theory of
                 Computation --- Analysis of Algorithms and Problem
                 Complexity --- Nonnumerical Algorithms and Problems
                 (F.2.2): {\bf Complexity of proof procedures}; Theory
                 of Computation --- Mathematical Logic and Formal
                 Languages --- Mathematical Logic (F.4.1): {\bf
                 Mechanical theorem proving}; Computing Methodologies
                 --- Artificial Intelligence --- Deduction and Theorem
                 Proving (I.2.3): {\bf Deduction}; Theory of Computation
                 --- Mathematical Logic and Formal Languages ---
                 Mathematical Logic (F.4.1): {\bf Proof theory};
                 Computing Methodologies --- Artificial Intelligence ---
                 Deduction and Theorem Proving (I.2.3): {\bf
                 Resolution}",
}

@Article{Ben-Sasson:2001:SPN,
  author =       "Eli Ben-Sasson and Avi Wigderson",
  title =        "Short proofs are {narrow---resolution} made simple",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "2",
  pages =        "149--169",
  month =        mar,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-2/p149-ben-sasson/",
  abstract =     "The {\em width\/} of a Resolution proof is defined to
                 be the maximal number of literals in any clause of the
                 proof. In this paper, we relate proof width to proof
                 length (=size), in both general Resolution, and its
                 tree-like variant. The following consequences of these
                 relations reveal width as a crucial ``resource'' of
                 Resolution proofs.\par

                 In one direction, the relations allow us to give {\em
                 simple, unified\/} proofs for almost all known
                 exponential lower bounds on size of resolution proofs,
                 as well as several interesting new ones. They all
                 follow from width lower bounds, and we show how these
                 follow from natural expansion property of clauses of
                 the input tautology.\par

                 In the other direction, the width-size relations
                 naturally suggest a simple dynamic programming
                 procedure for automated theorem proving--one which
                 simply searches for small width proofs. This relation
                 guarantees that the running time (and thus the size of
                 the produced proof) is at most quasi-polynomial in the
                 smallest tree-like proof. This algorithm is never much
                 worse than any of the recursive automated provers (such
                 as DLL) used in practice. In contrast, we present a
                 family of tautologies on which it is exponentially
                 faster.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  subject =      "Theory of Computation --- Mathematical Logic and
                 Formal Languages --- Mathematical Logic (F.4.1): {\bf
                 Proof theory}; Computing Methodologies --- Artificial
                 Intelligence --- Deduction and Theorem Proving
                 (I.2.3)",
}

@Article{Roura:2001:IMT,
  author =       "Salvador Roura",
  title =        "Improved master theorems for divide-and-conquer
                 recurrences",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "2",
  pages =        "170--205",
  month =        mar,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-2/p170-roura/",
  abstract =     "This paper presents new theorems to analyze
                 divide-and-conquer recurrences, which improve other
                 similar ones in several aspects. In particular, these
                 theorems provide more information, free us almost
                 completely from technicalities like floors and
                 ceilings, and cover a wider set of toll functions and
                 weight distributions, stochastic recurrences
                 included.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Measurement; Performance",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "asymptotic analysis; divide-and-conquer; master
                 theorem",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity (F.2); Mathematics of Computing ---
                 Discrete Mathematics --- Combinatorics (G.2.1): {\bf
                 Recurrences and difference equations}",
}

@Article{Skutella:2001:CQS,
  author =       "Martin Skutella",
  title =        "Convex quadratic and semidefinite programming
                 relaxations in scheduling",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "2",
  pages =        "206--242",
  month =        mar,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-2/p206-skutella/",
  abstract =     "We consider the problem of scheduling unrelated
                 parallel machines subject to release dates so as to
                 minimize the total weighted completion time of jobs.
                 The main contribution of this paper is a provably good
                 convex quadratic programming relaxation of strongly
                 polynomial size for this problem. The best previously
                 known approximation algorithms are based on LP
                 relaxations in time- or interval-indexed variables.
                 Those LP relaxations, however, suffer from a huge
                 number of variables. As a result of the convex
                 quadratic programming approach we can give a very
                 simple and easy to analyze 2-approximation algorithm
                 which can be further improved to performance guarantee
                 3/2 in the absence of release dates. We also consider
                 preemptive scheduling problems and derive approximation
                 algorithms and results on the power of preemption which
                 improve upon the best previously known results for
                 these settings. Finally, for the special case of two
                 machines we introduce a more sophisticated semidefinite
                 programming relaxation and apply the random hyperplane
                 technique introduced by Goemans and Williamson for the
                 MaxCut problem; this leads to an improved
                 1.2752-approximation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "approximation algorithms; convex optimization;
                 performance guarantee; randomized algorithms;
                 scheduling theory; unrelated machines; worst-case
                 ratio",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2): {\bf Sequencing and scheduling};
                 Mathematics of Computing --- Numerical Analysis ---
                 Optimization (G.1.6): {\bf Convex programming};
                 Mathematics of Computing --- Discrete Mathematics ---
                 General (G.2.0); Mathematics of Computing ---
                 Probability and Statistics (G.3): {\bf Probabilistic
                 algorithms (including Monte Carlo)}; Computing
                 Methodologies --- Symbolic and Algebraic Manipulation
                 --- Algorithms (I.1.2): {\bf Analysis of algorithms}",
}

@Article{Dooly:2001:LAT,
  author =       "Daniel R. Dooly and Sally A. Goldman and Stephen D.
                 Scott",
  title =        "On-line analysis of the {TCP} acknowledgment delay
                 problem",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "2",
  pages =        "243--273",
  month =        mar,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-2/p243-dooly/",
  abstract =     "We study an on-line problem that is motivated by the
                 networking problem of dynamically adjusting of
                 acknowledgments in the Transmission Control Protocol
                 (TCP). We provide a theoretical model for this problem
                 in which the goal is to send acks at a time that
                 minimize a linear combination of the cost for the
                 number of acknowledgments sent and the cost for the
                 additional latency introduced by delaying
                 acknowledgments. To study the usefulness of applying
                 packet arrival time prediction to this problem, we
                 assume there is an oracle that provides the algorithm
                 with the times of the next $L$ arrivals, for some $ L >
                 0$.\par

                 We give two different objective functions for measuring
                 the cost of a solution, each with its own measure of
                 latency cost. For each objective function we first give
                 an $ O(n^2)$-time dynamic programming algorithm for
                 optimally solving the off-line problem. Then we
                 describe an on-line algorithm that greedily
                 acknowledges exactly when the cost for an
                 acknowledgment is less than the latency cost incurred
                 by not acknowledging. We show that for this algorithm
                 there is a sequence of $n$ packet arrivals for which it
                 is ($^*$)-competitive for the first objective function,
                 2-competitive for the second function for $ L = 0$, and
                 1-competitive for the second function for $ L = 1$.
                 Next we present a second on-line algorithm which is a
                 slight modification of the first, and we prove that it
                 is 2-competitive for both objective functions for all
                 $L$. We also give lower bounds on the competitive ratio
                 for any deterministic on-line algorithm. These results
                 show that for each objective function, at least one of
                 our algorithms is optimal.\par

                 Finally, we give some initial empirical results using
                 arrival sequences from real network traffic where we
                 compare the two methods used in TCP for acknowledgment
                 delay with our two on-line algorithms. In all cases we
                 examine performance with $ L = 0$ and $ L = 1$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "acknowledgment delay problem; competitive analysis;
                 Internet traffic simulations; lookahead; Transmission
                 Control Protocol (TCP)",
  subject =      "Theory of Computation --- Computation by Abstract
                 Devices --- Modes of Computation (F.1.2): {\bf Online
                 computation}; Theory of Computation --- Analysis of
                 Algorithms and Problem Complexity --- Nonnumerical
                 Algorithms and Problems (F.2.2): {\bf Sequencing and
                 scheduling}; Computer Systems Organization ---
                 Computer-Communication Networks --- Network Protocols
                 (C.2.2): {\bf Applications (SMTP, FTP, etc.)}",
}

@Article{Jain:2001:AAM,
  author =       "Kamal Jain and Vijay V. Vazirani",
  title =        "Approximation algorithms for metric facility location
                 and $k$ {-Median} problems using the primal-dual schema
                 and {Lagrangian} relaxation",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "2",
  pages =        "274--296",
  month =        mar,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-2/p274-jain/",
  abstract =     "We present approximation algorithms for the metric
                 uncapacitated facility location problem and the metric
                 $k$-median problem achieving guarantees of 3 and 6
                 respectively. The distinguishing feature of our
                 algorithms is their low running time: $ O(m \log m)$
                 and $ O(m \log m(L + \log (n)))$ respectively, where
                 $n$ and $m$ are the total number of vertices and edges
                 in the underlying complete bipartite graph on cities
                 and facilities. The main algorithmic ideas are a new
                 extension of the primal-dual schema and the use of
                 Lagrangian relaxation to derive approximation
                 algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2)",
}

@Article{Chong:2001:CTO,
  author =       "Ka Wong Chong and Yijie Han and Tak Wah Lam",
  title =        "Concurrent threads and optimal parallel minimum
                 spanning trees algorithm",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "2",
  pages =        "297--323",
  month =        mar,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-2/p297-chong/",
  abstract =     "This paper resolves a long-standing open problem on
                 whether the concurrent write capability of parallel
                 random access machine (PRAM) is essential for solving
                 fundamental graph problems like connected components
                 and minimum spanning trees in $ O(\log n) $ time.
                 Specifically, we present a new algorithm to solve these
                 problems in $ O(\log n) $ time using a linear number of
                 processors on the exclusive-read exclusive-write PRAM.
                 The logarithmic time bound is actually optimal since it
                 is well known that even computing the ``OR'' of $n$ bit
                 requires $ \log n$ time on the exclusive-write PRAM.
                 The efficiency achieved by the new algorithm is based
                 on a new schedule which can exploit a high degree of
                 parallelism.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "connected components; EREW PRAM; minimum spanning
                 trees; parallel algorithms",
  subject =      "Theory of Computation --- Computation by Abstract
                 Devices --- Modes of Computation (F.1.2): {\bf
                 Parallelism and concurrency}; Theory of Computation ---
                 Analysis of Algorithms and Problem Complexity ---
                 Nonnumerical Algorithms and Problems (F.2.2);
                 Mathematics of Computing --- Discrete Mathematics ---
                 Graph Theory (G.2.2): {\bf Graph algorithms}",
}

@Article{Broder:2001:GAD,
  author =       "Andrei Z. Broder and Alan M. Frieze and Eli Upfal",
  title =        "A general approach to dynamic packet routing with
                 bounded buffers",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "2",
  pages =        "324--349",
  month =        mar,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-2/p324-broder/",
  abstract =     "We prove a sufficient condition for the stability of
                 dynamic packet routing algorithms. Our approach reduces
                 the problem of steady state analysis to the easier and
                 better understood question of static routing. We show
                 that certain high probability and worst case bounds on
                 the quasi-static (finite past) performance of a routing
                 algorithm imply bounds on the performance of the
                 dynamic version of that algorithm. Our technique is
                 particularly useful in analyzing routing on networks
                 with bounded buffers where complicated dependencies
                 make standard queuing techniques inapplicable.\par

                 We present several applications of our approach. In all
                 cases we start from a known static algorithm, and
                 modify it to fit our framework. In particular we give
                 the first dynamic algorithms for routing on a butterfly
                 or two-dimensional mesh with bounded buffers. Both the
                 injection rate for which the algorithm is stable, and
                 the expected time a packet spends in the system are
                 optimal up to constant factors. Our approach is also
                 applicable to the recently introduced adversarial input
                 model.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- Network
                 Architecture and Design (C.2.1); Computer Systems
                 Organization --- Computer-Communication Networks ---
                 Network Protocols (C.2.2); Theory of Computation ---
                 Analysis of Algorithms and Problem Complexity ---
                 Nonnumerical Algorithms and Problems (F.2.2);
                 Mathematics of Computing --- Discrete Mathematics ---
                 Graph Theory (G.2.2)",
}

@Article{Mayers:2001:USQ,
  author =       "Dominic Mayers",
  title =        "Unconditional security in quantum cryptography",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "3",
  pages =        "351--406",
  month =        may,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-3/p351-mayers/",
  abstract =     "Basic techniques to prove the unconditional security
                 of quantum cryptography are described. They are applied
                 to a quantum key distribution protocol proposed by
                 Bennett and Brassard [1984]. The proof considers a
                 practical variation on the protocol in which the
                 channel is noisy and photos may be lost during the
                 transmission. Each individual signal sent into the
                 channel must contain a single photon or any
                 two-dimensional system in the exact state described in
                 the protocol. No restriction is imposed on the detector
                 used at the receiving side of the channel, except that
                 whether or not the received system is detected must be
                 independent of the basis used to measure this system.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Security",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "quantum cryptography; quantum information theory;
                 unconditional security",
  subject =      "Data --- Data Encryption (E.3): {\bf Public key
                 cryptosystems}",
}

@Article{Manzini:2001:ABW,
  author =       "Giovanni Manzini",
  title =        "An analysis of the {Burrows --- Wheeler} transform",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "3",
  pages =        "407--430",
  month =        may,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-3/p407-manzini/",
  abstract =     "The Burrows--Wheeler Transform (also known as
                 Block-Sorting) is at the base of compression algorithms
                 that are the state of the art in lossless data
                 compression. In this paper, we analyze two algorithms
                 that use this technique. The first one is the original
                 algorithm described by Burrows and Wheeler, which,
                 despite its simplicity outperforms the Gzip compressor.
                 The second one uses an additional run-length encoding
                 step to improve compression. We prove that the
                 compression ratio of both algorithms can be bounded in
                 terms of the $k$ th order empirical entropy of the
                 input string for any $ k > 0$. We make no assumptions
                 on the input and we obtain bounds which hold in the
                 worst case that is for every possible input string. All
                 previous results for Block-Sorting algorithms were
                 concerned with the average compression ratio and have
                 been established assuming that the input comes from a
                 finite-order Markov source.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "block sorting; Burrows --- move-to-front encoding;
                 Wheeler transform; worst-case analysis of compression",
  subject =      "Data --- Coding and Information Theory (E.4): {\bf
                 Data compaction and compression}; Theory of Computation
                 --- Analysis of Algorithms and Problem Complexity ---
                 Nonnumerical Algorithms and Problems (F.2.2)",
}

@Article{Gottlob:2001:CAC,
  author =       "Georg Gottlob and Nicola Leone and Francesco
                 Scarcello",
  title =        "The complexity of acyclic conjunctive queries",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "3",
  pages =        "431--498",
  month =        may,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "acyclic hypergraph; algorithm; bounded treewidth;
                 conjunctive query; constraint; constraint satisfaction
                 problem; CSP; database theory; degree of cyclicity;
                 hinge; join tree; LOGCFL; parallel algorithm; query
                 containment; query-width; subsumption; tree query",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2): {\bf Computations on discrete
                 structures}; Theory of Computation --- Analysis of
                 Algorithms and Problem Complexity --- Nonnumerical
                 Algorithms and Problems (F.2.2): {\bf Complexity of
                 proof procedures}; Information Systems --- Database
                 Management --- Systems (H.2.4): {\bf Query processing};
                 Information Systems --- Database Management --- Systems
                 (H.2.4): {\bf Parallel databases}; Information Systems
                 --- Database Management --- Systems (H.2.4): {\bf
                 Rule-based databases}; Computing Methodologies ---
                 Artificial Intelligence --- Deduction and Theorem
                 Proving (I.2.3): {\bf Answer/reason extraction};
                 Computing Methodologies --- Artificial Intelligence ---
                 Deduction and Theorem Proving (I.2.3): {\bf Deduction};
                 Computing Methodologies --- Artificial Intelligence ---
                 Deduction and Theorem Proving (I.2.3): {\bf Inference
                 engines}; Computing Methodologies --- Artificial
                 Intelligence --- Deduction and Theorem Proving (I.2.3):
                 {\bf Logic programming}; Computing Methodologies ---
                 Artificial Intelligence --- Deduction and Theorem
                 Proving (I.2.3): {\bf Resolution}; Computing
                 Methodologies --- Artificial Intelligence --- Problem
                 Solving, Control Methods, and Search (I.2.8): {\bf
                 Backtracking}; Computing Methodologies --- Artificial
                 Intelligence --- Problem Solving, Control Methods, and
                 Search (I.2.8): {\bf Graph and tree search strategies};
                 Computing Methodologies --- Artificial Intelligence ---
                 Problem Solving, Control Methods, and Search (I.2.8):
                 {\bf Plan execution, formation, and generation}",
}

@Article{Bazzi:2001:SFT,
  author =       "Rida A. Bazzi and Gil Neiger",
  title =        "Simplifying fault-tolerance: providing the abstraction
                 of crash failures",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "3",
  pages =        "499--554",
  month =        may,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-3/p499-bazzi/",
  abstract =     "The difficulty of designing fault-tolerant distributed
                 algorithms increases with the severity of failures that
                 an algorithm must tolerate, especially for systems with
                 synchronous message passing. This paper considers
                 methods that automatically translate algorithms
                 tolerant of simple crash failures into ones tolerant of
                 more severe failures. These translations simplify the
                 design task by allowing algorithm designers to assume
                 that processors fail only by stopping. Such
                 translations can be quantified by two measures: {\em
                 fault-tolerance}, which is a measure of how many
                 processors must remain correct for the translation to
                 be correct, and {\em round-complexity}, which is a
                 measure of how the translation increases the running
                 time of an algorithm. Understanding these translations
                 and their limitations with respect to these measures
                 can provide insight into the relative impact of
                 different models of faculty behavior on the ability to
                 provide fault-tolerant applications for systems with
                 synchronous message passing. \par

                 This paper considers translations from crash failures
                 to each of the following types of more severe failures:
                 omission to send messages; omission to send and receive
                 messages; and totally arbitrary behavior. It shows that
                 previously developed translations to send-omission
                 failures are optimal with respect to both
                 fault-tolerance and round-complexity. It exhibits a
                 hierarchy of translations to general (send/receive)
                 omission failures that improves upon the
                 fault-tolerance of previously developed translations.
                 These translations are optimal in that they cannot be
                 improved with respect to one measure without negatively
                 affecting the other; that is, the hierarchy of
                 translations is matched by corresponding hierarchy of
                 impossibility results. The paper also gives a hierarchy
                 of translations to arbitrary failures that improves
                 upon the round-complexity of previously developed
                 translations. These translations are near-optimal",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Algorithms; Reliability; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "crash failures; fault-tolerance; translations",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- Distributed Systems
                 (C.2.4): {\bf Distributed applications}; Software ---
                 Programming Techniques --- Concurrent Programming
                 (D.1.3): {\bf Distributed programming}; Software ---
                 Operating Systems --- Reliability (D.4.5): {\bf
                 Fault-tolerance}",
}

@Article{Davies:2001:MAS,
  author =       "Rowan Davies and Frank Pfenning",
  title =        "A modal analysis of staged computation",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "3",
  pages =        "555--604",
  month =        may,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:52:07 MST 2002",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/jacm/2001-48-3/p555-davies/",
  abstract =     "We show that a type system based on the intuitionistic
                 modal logic S4 provides an expressive framework for
                 specifying and analyzing computation stages in the
                 context of typed ?-calculi and functional languages. We
                 directly demonstrate the sense in which our $
                 e^*$-calculus captures staging, and also give a
                 conservative embedding of Nielson and Nielson's
                 two-level functional language in our functional
                 language Mini-ML$^*$, thus proving that binding-time
                 correctness is equivalent to modal correctness on this
                 fragment. In addition Mini-ML$^*$ can also express
                 immediate evaluation and sharing of code across
                 multiple stages, thus supporting run-time code
                 generation as well as partial evaluation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  generalterms = "Languages; Theory",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "binding times; run-time code generation; staged
                 computation",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3); Theory of Computation
                 --- Logics and Meanings of Programs --- Semantics of
                 Programming Languages (F.3.2): {\bf Partial
                 evaluation}; Theory of Computation --- Logics and
                 Meanings of Programs --- Studies of Program Constructs
                 (F.3.3): {\bf Type structure}; Theory of Computation
                 --- Mathematical Logic and Formal Languages ---
                 Mathematical Logic (F.4.1): {\bf Lambda calculus and
                 related systems}; Theory of Computation ---
                 Mathematical Logic and Formal Languages ---
                 Mathematical Logic (F.4.1): {\bf Model theory}; Theory
                 of Computation --- Mathematical Logic and Formal
                 Languages --- Mathematical Logic (F.4.1): {\bf Proof
                 theory}",
}

@Article{Darwiche:2001:DNN,
  author =       "Adnan Darwiche",
  title =        "Decomposable negation normal form",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "608--647",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Friedman:2001:PMD,
  author =       "Nir Friedman and Joseph Y. Halpern",
  title =        "Plausibility measures and default reasoning",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "648--685",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hochbaum:2001:EAI,
  author =       "Dorit S. Hochbaum",
  title =        "An efficient algorithm for image segmentation,
                 {Markov} random fields and related problems",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "686--701",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Boneh:2001:EGS,
  author =       "Dan Boneh and Matthew Franklin",
  title =        "Efficient generation of shared {RSA} keys",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "702--722",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Holm:2001:PLD,
  author =       "Jacob Holm and Kristian de Lichtenberg and Mikkel
                 Thorup",
  title =        "Poly-logarithmic deterministic fully-dynamic
                 algorithms for connectivity, minimum spanning tree,
                 $2$-edge, and biconnectivity",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "723--760",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Iwata:2001:CSP,
  author =       "Satoru Iwata and Lisa Fleischer and Satoru Fujishige",
  title =        "A combinatorial strongly polynomial algorithm for
                 minimizing submodular functions",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "761--777",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Beals:2001:QLB,
  author =       "Robert Beals and Harry Buhrman and Richard Cleve and
                 Michele Mosca and Ronald de Wolf",
  title =        "Quantum lower bounds by polynomials",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "778--797",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Haastad:2001:SOI,
  author =       "Johan H{\aa}stad",
  title =        "Some optimal inapproximability results",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "798--859",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Trevisan:2001:EPG,
  author =       "Luca Trevisan",
  title =        "Extractors and pseudorandom generators",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "860--879",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/502090.502099",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "We introduce a new approach to constructing
                 extractors. Extractors are algorithms that transform a
                 `weakly random' distribution into an almost uniform
                 distribution. Explicit constructions of extractors have
                 a variety of important applications, and tend to be
                 very difficult to obtain. We demonstrate an unsuspected
                 connection between extractors and pseudorandom
                 generators. In fact, we show that every pseudorandom
                 generator of a certain kind is an extractor. A
                 pseudorandom generator construction due to Impagliazzo
                 and Wigderson, once reinterpreted via our connection,
                 is already an extractor that beats most known
                 constructions and solves an important open question. We
                 also show that, using the simpler Nisan--Wigderson
                 generator and standard error-correcting codes, one can
                 build even better extractors with the additional
                 advantage that both the construction and the analysis
                 are simple and admit a short self-contained
                 description.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hella:2001:LAO,
  author =       "Lauri Hella and Leonid Libkin and Juha Nurmonen and
                 Limsoon Wong",
  title =        "Logics with aggregate operators",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "4",
  pages =        "880--907",
  month =        jul,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:42:49 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Meghini:2001:MMI,
  author =       "Carlo Meghini and Fabrizio Sebastiani and Umberto
                 Straccia",
  title =        "A model of multimedia information retrieval",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "5",
  pages =        "909--970",
  month =        sep,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:37:22 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Halevy:2001:SAD,
  author =       "Alon Y. Halevy and Inderpal Singh Mumick and Yehoshua
                 Sagiv and Oded Shmueli",
  title =        "Static analysis in datalog extensions",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "5",
  pages =        "971--1012",
  month =        sep,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:37:22 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Attiya:2001:IIB,
  author =       "Hagit Attiya and Eyal Dagan",
  title =        "Improved implementations of binary universal
                 operations",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "5",
  pages =        "1013--1037",
  month =        sep,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:37:22 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hickey:2001:IAP,
  author =       "T. Hickey and Q. Ju and M. H. {Van Emden}",
  title =        "Interval arithmetic: {From} principles to
                 implementation",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "5",
  pages =        "1038--1068",
  month =        sep,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:37:22 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://csr.uvic.ca/~vanemden/Publications/hickeyJuvE.ps;
                 http://www.cs.brandeis.edu/~tim/Papers/jacm01.pdf;
                 http://www.cs.brandeis.edu/~tim/Papers/jacm01.ps;
                 http://www.cs.brandeis.edu/~tim/Papers/jacm01.ps.gz",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  subject =      "D. Software: D.2 SOFTWARE ENGINEERING: D.2.4
                 Software/Program Verification Subjects: Correctness
                 proofs; Additional Classification: D. Software: D.2
                 SOFTWARE ENGINEERING: D.2.4 Software/Program
                 Verification Subjects: Validation; G. Mathematics of
                 Computing: G.0 GENERAL: G.1 NUMERICAL ANALYSIS: G.1.0
                 General: Subjects: Error analysis; Computer arithmetic;
                 Conditioning (and ill-conditioning); Interval
                 arithmetic. G.1.5 Roots of Nonlinear Equations:
                 Subjects: Iterative methods",
}

@Article{Bar-Noy:2001:UAA,
  author =       "Amotz Bar-Noy and Reuven Bar-Yehuda and Ari Freund and
                 Joseph (Seffi) Naor and Baruch Schieber",
  title =        "A unified approach to approximating resource
                 allocation and scheduling",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "5",
  pages =        "1069--1090",
  month =        sep,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:37:22 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Liberatore:2001:MRR,
  author =       "Paolo Liberatore",
  title =        "Monotonic reductions, representative equivalence, and
                 compilation of intractable problems",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "6",
  pages =        "1091--1125",
  month =        nov,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:35:09 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lasserre:2001:LTA,
  author =       "Jean B. Lasserre and Eduardo S. Zeron",
  title =        "A {Laplace} transform algorithm for the volume of a
                 convex polytope",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "6",
  pages =        "1126--1140",
  month =        nov,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:35:09 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gal:2001:MPU,
  author =       "Avigdor Gal and Jonathan Eckstein",
  title =        "Managing periodically updated data in relational
                 databases: a stochastic modeling approach",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "6",
  pages =        "1141--1183",
  month =        nov,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:35:09 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Frick:2001:DFO,
  author =       "Markus Frick and Martin Grohe",
  title =        "Deciding first-order properties of locally
                 tree-decomposable structures",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "6",
  pages =        "1184--1206",
  month =        nov,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:35:09 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bergstra:2001:RMB,
  author =       "Jan A. Bergstra and Alban Ponse",
  title =        "Register-machine based processes",
  journal =      j-J-ACM,
  volume =       "48",
  number =       "6",
  pages =        "1207--1241",
  month =        nov,
  year =         "2001",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:35:09 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lee:2002:FCF,
  author =       "Lillian Lee",
  title =        "Fast context-free grammar parsing requires fast
                 {Boolean} matrix multiplication",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "1",
  pages =        "1--15",
  month =        jan,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:35:09 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pettie:2002:OMS,
  author =       "Seth Pettie and Vijaya Ramachandran",
  title =        "An optimal minimum spanning tree algorithm",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "1",
  pages =        "16--34",
  month =        jan,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:35:09 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hellerstein:2002:MIB,
  author =       "Joseph M. Hellerstein and Elias Koutsoupias and Daniel
                 P. Miranker and Christos H. Papadimitriou and Vasilis
                 Samoladas",
  title =        "On a model of indexability and its bounds for range
                 queries",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "1",
  pages =        "35--55",
  month =        jan,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:35:09 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Neven:2002:ESD,
  author =       "Frank Neven and Jan {Van Den Bussche}",
  title =        "Expressiveness of structured document query languages
                 based on attribute grammars",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "1",
  pages =        "56--100",
  month =        jan,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:35:09 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Haldar:2002:BCT,
  author =       "Sibsankar Haldar and Paul Vit{\'a}nyi",
  title =        "Bounded concurrent timestamp systems using vector
                 clocks",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "1",
  pages =        "101--126",
  month =        jan,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 1 16:35:09 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chen:2002:MG,
  author =       "Zhi-Zhong Chen and Michelangelo Grigni and Christos H.
                 Papadimitriou",
  title =        "Map graphs",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "2",
  pages =        "127--138",
  month =        mar,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 25 17:35:56 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ostrovsky:2002:PTA,
  author =       "Rafail Ostrovsky and Yuval Rabani",
  title =        "Polynomial-time approximation schemes for geometric
                 min-sum median clustering",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "2",
  pages =        "139--156",
  month =        mar,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 25 17:35:56 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Li:2002:CSS,
  author =       "Ming Li and Bin Ma and Lusheng Wang",
  title =        "On the closest string and substring problems",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "2",
  pages =        "157--171",
  month =        mar,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 25 17:35:56 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Asarin:2002:TRE,
  author =       "Eugene Asarin and Paul Caspi and Oded Maler",
  title =        "Timed regular expressions",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "2",
  pages =        "172--206",
  month =        mar,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 25 17:35:56 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Low:2002:UTV,
  author =       "Steven H. Low and Larry L. Peterson and Limin Wang",
  title =        "Understanding {TCP Vegas}: a duality model",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "2",
  pages =        "207--235",
  month =        mar,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 25 17:35:56 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Roughgarden:2002:HBS,
  author =       "Tim Roughgarden and {\'E}va Tardos",
  title =        "How bad is selfish routing?",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "2",
  pages =        "236--259",
  month =        mar,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 25 17:35:56 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harchol-Balter:2002:TAU,
  author =       "Mor Harchol-Balter",
  title =        "Task assignment with unknown duration",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "2",
  pages =        "260--288",
  month =        mar,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 25 17:35:56 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Zwick:2002:APS,
  author =       "Uri Zwick",
  title =        "All pairs shortest paths using bridging sets and
                 rectangular matrix multiplication",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "3",
  pages =        "289--317",
  month =        may,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 10 17:35:44 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ajtai:2002:CEU,
  author =       "Miklos Ajtai and Randal Burns and Ronald Fagin and
                 Darrell D. E. Long and Larry Stockmeyer",
  title =        "Compactly encoding unstructured inputs with
                 differential compression",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "3",
  pages =        "318--367",
  month =        may,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 10 17:35:44 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fan:2002:XIC,
  author =       "Wenfei Fan and Leonid Libkin",
  title =        "On {XML} integrity constraints in the presence of
                 {DTDs}",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "3",
  pages =        "368--406",
  month =        may,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 10 17:35:44 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kameda:2002:PDD,
  author =       "Hisao Kameda and Odile Pourtallier",
  title =        "Paradoxes in distributed decisions on optimal load
                 balancing for networks of homogeneous computers",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "3",
  pages =        "407--433",
  month =        may,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 10 17:35:44 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Frumkin:2002:TBC,
  author =       "Michael A. Frumkin and Rob F. {Van der Wijngaart}",
  title =        "Tight bounds on cache use for stencil operations on
                 rectangular grids",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "3",
  pages =        "434--453",
  month =        may,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 10 17:35:44 MDT 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dubois:2002:QDT,
  author =       "Didier Dubois and H{\'e}l{\`e}ne Fargier and Henri
                 Prade and Patrice Perny",
  title =        "Qualitative decision theory: from {Savage}'s axioms to
                 nonmonotonic reasoning",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "4",
  pages =        "455--495",
  month =        jul,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ambainis:2002:DQC,
  author =       "Andris Ambainis and Ashwin Nayak and Amnon Ta-Shma and
                 Umesh Vazirani",
  title =        "Dense quantum coding and quantum finite automata",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "4",
  pages =        "496--511",
  month =        jul,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{McAllester:2002:CAS,
  author =       "David McAllester",
  title =        "On the complexity analysis of static analyses",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "4",
  pages =        "512--537",
  month =        jul,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bhargavan:2002:FVS,
  author =       "Karthikeyan Bhargavan and Davor Obradovic and Carl A.
                 Gunter",
  title =        "Formal verification of standards for distance vector
                 routing protocols",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "4",
  pages =        "538--576",
  month =        jul,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lehmann:2002:TRA,
  author =       "Daniel Lehmann and Liadan Ita O'Callaghan and Yoav
                 Shoham",
  title =        "Truth revelation in approximately efficient
                 combinatorial auctions",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "5",
  pages =        "577--602",
  month =        sep,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Huson:2002:GPM,
  author =       "Daniel H. Huson and Knut Reinert and Eugene W. Myers",
  title =        "The greedy path-merging algorithm for contig
                 scaffolding",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "5",
  pages =        "603--615",
  month =        sep,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kleinberg:2002:AAC,
  author =       "Jon Kleinberg and {\'E}va Tardos",
  title =        "Approximation algorithms for classification problems
                 with pairwise relationships: metric labeling and
                 {Markov} random fields",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "5",
  pages =        "616--639",
  month =        sep,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Seiden:2002:OPP,
  author =       "Steven S. Seiden",
  title =        "On the online bin packing problem",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "5",
  pages =        "640--671",
  month =        sep,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alur:2002:ATT,
  author =       "Rajeev Alur and Thomas A. Henzinger and Orna
                 Kupferman",
  title =        "Alternating-time temporal logic",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "5",
  pages =        "672--713",
  month =        sep,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Halpern:2002:UTP,
  author =       "Joe Halpern",
  title =        "Update: {Time} to publication statistics",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "6",
  pages =        "715--715",
  month =        nov,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Flum:2002:QET,
  author =       "J{\"o}rg Flum and Markus Frick and Martin Grohe",
  title =        "Query evaluation via tree-decompositions",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "6",
  pages =        "716--752",
  month =        nov,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stockmeyer:2002:CLB,
  author =       "Larry Stockmeyer and Albert R. Meyer",
  title =        "Cosmological lower bound on the circuit complexity of
                 a small problem in logic",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "6",
  pages =        "753--784",
  month =        nov,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Caplain:2002:CPS,
  author =       "Gilbert Caplain",
  title =        "Correctness properties in a shared-memory parallel
                 language",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "6",
  pages =        "785--827",
  month =        nov,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sen:2002:TTC,
  author =       "Sandeep Sen and Siddhartha Chatterjee and Neeraj
                 Dumir",
  title =        "Towards a theory of cache-efficient algorithms",
  journal =      j-J-ACM,
  volume =       "49",
  number =       "6",
  pages =        "828--858",
  month =        nov,
  year =         "2002",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:34:59 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Halpern:2003:JA,
  author =       "Joseph Y. Halpern",
  title =        "{JACM}'s 50th anniversary",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "3--7",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Staff:2003:JEC,
  author =       "{Journal of the ACM staff}",
  title =        "{JACM} editors-in-chief",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "9--9",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alt:2003:JAB,
  author =       "Franz Alt",
  title =        "{Journal of the ACM}---the beginnings",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "10--11",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Juncosa:2003:T,
  author =       "Mario L. Juncosa",
  title =        "Transitions 1959--1964",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "12--13",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gotlieb:2003:GAJ,
  author =       "C. C. Gotlieb",
  title =        "A {Golden Age} for {JACM}",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "14--14",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Miller:2003:J,
  author =       "Ray Miller",
  title =        "{JACM} 1973--1975",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "15--15",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Coffman:2003:J,
  author =       "Ed Coffman",
  title =        "{JACM} 1976--1979",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "16--16",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fischer:2003:J,
  author =       "Michael J. Fischer",
  title =        "{JACM} 1983--1986",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "17--17",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rosenkrantz:2003:J,
  author =       "Daniel J. Rosenkrantz",
  title =        "{JACM} 1986--1990",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "18--18",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Leighton:2003:J,
  author =       "Tom Leighton",
  title =        "{JACM} 1991--1997",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "19--19",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mandelbaum:2003:RH,
  author =       "Mark Mandelbaum",
  title =        "A report from {Headquarters}",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "21--23",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brooks:2003:TGC,
  author =       "Frederick P. {Brooks, Jr.}",
  title =        "Three great challenges for half-century-old computer
                 science",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "25--26",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cook:2003:IPV,
  author =       "Stephen Cook",
  title =        "The importance of the {P} versus {NP} question",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "27--29",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Corbato:2003:CSC,
  author =       "Fernando J. Corbat{\'o}",
  title =        "On computer system challenges",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "30--31",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Feigenbaum:2003:SCG,
  author =       "Edward A. Feigenbaum",
  title =        "Some challenges and grand challenges for computational
                 intelligence",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "32--40",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gray:2003:WND,
  author =       "Jim Gray",
  title =        "What next?: a dozen information-technology research
                 goals",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "41--57",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hartmanis:2003:SCC,
  author =       "Juris Hartmanis",
  title =        "Separation of complexity classes",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "58--62",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hoare:2003:VCG,
  author =       "Tony Hoare",
  title =        "The verifying compiler: a grand challenge for
                 computing research",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "63--69",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lampson:2003:GCU,
  author =       "Butler Lampson",
  title =        "Getting computers to understand",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "70--72",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{McCarthy:2003:PPC,
  author =       "John McCarthy",
  title =        "Problems and projections in {CS} for the next 49
                 years",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "73--79",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Razborov:2003:PPC,
  author =       "Alexander Razborov",
  title =        "Propositional proof complexity",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "80--82",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Reddy:2003:TOP,
  author =       "Raj Reddy",
  title =        "Three open problems in {AI}",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "83--86",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shor:2003:WHM,
  author =       "Peter W. Shor",
  title =        "Why haven't more quantum algorithms been found?",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "87--90",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Stearns:2003:DVN,
  author =       "Richard E. Stearns",
  title =        "Deterministic versus nondeterministic time and lower
                 bound problems",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "91--95",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Valiant:2003:TPC,
  author =       "Leslie G. Valiant",
  title =        "Three problems in computer science",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "96--99",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yao:2003:CPC,
  author =       "Andrew Chi-Chih Yao",
  title =        "Classical physics and the {Church--Turing Thesis}",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "1",
  pages =        "100--105",
  month =        jan,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dechter:2003:MBG,
  author =       "Rina Dechter and Irina Rish",
  title =        "Mini-buckets: a general scheme for bounded inference",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "2",
  pages =        "107--153",
  month =        mar,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Beame:2003:TST,
  author =       "Paul Beame and Michael Saks and Xiaodong Sun and Erik
                 Vee",
  title =        "Time-space trade-off lower bounds for randomized
                 computation of decision problems",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "2",
  pages =        "154--195",
  month =        mar,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sahai:2003:CPS,
  author =       "Amit Sahai and Salil Vadhan",
  title =        "A complete problem for statistical zero knowledge",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "2",
  pages =        "196--249",
  month =        mar,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jayasimha:2003:FDD,
  author =       "D. N. Jayasimha and Loren Schwiebert and D. Manivannan
                 and Jeff A. May",
  title =        "A foundation for designing deadlock-free routing
                 algorithms in wormhole networks",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "2",
  pages =        "250--275",
  month =        mar,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Mar 26 13:35:00 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Zhang:2003:EPV,
  author =       "Yuanlin Zhang and Roland H. C. Yap",
  title =        "Erratum: {P. van Beek} and {R. Dechter}'s theorem on
                 constraint looseness and local consistency",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "3",
  pages =        "277--279",
  month =        may,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 12 19:05:50 MDT 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "See \cite{vanBeek:1997:CTL}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Darwiche:2003:DAI,
  author =       "Adnan Darwiche",
  title =        "A differential approach to inference in {Bayesian}
                 networks",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "3",
  pages =        "280--305",
  month =        may,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 12 19:05:50 MDT 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Reed:2003:HRB,
  author =       "Bruce Reed",
  title =        "The height of a random binary search tree",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "3",
  pages =        "306--332",
  month =        may,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 12 19:05:50 MDT 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Drmota:2003:AAH,
  author =       "Michael Drmota",
  title =        "An analytic approach to the height of binary search
                 trees {II}",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "3",
  pages =        "333--374",
  month =        may,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 12 19:05:50 MDT 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bilardi:2003:ACS,
  author =       "Gianfranco Bilardi and Keshav Pingali",
  title =        "Algorithms for computing the static single assignment
                 form",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "3",
  pages =        "375--425",
  month =        may,
  year =         "2003",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon May 12 19:05:50 MDT 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Raghavan:2003:EPE,
  author =       "Prabhakar Raghavan",
  title =        "Editorial: Preserving excellence through change",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "4",
  pages =        "427--428",
  month =        jul,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/792538.792539",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Agrawal:2003:PIT,
  author =       "Manindra Agrawal and Somenath Biswas",
  title =        "Primality and identity testing via {Chinese}
                 remaindering",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "4",
  pages =        "429--443",
  month =        jul,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/792538.792540",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We give a simple and new randomized primality testing
                 algorithm by reducing primality testing for number $n$
                 to testing if a specific univariate identity over $
                 Z_n$ holds.\par

                 We also give new randomized algorithms for testing if a
                 multivariate polynomial, over a finite field or over
                 rationals, is identically zero. The first of these
                 algorithms also works over $ Z_n$ for any $n$. The
                 running time of the algorithms is polynomial in the
                 size of arithmetic circuit representing the input
                 polynomial and the error parameter. These algorithms
                 use fewer random bits and work for a larger class of
                 polynomials than all the previously known methods, for
                 example, the Schwartz--Zippel test [Schwartz 1980;
                 Zippel 1979], Chen--Kao and Lewin--Vadhan tests [Chen
                 and Kao 1997; Lewin and Vadhan 1998].",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "polynomial identity testing; primality testing",
}

@Article{Attiya:2003:AAP,
  author =       "Hagit Attiya and Arie Fouren",
  title =        "Algorithms adapting to point contention",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "4",
  pages =        "444--468",
  month =        jul,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/792538.792541",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article introduces the {\em sieve}, a novel
                 building block that allows to adapt to the number of
                 simultaneously active processes (the {\em point
                 contention\/}) during the execution of an operation. We
                 present an implementation of the sieve in which each
                 sieve operation requires $ O(k \log k) $ steps, where
                 $k$ is the point contention during the
                 operation.\par

                 The sieve is the cornerstone of the first wait-free
                 algorithms that adapt to point contention using only
                 read and write operations. Specifically, we present
                 efficient algorithms for long-lived renaming,
                 timestamping and collecting information.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Zhong:2003:CTG,
  author =       "Ning Zhong and Klaus Weihrauch",
  title =        "Computability theory of generalized functions",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "4",
  pages =        "469--505",
  month =        jul,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/792538.792542",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The theory of generalized functions is the foundation
                 of the modern theory of partial differential equations
                 (PDE). As computers are playing an ever-larger role in
                 solving PDEs, it is important to know those operations
                 involving generalized functions in analysis and PDE
                 that can be computed on digital computers. In this
                 article, we introduce natural concepts of computability
                 on test functions and generalized functions, as well as
                 computability on Schwartz test functions and tempered
                 distributions. Type-2 Turing machines are used as the
                 machine model [Weihrauch 2000]. It is shown here that
                 differentiation and integration on distributions are
                 computable operators, and various types of Fourier
                 transforms and convolutions are also computable
                 operators. As an application, it is shown that the
                 solution operator of the distributional inhomogeneous
                 three dimensional wave equation is computable.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blum:2003:NTL,
  author =       "Avrim Blum and Adam Kalai and Hal Wasserman",
  title =        "Noise-tolerant learning, the parity problem, and the
                 statistical query model",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "4",
  pages =        "506--519",
  month =        jul,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/792538.792543",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We describe a slightly subexponential time algorithm
                 for learning parity functions in the presence of random
                 classification noise, a problem closely related to
                 several cryptographic and coding problems. Our
                 algorithm runs in polynomial time for the case of
                 parity functions that depend on only the first $ O(\log
                 n \log \log n) $ bits of input, which provides the
                 first known instance of an efficient noise-tolerant
                 algorithm for a concept class that is not learnable in
                 the Statistical Query model of Kearns [1998]. Thus, we
                 demonstrate that the set of problems learnable in the
                 statistical query model is a strict subset of those
                 problems learnable in the presence of noise in the PAC
                 model.\par

                 In coding-theory terms, what we give is a poly(n)-time
                 algorithm for decoding linear $ k \times n $ codes in
                 the presence of random noise for the case of $ k = c
                 \log n \log \log n $ for some $ c > 0 $. (The case of $
                 k = O(\log n) $ is trivial since one can just
                 individually check each of the $ 2^k $ possible
                 messages and choose the one that yields the closest
                 codeword.)\par

                 A natural extension of the statistical query model is
                 to allow queries about statistical properties that
                 involve $t$-tuples of examples, as opposed to just
                 single examples. The second result of this article is
                 to show that any class of functions learnable (strongly
                 or weakly) with $t$-wise queries for $ t = O(\log n)$
                 is also weakly learnable with standard unary queries.
                 Hence, this natural extension to the statistical query
                 model does not increase the set of weakly learnable
                 functions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Leonardi:2003:BDQ,
  author =       "Emilio Leonardi and Marco Mellia and Fabio Neri and
                 Marco Ajmone Marsan",
  title =        "Bounds on delays and queue lengths in input-queued
                 cell switches",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "4",
  pages =        "520--550",
  month =        jul,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/792538.792544",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this article, we develop a general methodology,
                 mainly based upon Lyapunov functions, to derive bounds
                 on average delays, and on averages and variances of
                 queue lengths in complex systems of queues. We apply
                 this methodology to cell-based switches and routers,
                 considering first output-queued (OQ) architectures, in
                 order to provide a simple example of our methodology,
                 and then both input-queued (IQ), and combined
                 input/output queued (CIOQ) architectures. These latter
                 switching architectures require a scheduling algorithm
                 to select at each slot a subset of input-buffered cells
                 that can be transferred toward output ports. Although
                 the stability properties (i.e., the limit throughput)
                 of IQ and CIOQ cell-based switches were already studied
                 for several classes of scheduling algorithms, very few
                 analytical results concerning cell delays or queue
                 lengths are available in the technical literature. We
                 concentrate on Maximum Weight Matching (MWM) and
                 Maximal Size Matching (mSM) scheduling algorithms;
                 while the former was proved to maximize throughput, the
                 latter allows simpler implementation. The derived
                 bounds are shown to be rather tight when compared to
                 simulation results.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kalyanasundaram:2003:MFT,
  author =       "Bala Kalyanasundaram and Kirk R. Pruhs",
  title =        "Minimizing flow time nonclairvoyantly",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "4",
  pages =        "551--567",
  month =        jul,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/792538.792545",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We consider the problem of scheduling a collection of
                 dynamically arriving jobs with unknown execution times
                 so as to minimize the average flow time. This is the
                 classic CPU scheduling problem faced by time-sharing
                 operating systems where preemption is allowed. It is
                 easy to see that every algorithm that doesn't
                 unnecessarily idle the processor is at worst
                 $n$-competitive, where $n$ is the number of jobs. Yet
                 there was no known nonclairvoyant algorithm,
                 deterministic or randomized, with a competitive ratio
                 provably $ O(n^{1 - \epsilon })$. In this article, we
                 give a randomized nonclairvoyant algorithm, RMLF, that
                 has competitive ratio $ O(\log n \log \log n)$ against
                 an oblivious adversary. RMLF is a slight variation of
                 the multilevel feedback (MLF) algorithm used by the
                 UNIX operating system, further justifying the adoption
                 of this algorithm. It is known that every randomized
                 nonclairvoyant algorithm is $ \Omega (\log
                 n)$-competitive, and that every deterministic
                 nonclairvoyant algorithm is $ \Omega (n^{1 /
                 3})$-competitive.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vocking:2003:HAH,
  author =       "Berthold V{\"o}cking",
  title =        "How asymmetry helps load balancing",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "4",
  pages =        "568--589",
  month =        jul,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/792538.792546",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article deals with randomized allocation
                 processes placing sequentially $n$ balls into $n$ bins.
                 We consider multiple-choice algorithms that choose $d$
                 locations (bins) for each ball at random, inspect the
                 content of these locations, and then place the ball
                 into one of them, for example, in a location with
                 minimum number of balls. The goal is to achieve a good
                 load balancing. This objective is measured in terms of
                 the maximum load, that is, the maximum number of balls
                 in the same bin.\par

                 Multiple-choice algorithms have been studied
                 extensively in the past. Previous analyses typically
                 assume that the $d$ locations for each ball are drawn
                 uniformly and independently from the set of all bins.
                 We investigate whether a nonuniform or dependent
                 selection of the $d$ locations of a ball may lead to a
                 better load balancing. Three types of selection,
                 resulting in three classes of algorithms, are
                 distinguished: (1) uniform and independent, (2)
                 nonuniform and independent, and (3) nonuniform and
                 dependent.\par

                 Our first result shows that the well-studied uniform
                 greedy algorithm (class 1) does not obtain the smallest
                 possible maximum load. In particular, we introduce a
                 nonuniform algorithm (class 2) that obtains a better
                 load balancing. Surprisingly, this algorithm uses an
                 unfair tie-breaking mechanism, called Always-Go-Left,
                 resulting in an asymmetric assignment of the balls to
                 the bins. Our second result is a lower bound showing
                 that a dependent allocation (class 3) cannot yield
                 significant further improvement.\par

                 Our upper and lower bounds on the maximum load are
                 tight up to additive constants, proving that the
                 Always-Go-Left algorithm achieves an almost optimal
                 load balancing among all sequential multiple-choice
                 algorithm. Furthermore, we show that the results for
                 the Always-Go-Left algorithm can be generalized to
                 allocation processes with more balls than bins and even
                 to infinite processes in which balls are inserted and
                 deleted by an oblivious adversary.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Krokhin:2003:RAT,
  author =       "Andrei Krokhin and Peter Jeavons and Peter Jonsson",
  title =        "Reasoning about temporal relations: {The} tractable
                 subalgebras of {Allen}'s interval algebra",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "5",
  pages =        "591--640",
  month =        sep,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/876638.876639",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Allen's interval algebra is one of the best
                 established formalisms for temporal reasoning. This
                 article provides the final step in the classification
                 of complexity for satisfiability problems over
                 constraints expressed in this algebra. When the
                 constraints are chosen from the full Allen's algebra,
                 this form of satisfiability problem is known to be
                 NP-complete. However, eighteen tractable subalgebras
                 have previously been identified; we show here that
                 these subalgebras include all possible tractable
                 subsets of Allen's algebra. In other words, we show
                 that this algebra contains exactly eighteen maximal
                 tractable subalgebras, and reasoning in any fragment
                 not entirely contained in one of these subalgebras is
                 NP-complete. We obtain this dichotomy result by giving
                 a new uniform description of the known maximal
                 tractable subalgebras, and then systematically using a
                 general algebraic technique for identifying maximal
                 subalgebras with a given property.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Barvinok:2003:GMT,
  author =       "Alexander Barvinok and S{\'a}ndor P. Fekete and David
                 S. Johnson and Arie Tamir and Gerhard J. Woeginger and
                 Russ Woodroofe",
  title =        "The geometric maximum traveling salesman problem",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "5",
  pages =        "641--664",
  month =        sep,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/876638.876640",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We consider the traveling salesman problem when the
                 cities are points in $ \mathbb {R}^d $ for some fixed
                 $d$ and distances are computed according to geometric
                 distances, determined by some norm. We show that for
                 any polyhedral norm, the problem of finding a tour of
                 maximum length can be solved in polynomial time. If
                 arithmetic operations are assumed to take unit time,
                 our algorithms run in time $ O(n^{f - 2} \log n)$,
                 where $f$ is the number of facets of the polyhedron
                 determining the polyhedral norm. Thus, for example, we
                 have $ O(n^2 \log n)$ algorithms for the cases of
                 points in the plane under the Rectilinear and Sup
                 norms. This is in contrast to the fact that finding a
                 minimum length tour in each case is NP-hard. Our
                 approach can be extended to the more general case of
                 quasi-norms with a not necessarily symmetric unit ball,
                 where we get a complexity of $ O(n^{2f - 2} \log
                 n)$.\par

                 For the special case of two-dimensional metrics with $
                 f = 4$ (which includes the Rectilinear and Sup norms),
                 we present a simple algorithm with $ O(n)$ running
                 time. The algorithm does not use any indirect
                 addressing, so its running time remains valid even in
                 comparison based models in which sorting requires $
                 \Omega (n \log n)$ time. The basic mechanism of the
                 algorithm provides some intuition on why polyhedral
                 norms allow fast algorithms.\par

                 Complementing the results on simplicity for polyhedral
                 norms, we prove that, for the case of Euclidean
                 distances in $ \mathbb {R}^d$ for $ d \geq 3$, the
                 Maximum TSP is NP-hard. This sheds new light on the
                 well-studied difficulties of Euclidean distances.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Wu:2003:PDC,
  author =       "Wei Biao Wu and Chinya V. Ravishankar",
  title =        "The performance of difference coding for sets and
                 relational tables",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "5",
  pages =        "665--693",
  month =        sep,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/876638.876641",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We characterize the performance of difference coding
                 for compressing sets and database relations through an
                 analysis of the problem of estimating the number of
                 bits needed for storing the spacings between values in
                 sets of integers. We provide analytical expressions for
                 estimating the effectiveness of difference coding when
                 the elements of the sets or the attribute fields in
                 database tuples are drawn from the uniform and Zipf
                 distributions. We also examine the case where a
                 uniformly distributed domain is combined with a Zipf
                 distribution, and with an arbitrary distribution. We
                 present limit theorems for most cases, and
                 probabilistic convergence results in other cases. We
                 also examine the effects of attribute domain reordering
                 on the compression ratio. Our simulations show
                 excellent agreement with theory.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Benedikt:2003:DRF,
  author =       "Michael Benedikt and Leonid Libkin and Thomas
                 Schwentick and Luc Segoufin",
  title =        "Definable relations and first-order query languages
                 over strings",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "5",
  pages =        "694--751",
  month =        sep,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/876638.876642",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study analogs of classical relational calculus in
                 the context of strings. We start by studying string
                 logics. Taking a classical model-theoretic approach, we
                 fix a set of string operations and look at the
                 resulting collection of definable relations. These form
                 an algebra---a class of $n$-ary relations for every
                 $n$, closed under projection and Boolean operations. We
                 show that by choosing the string vocabulary carefully,
                 we get string logics that have desirable properties:
                 computable evaluation and normal forms. We identify
                 five distinct models and study the differences in their
                 model-theory and complexity of evaluation. We identify
                 a subset of these models that have additional
                 attractive properties, such as finite VC dimension and
                 quantifier elimination.\par

                 Once you have a logic, the addition of free predicate
                 symbols gives you a string query language. The
                 resulting languages have attractive closure properties
                 from a database point of view: while SQL does not allow
                 the full composition of string pattern-matching
                 expressions with relational operators, these logics
                 yield compositional query languages that can capture
                 common string-matching queries while remaining
                 tractable. For each of the logics studied in the first
                 part of the article, we study properties of the
                 corresponding query languages. We give bounds on the
                 data complexity of queries, extend the normal form
                 results from logics to queries, and show that the
                 languages have corresponding algebras expressing safe
                 queries.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Clarke:2003:CGA,
  author =       "Edmund Clarke and Orna Grumberg and Somesh Jha and
                 Yuan Lu and Helmut Veith",
  title =        "Counterexample-guided abstraction refinement for
                 symbolic model checking",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "5",
  pages =        "752--794",
  month =        sep,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/876638.876643",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Sep 8 17:55:23 MDT 2003",
  bibsource =    "http://portal.acm.org/; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The state explosion problem remains a major hurdle in
                 applying symbolic model checking to large hardware
                 designs. State space abstraction, having been essential
                 for verifying designs of industrial complexity, is
                 typically a manual process, requiring considerable
                 creativity and insight.\par

                 In this article, we present an automatic iterative
                 abstraction-refinement methodology that extends
                 symbolic model checking. In our method, the initial
                 abstract model is generated by an automatic analysis of
                 the control structures in the program to be verified.
                 Abstract models may admit erroneous (or ``spurious'')
                 counterexamples. We devise new symbolic techniques that
                 analyze such counterexamples and refine the abstract
                 model correspondingly. We describe aSMV, a prototype
                 implementation of our methodology in NuSMV. Practical
                 experiments including a large Fujitsu IP core design
                 with about 500 latches and 10000 lines of SMV code
                 confirm the effectiveness of our approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jain:2003:GFL,
  author =       "Kamal Jain and Mohammad Mahdian and Evangelos Markakis
                 and Amin Saberi and Vijay V. Vazirani",
  title =        "Greedy facility location algorithms analyzed using
                 dual fitting with factor-revealing {LP}",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "6",
  pages =        "795--824",
  month =        nov,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/950620.950621",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 28 14:26:11 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this article, we will formalize the method of dual
                 fitting and the idea of factor-revealing LP. This
                 combination is used to design and analyze two greedy
                 algorithms for the metric uncapacitated facility
                 location problem. Their approximation factors are 1.861
                 and 1.61, with running times of $ O(m \log m) $ and $
                 O(n^3) $, respectively, where $n$ is the total number
                 of vertices and $m$ is the number of edges in the
                 underlying complete bipartite graph between cities and
                 facilities. The algorithms are used to improve recent
                 results for several variants of the problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Buchsbaum:2003:ITC,
  author =       "Adam L. Buchsbaum and Glenn S. Fowler and Raffaele
                 Giancarlo",
  title =        "Improving table compression with combinatorial
                 optimization",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "6",
  pages =        "825--851",
  month =        nov,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/950620.950622",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 28 14:26:11 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study the problem of compressing massive tables
                 within the partition-training paradigm introduced by
                 Buchsbaum et al. [2000], in which a table is
                 partitioned by an off-line training procedure into
                 disjoint intervals of columns, each of which is
                 compressed separately by a standard, on-line compressor
                 like gzip. We provide a new theory that unifies
                 previous experimental observations on partitioning and
                 heuristic observations on column permutation, all of
                 which are used to improve compression rates. Based on
                 this theory, we devise the first on-line training
                 algorithms for table compression, which can be applied
                 to individual files, not just continuously operating
                 sources; and also a new, off-line training algorithm,
                 based on a link to the asymmetric traveling salesman
                 problem, which improves on prior work by rearranging
                 columns prior to partitioning. We demonstrate these
                 results experimentally. On various test files, the
                 on-line algorithms provide 35--55\% improvement over
                 gzip with negligible slowdown; the off-line reordering
                 provides up to 20\% further improvement over
                 partitioning alone. We also show that a variation of
                 the table compression problem is MAX-SNP hard.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dwork:2003:MFM,
  author =       "Cynthia Dwork and Moni Naor and Omer Reingold and
                 Larry Stockmeyer",
  title =        "Magic Functions: In Memoriam: {Bernard M. Dwork}
                 1923--1998",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "6",
  pages =        "852--921",
  month =        nov,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/950620.950623",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 28 14:26:11 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We prove that three apparently unrelated fundamental
                 problems in distributed computing, cryptography, and
                 complexity theory, are essentially the same problem.
                 These three problems and brief descriptions of them
                 follow. (1) The selective decommitment problem. An
                 adversary is given commitments to a collection of
                 messages, and the adversary can ask for some subset of
                 the commitments to be opened. The question is whether
                 seeing the decommitments to these open plaintexts
                 allows the adversary to learn something unexpected
                 about the plaintexts that are unopened. (2) The power
                 of 3-round weak zero-knowledge arguments. The question
                 is what can be proved in (a possibly weakened form of)
                 zero-knowledge in a 3-round argument. In particular, is
                 there a language outside of BPP that has a 3-round
                 public-coin weak zero-knowledge argument? (3) The
                 Fiat--Shamir methodology. This is a method for
                 converting a 3-round public-coin argument (viewed as an
                 identification scheme) to a 1-round signature scheme.
                 The method requires what we call a ``magic function''
                 that the signer applies to the first-round message of
                 the argument to obtain a second-round message (queries
                 from the verifier). An open question here is whether
                 every 3-round public-coin argument for a language
                 outside of BPP has a magic function.\par

                 It follows easily from definitions that if a 3-round
                 public-coin argument system is zero-knowledge in the
                 standard (fairly strong) sense, then it has no magic
                 function. We define a weakening of zero-knowledge such
                 that zero-knowledge ? no-magic-function still holds.
                 For this weakened form of zero-knowledge, we give a
                 partial converse: informally, if a 3-round public-coin
                 argument system is not weakly zero-knowledge, then some
                 form of magic is possible for this argument system. We
                 obtain our definition of weak zero-knowledge by a
                 sequence of weakenings of the standard definition,
                 forming a hierarchy. Intermediate forms of
                 zero-knowledge in this hierarchy are reasonable ones,
                 and they may be useful in applications. Finally, we
                 relate the selective decommitment problem to
                 public-coin proof systems and arguments at an
                 intermediate level of the hierarchy, and obtain several
                 positive security results for selective decommitment.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mostefaoui:2003:CIV,
  author =       "Achour Mostefaoui and Sergio Rajsbaum and Michel
                 Raynal",
  title =        "Conditions on input vectors for consensus solvability
                 in asynchronous distributed systems",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "6",
  pages =        "922--954",
  month =        nov,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/950620.950624",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 28 14:26:11 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article introduces and explores the
                 condition-based approach to solve the consensus problem
                 in asynchronous systems. The approach studies
                 conditions that identify sets of input vectors for
                 which it is possible to solve consensus despite the
                 occurrence of up to $f$ process crashes. The first main
                 result defines acceptable conditions and shows that
                 these are exactly the conditions for which a consensus
                 protocol exists. Two examples of realistic acceptable
                 conditions are presented, and proved to be maximal, in
                 the sense that they cannot be extended and remain
                 acceptable. The second main result is a generic
                 consensus shared-memory protocol for any acceptable
                 condition. The protocol always guarantees agreement and
                 validity, and terminates (at least) when the inputs
                 satisfy the condition with which the protocol has been
                 instantiated, or when there are no crashes. An
                 efficient version of the protocol is then designed for
                 the message passing model that works when $ f < n / 2$,
                 and it is shown that no such protocol exists when $ f
                 \geq n / 2$. It is also shown how the protocol's safety
                 can be traded for its liveness.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Beal:2003:GSR,
  author =       "Marie-Pierre B{\'e}al and Dominique Perrin",
  title =        "On the generating sequences of regular languages on
                 $k$ symbols",
  journal =      j-J-ACM,
  volume =       "50",
  number =       "6",
  pages =        "955--980",
  month =        nov,
  year =         "2003",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/950620.950625",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 28 14:26:11 MST 2003",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The main result is a characterization of the
                 generating sequences of the length of words in a
                 regular language on $k$ symbols. We say that a sequence
                 $s$ of integers is regular if there is a finite graph
                 $G$ with two vertices $i$, $t$ such that $ s_n$ is the
                 number of paths of length $n$ from $i$ to $t$ in $G$.
                 Thus the generating sequence of a regular language is
                 regular. We prove that a sequence $s$ is the generating
                 sequence of a regular language on $k$ symbols if and
                 only if both sequences $ s = (s_n)_{n \geq 0}$ and $ t
                 = (k^n - s_n)_{n \geq 0}$ are regular.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kolaitis:2004:F,
  author =       "Phokion Kolaitis and Victor Vianu",
  title =        "Foreword",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "1",
  pages =        "1--1",
  month =        jan,
  year =         "2004",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/962446.962447",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jan 5 17:16:06 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Miklau:2004:CEF,
  author =       "Gerome Miklau and Dan Suciu",
  title =        "Containment and equivalence for a fragment of
                 {XPath}",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "1",
  pages =        "2--45",
  month =        jan,
  year =         "2004",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/962446.962448",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jan 5 17:16:06 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chen:2004:DDN,
  author =       "Chung-Min Chen and Christine T. Cheng",
  title =        "From discrepancy to declustering: Near-optimal
                 multidimensional declustering strategies for range
                 queries",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "1",
  pages =        "46--73",
  month =        jan,
  year =         "2004",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/962446.962449",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jan 5 17:16:06 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gottlob:2004:MDE,
  author =       "Georg Gottlob and Christoph Koch",
  title =        "Monadic datalog and the expressive power of languages
                 for {Web} information extraction",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "1",
  pages =        "74--113",
  month =        jan,
  year =         "2004",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/962446.962450",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jan 5 17:16:06 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Raz:2004:RLB,
  author =       "Ran Raz",
  title =        "Resolution lower bounds for the weak pigeonhole
                 principle",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "2",
  pages =        "115--138",
  month =        mar,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 6 07:04:43 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Agarwal:2004:LAP,
  author =       "Pankaj K. Agarwal and Eran Nevo and J{\'a}nos Pach and
                 Rom Pinchasi and Micha Sharir and Shakhar Smorodinsky",
  title =        "Lenses in arrangements of pseudo-circles and their
                 applications",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "2",
  pages =        "139--186",
  month =        mar,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 6 07:04:43 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Haastad:2004:SAR,
  author =       "Johan H{\aa}stad and Mats N{\aa}slund",
  title =        "The security of all {RSA} and discrete log bits",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "2",
  pages =        "187--230",
  month =        mar,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 6 07:04:43 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Naor:2004:NTC,
  author =       "Moni Naor and Omer Reingold",
  title =        "Number-theoretic constructions of efficient
                 pseudo-random functions",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "2",
  pages =        "231--262",
  month =        mar,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 6 07:04:43 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kleinberg:2004:SP,
  author =       "Jon Kleinberg and Christos Papadimitriou and Prabhakar
                 Raghavan",
  title =        "Segmentation problems",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "2",
  pages =        "263--280",
  month =        mar,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 6 07:04:43 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Atserias:2004:SCU,
  author =       "Albert Atserias",
  title =        "On sufficient conditions for unsatisfiability of
                 random formulas",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "2",
  pages =        "281--311",
  month =        mar,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 6 07:04:43 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gottlob:2004:ESO,
  author =       "Georg Gottlob and Phokion G. Kolaitis and Thomas
                 Schwentick",
  title =        "Existential second-order logic over graphs: {Charting}
                 the tractability frontier",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "2",
  pages =        "312--362",
  month =        mar,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Mar 6 07:04:43 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Alber:2004:PTD,
  author =       "Jochen Alber and Michael R. Fellows and Rolf
                 Niedermeier",
  title =        "Polynomial-time data reduction for dominating set",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "3",
  pages =        "363--384",
  month =        may,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 8 16:54:20 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Spielman:2004:SAA,
  author =       "Daniel A. Spielman and Shang-Hua Teng",
  title =        "Smoothed analysis of algorithms: {Why} the simplex
                 algorithm usually takes polynomial time",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "3",
  pages =        "385--463",
  month =        may,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 8 16:54:20 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Burgisser:2004:LBB,
  author =       "Peter B{\"u}rgisser and Martin Lotz",
  title =        "Lower bounds on the bounded coefficient complexity of
                 bilinear maps",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "3",
  pages =        "464--482",
  month =        may,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 8 16:54:20 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Plandowski:2004:SWE,
  author =       "Wojciech Plandowski",
  title =        "Satisfiability of word equations with constants is in
                 {PSPACE}",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "3",
  pages =        "483--496",
  month =        may,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 8 16:54:20 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kannan:2004:CGB,
  author =       "Ravi Kannan and Santosh Vempala and Adrian Vetta",
  title =        "On clusterings: {Good}, bad and spectral",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "3",
  pages =        "497--515",
  month =        may,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 8 16:54:20 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Becchetti:2004:NSM,
  author =       "Luca Becchetti and Stefano Leonardi",
  title =        "Nonclairvoyant scheduling to minimize the total flow
                 time on single and parallel machines",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "4",
  pages =        "517--539",
  month =        jul,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jul 10 09:49:01 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bertsimas:2004:SCP,
  author =       "Dimitris Bertsimas and Santosh Vempala",
  title =        "Solving convex programs by random walks",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "4",
  pages =        "540--556",
  month =        jul,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jul 10 09:49:01 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Canetti:2004:ROM,
  author =       "Ran Canetti and Oded Goldreich and Shai Halevi",
  title =        "The random oracle methodology, revisited",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "4",
  pages =        "557--594",
  month =        jul,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jul 10 09:49:01 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aaronson:2004:QLB,
  author =       "Scott Aaronson and Yaoyun Shi",
  title =        "Quantum lower bounds for the collision and the element
                 distinctness problems",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "4",
  pages =        "595--605",
  month =        jul,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jul 10 09:49:01 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Agarwal:2004:AEM,
  author =       "Pankaj K. Agarwal and Sariel Har-Peled and Kasturi R.
                 Varadarajan",
  title =        "Approximating extent measures of points",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "4",
  pages =        "606--635",
  month =        jul,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jul 10 09:49:01 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hochstein:2004:EDR,
  author =       "Jan M. Hochstein and Karsten Weihe",
  title =        "Edge-disjoint routing in plane switch graphs in linear
                 time",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "4",
  pages =        "636--670",
  month =        jul,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jul 10 09:49:01 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jerrum:2004:PTA,
  author =       "Mark Jerrum and Alistair Sinclair and Eric Vigoda",
  title =        "A polynomial-time approximation algorithm for the
                 permanent of a matrix with nonnegative entries",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "4",
  pages =        "671--697",
  month =        jul,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jul 10 09:49:01 MDT 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Koltun:2004:ATU,
  author =       "Vladlen Koltun",
  title =        "Almost tight upper bounds for vertical decompositions
                 in four dimensions",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "5",
  pages =        "699--730",
  month =        sep,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Crescenzi:2004:AIE,
  author =       "Valter Crescenzi and Giansalvatore Mecca",
  title =        "Automatic information extraction from large websites",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "5",
  pages =        "731--779",
  month =        sep,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dolev:2004:SSC,
  author =       "Shlomi Dolev and Jennifer L. Welch",
  title =        "Self-stabilizing clock synchronization in the presence
                 of {Byzantine} faults",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "5",
  pages =        "780--799",
  month =        sep,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Steinke:2004:UTS,
  author =       "Robert C. Steinke and Gary J. Nutt",
  title =        "A unified theory of shared memory consistency",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "5",
  pages =        "800--849",
  month =        sep,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dwork:2004:CZK,
  author =       "Cynthia Dwork and Moni Naor and Amit Sahai",
  title =        "Concurrent zero-knowledge",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "6",
  pages =        "851--898",
  month =        nov,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Regev:2004:NLB,
  author =       "Oded Regev",
  title =        "New lattice-based cryptographic constructions",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "6",
  pages =        "899--942",
  month =        nov,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kempe:2004:SGR,
  author =       "David Kempe and Jon Kleinberg and Alan Demers",
  title =        "Spatial gossip and resource location protocols",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "6",
  pages =        "943--967",
  month =        nov,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Demetrescu:2004:NAD,
  author =       "Camil Demetrescu and Giuseppe F. Italiano",
  title =        "A new approach to dynamic all pairs shortest paths",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "6",
  pages =        "968--992",
  month =        nov,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Thorup:2004:COR,
  author =       "Mikkel Thorup",
  title =        "Compact oracles for reachability and approximate
                 distances in planar digraphs",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "6",
  pages =        "993--1024",
  month =        nov,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Frieze:2004:FMC,
  author =       "Alan Frieze and Ravi Kannan and Santosh Vempala",
  title =        "Fast {Monte-Carlo} algorithms for finding low-rank
                 approximations",
  journal =      j-J-ACM,
  volume =       "51",
  number =       "6",
  pages =        "1025--1041",
  month =        nov,
  year =         "2004",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 15 06:33:05 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Thorup:2005:ADO,
  author =       "Mikkel Thorup and Uri Zwick",
  title =        "Approximate distance oracles",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "1",
  pages =        "1--24",
  month =        jan,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aleksandrov:2005:DAS,
  author =       "L. Aleksandrov and A. Maheshwari and J.-R. Sack",
  title =        "Determining approximate shortest paths on weighted
                 polyhedral surfaces",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "1",
  pages =        "25--53",
  month =        jan,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ross:2005:AOP,
  author =       "Robert Ross and V. S. Subrahmanian and John Grant",
  title =        "Aggregate operators in probabilistic databases",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "1",
  pages =        "54--101",
  month =        jan,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Abadi:2005:ASP,
  author =       "Mart{\'\i}n Abadi and Bruno Blanchet",
  title =        "Analyzing security protocols with secrecy types and
                 logic programs",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "1",
  pages =        "102--146",
  month =        jan,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Demetrescu:2005:TOF,
  author =       "Camil Demetrescu and Giuseppe F. Italiano",
  title =        "Trade-offs for fully dynamic transitive closure on
                 {DAGs}: breaking through the {$ O(n^2) $} barrier",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "2",
  pages =        "147--156",
  month =        mar,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ailon:2005:LBL,
  author =       "Nir Ailon and Bernard Chazelle",
  title =        "Lower bounds for linear degeneracy testing",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "2",
  pages =        "157--171",
  month =        mar,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shaltiel:2005:SEA,
  author =       "Ronen Shaltiel and Christopher Umans",
  title =        "Simple extractors for all min-entropies and a new
                 pseudorandom generator",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "2",
  pages =        "172--216",
  month =        mar,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1059513.1059516",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "A ``randomness extractor'' is an algorithm that given
                 a sample from a distribution with sufficiently high
                 min-entropy and a short random seed produces an output
                 that is statistically indistinguishable from uniform.
                 (Min-entropy is a measure of the amount of randomness
                 in a distribution.) We present a simple, self-contained
                 extractor construction that produces good extractors
                 for all min-entropies. Our construction is algebraic
                 and builds on a new polynomial-based approach
                 introduced by Ta-Shma et al. [2001b]. Using our
                 improvements, we obtain, for example, an extractor with
                 output length $ m = k / (\log n) O(1 / \alpha) $ and
                 seed length $ (1 + \alpha) \log n $ for an arbitrary $
                 0 < \alpha 1 $, where $n$ is the input length, and $k$
                 is the min-entropy of the input distribution.A
                 ``pseudorandom generator'' is an algorithm that given a
                 short random seed produces a long output that is
                 computationally indistinguishable from uniform. Our
                 technique also gives a new way to construct
                 pseudorandom generators from functions that require
                 large circuits. Our pseudorandom generator construction
                 is not based on the Nisan-Wigderson generator [Nisan
                 and Wigderson 1994], and turns worst-case hardness
                 directly into pseudorandomness. The parameters of our
                 generator match those in Impagliazzo and Wigderson
                 [1997] and Sudan et al. [2001] and in particular are
                 strong enough to obtain a new proof that $ P = \hbox
                 {BPP}$ if $E$ requires exponential size circuits.Our
                 construction also gives the following improvements over
                 previous work:---We construct an optimal ``hitting set
                 generator'' that stretches $ O(\log n)$ random bits
                 into $ s(1)$ pseudorandom bits when given a function on
                 $ \log n$ bits that requires circuits of size $s$. This
                 yields a quantitatively optimal hardness versus
                 randomness tradeoff for both RP and BPP and solves an
                 open problem raised in Impagliazzo et al. [1999].---We
                 give the first construction of pseudorandom generators
                 that fool nondeterministic circuits when given a
                 function that requires large nondeterministic circuits.
                 This technique also give a quantitatively optimal
                 hardness versus randomness tradeoff for AM and the
                 first hardness amplification result for
                 nondeterministic circuits.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Adler:2005:TOP,
  author =       "Micah Adler",
  title =        "Trade-offs in probabilistic packet marking for {IP}
                 traceback",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "2",
  pages =        "217--244",
  month =        mar,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Milo:2005:I,
  author =       "Tova Milo and Victor Vianu",
  title =        "Introduction",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "2",
  pages =        "245--245",
  month =        mar,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arenas:2005:ITA,
  author =       "Marcelo Arenas and Leonid Libkin",
  title =        "An information-theoretic approach to normal forms for
                 relational and {XML} data",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "2",
  pages =        "246--283",
  month =        mar,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gottlob:2005:CXQ,
  author =       "Georg Gottlob and Christoph Koch and Reinhard Pichler
                 and Luc Segoufin",
  title =        "The complexity of {XPath} query evaluation and {XML}
                 typing",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "2",
  pages =        "284--335",
  month =        mar,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Apr 25 11:15:54 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Paturi:2005:IET,
  author =       "Ramamohan Paturi and Pavel Pudl{\'a}k and Michael E.
                 Saks and Francis Zane",
  title =        "An improved exponential-time algorithm for {$k$-SAT}",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "3",
  pages =        "337--364",
  month =        may,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1066100.1066101",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Jul 5 06:39:45 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We propose and analyze a simple new randomized
                 algorithm, called ResolveSat, for finding satisfying
                 assignments of Boolean formulas in conjunctive normal
                 form. The algorithm consists of two stages: a
                 preprocessing stage in which resolution is applied to
                 enlarge the set of clauses of the formula, followed by
                 a search stage that uses a simple randomized greedy
                 procedure to look for a satisfying assignment.
                 Currently, this is the fastest known probabilistic
                 algorithm for $k$-CNF satisfiability for $ k \geq 4$
                 (with a running time of $ O(2^{0.5625 n})$ for
                 $4$-CNF). In addition, it is the fastest known
                 probabilistic algorithm for $k$-CNF, $ k \geq 3$, that
                 have at most one satisfying assignment (unique $k$-SAT)
                 (with a running time $ O(2^{(2 \ln 2 - 1)n + o(n)}) =
                 O(2^{0.386 \ldots n})$ in the case of $3$-CNF). The
                 analysis of the algorithm also gives an upper bound on
                 the number of the codewords of a code defined by a
                 $k$-CNF. This is applied to prove a lower bounds on
                 depth $3$ circuits accepting codes with nonconstant
                 distance. In particular we prove a lower bound $ \Omega
                 (2^{1.282 \ldots \sqrt {n}})$ for an explicitly given
                 Boolean function of $n$ variables. This is the first
                 such lower bound that is asymptotically bigger than $ 2
                 \sqrt {n} + o(\sqrt {n})$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Detlefs:2005:STP,
  author =       "David Detlefs and Greg Nelson and James B. Saxe",
  title =        "{Simplify}: a theorem prover for program checking",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "3",
  pages =        "365--473",
  month =        may,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1066100.1066102",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Jul 5 06:39:45 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article provides a detailed description of the
                 automatic theorem prover Simplify, which is the proof
                 engine of the Extended Static Checkers ESC/Java and
                 ESC/Modula-3. Simplify uses the Nelson--Oppen method to
                 combine decision procedures for several important
                 theories, and also employs a matcher to reason about
                 quantifiers. Instead of conventional matching in a term
                 DAG, Simplify matches up to equivalence in an E-graph,
                 which detects many relevant pattern instances that
                 would be missed by the conventional approach. The
                 article describes two techniques, error context
                 reporting and error localization, for helping the user
                 to determine the reason that a false conjecture is
                 false. The article includes detailed performance
                 figures on conjectures derived from realistic
                 program-checking problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Li:2005:BPC,
  author =       "Ninghui Li and John C. Mitchell and William H.
                 Winsborough",
  title =        "Beyond proof-of-compliance: security analysis in trust
                 management",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "3",
  pages =        "474--514",
  month =        may,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1066100.1066103",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Jul 5 06:39:45 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Trust management is a form of distributed access
                 control that allows one principal to delegate some
                 access decisions to other principals. While the use of
                 delegation greatly enhances flexibility and
                 scalability, it may also reduce the control that a
                 principal has over the resources it owns. Security
                 analysis asks whether safety, availability, and other
                 properties can be maintained while delegating to
                 partially trusted principals. We show that in contrast
                 to the undecidability of classical
                 Harrison--Ruzzo--Ullman safety properties, our primary
                 security properties are decidable. In particular, most
                 security properties we study are decidable in
                 polynomial time. The computational complexity of
                 containment analysis, the most complicated security
                 property we study, varies according to the expressive
                 power of the trust management language.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Franceschini:2005:PSC,
  author =       "Gianni Franceschini and Viliam Geffert",
  title =        "An in-place sorting with {$ O(n \log n) $} comparisons
                 and {$ O(n) $} moves",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "4",
  pages =        "515--537",
  month =        jul,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1082036.1082037",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:09 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present the first in-place algorithm for sorting an
                 array of size $n$ that performs, in the worst case, at
                 most $ O(n \log n)$ element comparisons and $ O(n)$
                 element transports.This solves a long-standing open
                 problem, stated explicitly, for example, in Munro and
                 Raman [1992], of whether there exists a sorting
                 algorithm that matches the asymptotic lower bounds on
                 all computational resources simultaneously.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chuzhoy:2005:ACH,
  author =       "Julia Chuzhoy and Sudipto Guha and Eran Halperin and
                 Sanjeev Khanna and Guy Kortsarz and Robert Krauthgamer
                 and Joseph (Seffi) Naor",
  title =        "Asymmetric $k$-center is $ \log^*n$-hard to
                 approximate",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "4",
  pages =        "538--551",
  month =        jul,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1082036.1082038",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:09 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ferragina:2005:ICT,
  author =       "Paolo Ferragina and Giovanni Manzini",
  title =        "Indexing compressed text",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "4",
  pages =        "552--581",
  month =        jul,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1082036.1082039",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:09 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Andrews:2005:SRS,
  author =       "Matthew Andrews and Antonio Fern{\'a}ndez and Ashish
                 Goel and Lisa Zhang",
  title =        "Source routing and scheduling in packet networks",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "4",
  pages =        "582--601",
  month =        jul,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1082036.1082040",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:09 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kaplan:2005:AAA,
  author =       "Haim Kaplan and Moshe Lewenstein and Nira Shafrir and
                 Maxim Sviridenko",
  title =        "Approximation algorithms for asymmetric {TSP} by
                 decomposing directed regular multigraphs",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "4",
  pages =        "602--626",
  month =        jul,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1082036.1082041",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:09 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Boyland:2005:RAG,
  author =       "John Tang Boyland",
  title =        "Remote attribute grammars",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "4",
  pages =        "627--687",
  month =        jul,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1082036.1082042",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:09 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ferragina:2005:BTC,
  author =       "Paolo Ferragina and Raffaele Giancarlo and Giovanni
                 Manzini and Marinella Sciortino",
  title =        "Boosting textual compression in optimal linear time",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "4",
  pages =        "688--713",
  month =        jul,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1082036.1082043",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:09 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We provide a general boosting technique for Textual
                 Data Compression. Qualitatively, it takes a good
                 compression algorithm and turns it into an algorithm
                 with a better compression performance guarantee. It
                 displays the following remarkable properties: (a) it
                 can turn any memoryless compressor into a compression
                 algorithm that uses the `best possible' contexts; (b)
                 it is very simple and optimal in terms of time; and (c)
                 it admits a decompression algorithm again optimal in
                 time. To the best of our knowledge, this is the first
                 boosting technique displaying these
                 properties.Technically, our boosting technique builds
                 upon three main ingredients: the Burrows--Wheeler
                 Transform, the Suffix Tree data structure, and a greedy
                 algorithm to process them. Specifically, we show that
                 there exists a proper partition of the Burrows--Wheeler
                 Transform of a string $s$ that shows a deep
                 combinatorial relation with the $k$-th order entropy of
                 $s$. That partition can be identified via a greedy
                 processing of the suffix tree of $s$ with the aim of
                 minimizing a proper objective function over its nodes.
                 The final compressed string is then obtained by
                 compressing individually each substring of the
                 partition by means of the base compressor we wish to
                 boost.Our boosting technique is inherently
                 combinatorial because it does not need to assume any
                 prior probabilistic model about the source emitting
                 $s$, and it does not deploy any training, parameter
                 estimation and learning. Various corollaries are
                 derived from this main achievement. Among the others,
                 we show analytically that using our booster, we get
                 better compression algorithms than some of the best
                 existing ones, that is, LZ77, LZ78, PPMC and the ones
                 derived from the Burrows--Wheeler Transform. Further,
                 we settle analytically some long-standing open problems
                 about the algorithmic structure and the performance of
                 BWT-based compressors. Namely, we provide the first
                 family of BWT algorithms that do not use Move-To-Front
                 or Symbol Ranking as a part of the compression
                 process.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Korf:2005:FS,
  author =       "Richard E. Korf and Weixiong Zhang and Ignacio Thayer
                 and Heath Hohwald",
  title =        "Frontier search",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "5",
  pages =        "715--748",
  month =        sep,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1089023.1089024",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:10 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aharonov:2005:LPN,
  author =       "Dorit Aharonov and Oded Regev",
  title =        "Lattice problems in {NP $ \cap $ coNP}",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "5",
  pages =        "749--765",
  month =        sep,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1089023.1089025",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:10 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Brinkman:2005:IDR,
  author =       "Bo Brinkman and Moses Charikar",
  title =        "On the impossibility of dimension reduction in $
                 \ell_1 $",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "5",
  pages =        "766--788",
  month =        sep,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1089023.1089026",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:10 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Khot:2005:HAS,
  author =       "Subhash Khot",
  title =        "Hardness of approximating the shortest vector problem
                 in lattices",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "5",
  pages =        "789--808",
  month =        sep,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1089023.1089027",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:10 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Andrews:2005:STV,
  author =       "Matthew Andrews and Lisa Zhang",
  title =        "Scheduling over a time-varying user-dependent channel
                 with applications to high-speed wireless data",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "5",
  pages =        "809--834",
  month =        sep,
  year =         "2005",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1089023.1089028",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 5 07:28:10 MDT 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fortnow:2005:TSL,
  author =       "Lance Fortnow and Richard Lipton and Dieter van
                 Melkebeek and Anastasios Viglas",
  title =        "Time-space lower bounds for satisfiability",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "6",
  pages =        "835--865",
  month =        nov,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 25 06:01:03 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Demaine:2005:SPA,
  author =       "Erik D. Demaine and Fedor V. Fomin and Mohammadtaghi
                 Hajiaghayi and Dimitrios M. Thilikos",
  title =        "Subexponential parameterized algorithms on
                 bounded-genus graphs and {$H$}-minor-free graphs",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "6",
  pages =        "866--893",
  month =        nov,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 25 06:01:03 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Banerjee:2005:OCE,
  author =       "Anindya Banerjee and David A. Naumann",
  title =        "Ownership confinement ensures representation
                 independence for object-oriented programs",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "6",
  pages =        "894--960",
  month =        nov,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 25 06:01:03 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Merro:2005:BTM,
  author =       "Massimo Merro and Francesco Zappa Nardelli",
  title =        "Behavioral theory for mobile ambients",
  journal =      j-J-ACM,
  volume =       "52",
  number =       "6",
  pages =        "961--1023",
  month =        nov,
  year =         "2005",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 25 06:01:03 MST 2005",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Csirik:2006:SSA,
  author =       "Janos Csirik and David S. Johnson and Claire Kenyon
                 and James B. Orlin and Peter W. Shor and Richard R.
                 Weber",
  title =        "On the {Sum-of-Squares} algorithm for bin packing",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "1",
  pages =        "1--65",
  month =        jan,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1120582.1120583",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Mar 17 06:27:47 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bulatov:2006:DTC,
  author =       "Andrei A. Bulatov",
  title =        "A dichotomy theorem for constraint satisfaction
                 problems on a $3$-element set",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "1",
  pages =        "66--120",
  month =        jan,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1120582.1120584",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Mar 17 06:27:47 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Scharbrodt:2006:NAC,
  author =       "Mark Scharbrodt and Thomas Schickinger and Angelika
                 Steger",
  title =        "A new average case analysis for completion time
                 scheduling",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "1",
  pages =        "121--146",
  month =        jan,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1120582.1120585",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Mar 17 06:27:47 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Flajolet:2006:HWS,
  author =       "Philippe Flajolet and Wojciech Szpankowski and
                 Brigitte Vall{\'e}e",
  title =        "Hidden word statistics",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "1",
  pages =        "147--183",
  month =        jan,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1120582.1120586",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Mar 17 06:27:47 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Nayak:2006:LAQ,
  author =       "Ashwin Nayak and Julia Salzman",
  title =        "Limits on the ability of quantum states to convey
                 classical messages",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "1",
  pages =        "184--206",
  month =        jan,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1120582.1120587",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Mar 17 06:27:47 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Suciu:2006:I,
  author =       "Dan Suciu and Victor Vianu",
  title =        "Introduction",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "2",
  pages =        "207--207",
  month =        mar,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1131342.1131343",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu May 11 11:34:50 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Atserias:2006:PUH,
  author =       "Albert Atserias and Anuj Dawar and Phokion G.
                 Kolaitis",
  title =        "On preservation under homomorphisms and unions of
                 conjunctive queries",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "2",
  pages =        "208--237",
  month =        mar,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1131342.1131344",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu May 11 11:34:50 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gottlob:2006:CQT,
  author =       "Georg Gottlob and Christoph Koch and Klaus U. Schulz",
  title =        "Conjunctive queries over trees",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "2",
  pages =        "238--272",
  month =        mar,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1131342.1131345",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu May 11 11:34:50 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Benedikt:2006:CFO,
  author =       "Michael Benedikt and Bart Kuijpers and Christof
                 L{\"o}ding and Jan Van den Bussche and Thomas Wilke",
  title =        "A characterization of first-order topological
                 properties of planar spatial data",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "2",
  pages =        "273--305",
  month =        mar,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1131342.1131346",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu May 11 11:34:50 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Indyk:2006:SDP,
  author =       "Piotr Indyk",
  title =        "Stable distributions, pseudorandom generators,
                 embeddings, and data stream computation",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "3",
  pages =        "307--323",
  month =        may,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1147954.1147955",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 23 06:38:20 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gandhi:2006:DRA,
  author =       "Rajiv Gandhi and Samir Khuller and Srinivasan
                 Parthasarathy and Aravind Srinivasan",
  title =        "Dependent rounding and its applications to
                 approximation algorithms",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "3",
  pages =        "324--360",
  month =        may,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1147954.1147956",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 23 06:38:20 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ban:2006:ISP,
  author =       "Yih-En Andrew Ban and Herbert Edelsbrunner and
                 Johannes Rudolph",
  title =        "Interface surfaces for protein-protein complexes",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "3",
  pages =        "361--378",
  month =        may,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1147954.1147957",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 23 06:38:20 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shalev:2006:SOL,
  author =       "Ori Shalev and Nir Shavit",
  title =        "Split-ordered lists: {Lock-free} extensible hash
                 tables",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "3",
  pages =        "379--405",
  month =        may,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1147954.1147958",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 23 06:38:20 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present the first lock-free implementation of an
                 extensible hash table running on current architectures.
                 Our algorithm provides concurrent insert, delete, and
                 find operations with an expected $ O(1) $ cost. It
                 consists of very simple code, easily implementable
                 using only load, store, and compare-and-swap
                 operations. The new mathematical structure at the core
                 of our algorithm is recursive split-ordering, a way of
                 ordering elements in a linked list so that they can be
                 repeatedly ``split'' using a single compare-and-swap
                 operation. Metaphorically speaking, our algorithm
                 differs from prior known algorithms in that
                 extensibility is derived by ``moving the buckets among
                 the items'' rather than ``the items among the
                 buckets.'' Though lock-free algorithms are expected to
                 work best in multiprogrammed environments, empirical
                 tests we conducted on a large shared memory
                 multiprocessor show that even in non-multiprogrammed
                 environments, the new algorithm performs as well as the
                 most efficient known lock-based resizable hash-table
                 algorithm, and in high load cases it significantly
                 outperforms it.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Nederhof:2006:PPS,
  author =       "Mark-Jan Nederhof and Giorgio Satta",
  title =        "Probabilistic parsing strategies",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "3",
  pages =        "406--436",
  month =        may,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1147954.1147959",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 23 06:38:20 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sitters:2006:GTS,
  author =       "Ren{\'e} A. Sitters and Leen Stougie",
  title =        "The generalized two-server problem",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "3",
  pages =        "437--458",
  month =        may,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1147954.1147960",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 23 06:38:20 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Pitts:2006:ASR,
  author =       "Andrew M. Pitts",
  title =        "Alpha-structural recursion and induction",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "3",
  pages =        "459--506",
  month =        may,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1147954.1147961",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 23 06:38:20 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ambainis:2006:CHM,
  author =       "Andris Ambainis and Leonard J. Schulman and Umesh
                 Vazirani",
  title =        "Computing with highly mixed states",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "3",
  pages =        "507--531",
  month =        may,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1147954.1147962",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 23 06:38:20 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Xu:2006:FAA,
  author =       "Jinbo Xu and Bonnie Berger",
  title =        "Fast and accurate algorithms for protein side-chain
                 packing",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "4",
  pages =        "533--557",
  month =        jul,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1162349.1162350",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Sep 21 07:53:28 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article studies the protein side-chain packing
                 problem using the tree-decomposition of a protein
                 structure. To obtain fast and accurate protein
                 side-chain packing, protein structures are modeled
                 using a geometric neighborhood graph, which can be
                 easily decomposed into smaller blocks. Therefore, the
                 side-chain assignment of the whole protein can be
                 assembled from the assignment of the small blocks.
                 Although we will show that the side-chain packing
                 problem is still NP-hard, we can achieve a
                 tree-decomposition-based globally optimal algorithm
                 with time complexity of $ O(N n_{\rm rot}^{\rm tw} + 1)
                 $ and several polynomial-time approximation schemes
                 (PTAS), where $N$ is the number of residues contained
                 in the protein, $ n_{\rm rot}$ the average number of
                 rotamers for each residue, and $ {\rm tw} = O(N^{2 / 3}
                 \log N)$ the treewidth of the protein structure graph.
                 Experimental results indicate that after Goldstein
                 dead-end elimination is conducted, $ n_{\rm rot}$ is
                 very small and $ {\rm tw}$ is equal to $3$ or $4$ most
                 of the time. Based on the globally optimal algorithm,
                 we developed a protein side-chain assignment program
                 TreePack, which runs up to 90 times faster than SCWRL
                 3.0, a widely-used side-chain packing program, on some
                 large test proteins in the SCWRL benchmark database and
                 an average of five times faster on all the test
                 proteins in this database. There are also some
                 real-world instances that TreePack can solve but that
                 SCWRL 3.0 cannot. The TreePack program is available at
                 {\tt http://ttic.uchicago.edu/~jinbo/TreePack.htm}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldreich:2006:LTC,
  author =       "Oded Goldreich and Madhu Sudan",
  title =        "Locally testable codes and {PCPs} of almost-linear
                 length",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "4",
  pages =        "558--655",
  month =        jul,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1162349.1162351",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Sep 21 07:53:28 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We initiate a systematic study of locally testable
                 codes; that is, error-correcting codes that admit very
                 efficient membership tests. Specifically, these are
                 codes accompanied with tests that make a constant
                 number of (random) queries into any given word and
                 reject non-codewords with probability proportional to
                 their distance from the code.\par

                 Locally testable codes are believed to be the
                 combinatorial core of PCPs. However, the relation is
                 less immediate than commonly believed. Nevertheless, we
                 show that certain PCP systems can be modified to yield
                 locally testable codes. On the other hand, we adapt
                 techniques that we develop for the construction of the
                 latter to yield new PCPs.\par

                 Our main results are locally testable codes and PCPs of
                 almost-linear length. Specifically, we prove the
                 existence of the following constructs:\par

                 ---Locally testable binary (linear) codes in which $k$
                 information bits are encoded by a codeword of length $
                 k - \exp (\tilde {O}(\sqrt {(\log k)}))$. This improves
                 over previous results that either yield codewords of
                 exponential length or obtained almost quadratic length
                 codewords for sufficiently large nonbinary
                 alphabet.\par

                 ---PCP systems of almost-linear length for SAT. The
                 length of the proof is $ n - \exp (\tilde {O}(\sqrt
                 {(\log n)}))$ and verification in performed by a
                 constant number (i.e., $ 19$) of queries, as opposed to
                 previous results that used proof length $ n^{(1 + O(1 /
                 q))}$ for verification by $q$ queries.\par

                 The novel techniques in use include a random projection
                 of certain codewords and PCP-oracles that preserves
                 local-testability, an adaptation of PCP constructions
                 to obtain ``linear PCP-oracles'' for proving
                 conjunctions of linear conditions, and design of PCPs
                 with some new soundness properties---a direct
                 construction of locally testable (linear) codes of
                 subexponential length.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vitter:2006:DSR,
  author =       "Jeffrey Scott Vitter and David Alexander Hutchinson",
  title =        "Distribution sort with randomized cycling",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "4",
  pages =        "656--680",
  month =        jul,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1162349.1162352",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Sep 21 07:53:28 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Parallel independent disks can enhance the performance
                 of external memory (EM) algorithms, but the programming
                 task is often difficult. Each disk can service only one
                 read or write request at a time; the challenge is to
                 keep the disks as busy as possible. In this article, we
                 develop a randomized allocation discipline for parallel
                 independent disks, called randomized cycling. We show
                 how it can be used as the basis for an efficient
                 distribution sort algorithm, which we call randomized
                 cycling distribution sort (RCD). We prove that the
                 expected I/O complexity of RCD is optimal. The analysis
                 uses a novel reduction to a scenario with significantly
                 fewer probabilistic interdependencies. We demonstrate
                 RCD's practicality by experimental simulations. Using
                 the randomized cycling discipline, algorithms developed
                 for the unrealistic multihead disk model can be
                 simulated on the realistic parallel disk model for the
                 class of multipass algorithms, which make a complete
                 pass through their data before accessing any element a
                 second time. In particular, algorithms based upon the
                 well-known distribution and merge paradigms of EM
                 computation can be optimally extended from a single
                 disk to parallel disks.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ben-Amram:2006:BSL,
  author =       "Amir M. Ben-Amram and Holger Petersen",
  title =        "Backing up in singly linked lists",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "4",
  pages =        "681--705",
  month =        jul,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1162349.1162353",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Sep 21 07:53:28 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We show how to reduce the time overhead for
                 implementing two-way movement on a singly linked list
                 to $ O(n^\epsilon) $ per operation without modifying
                 the list and without making use of storage other than a
                 finite number of pointers into the list. We also prove
                 a matching lower bound. These results add precision to
                 the intuitive feeling that doubly linked lists are more
                 efficient than singly linked lists, and quantify the
                 efficiency gap in a read-only situation. We further
                 analyze the number of points of access into the list
                 (pointers) necessary for obtaining a desired value of $
                 \epsilon $. We obtain tight tradeoffs which also
                 separate the amortized and worst-case settings. Our
                 upper bound implies that read-only programs with
                 singly-linked input can do string matching much faster
                 than previously expected.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chuzhoy:2006:NHR,
  author =       "Julia Chuzhoy and Joseph (Seffi) Naor",
  title =        "New hardness results for congestion minimization and
                 machine scheduling",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "5",
  pages =        "707--721",
  month =        sep,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1183907.1183908",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 1 16:43:39 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chor:2006:FML,
  author =       "Benny Chor and Tamir Tuller",
  title =        "Finding a maximum likelihood tree is hard",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "5",
  pages =        "722--744",
  month =        sep,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1183907.1183909",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 1 16:43:39 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Andrews:2006:LHU,
  author =       "Matthew Andrews and Lisa Zhang",
  title =        "Logarithmic hardness of the undirected edge-disjoint
                 paths problem",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "5",
  pages =        "745--761",
  month =        sep,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1183907.1183910",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 1 16:43:39 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{PucciDeFarias:2006:CEA,
  author =       "Daniela {Pucci De Farias} and Nimrod Megiddo",
  title =        "Combining expert advice in reactive environments",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "5",
  pages =        "762--799",
  month =        sep,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1183907.1183911",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 1 16:43:39 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gabow:2006:UEG,
  author =       "Harold N. Gabow",
  title =        "Using expander graphs to find vertex connectivity",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "5",
  pages =        "800--844",
  month =        sep,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1183907.1183912",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 1 16:43:39 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blum:2006:OAM,
  author =       "Avrim Blum and Tuomas Sandholm and Martin Zinkevich",
  title =        "Online algorithms for market clearing",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "5",
  pages =        "845--879",
  month =        sep,
  year =         "2006",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1183907.1183913",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Dec 1 16:43:39 MST 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lindell:2006:CAB,
  author =       "Yehuda Lindell and Anna Lysyanskaya and Tal Rabin",
  title =        "On the composition of authenticated {Byzantine
                 Agreement}",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "6",
  pages =        "881--917",
  month =        nov,
  year =         "2006",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Karkkainen:2006:LWS,
  author =       "Juha K{\"a}rkk{\"a}inen and Peter Sanders and Stefan
                 Burkhardt",
  title =        "Linear work suffix array construction",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "6",
  pages =        "918--936",
  month =        nov,
  year =         "2006",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Nieuwenhuis:2006:SSS,
  author =       "Robert Nieuwenhuis and Albert Oliveras and Cesare
                 Tinelli",
  title =        "Solving {SAT} and {SAT Modulo Theories}: {From} an
                 abstract {Davis--Putnam--Logemann--Loveland} procedure
                 to {DPLL($T$)}",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "6",
  pages =        "937--977",
  month =        nov,
  year =         "2006",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Shmoys:2006:ASS,
  author =       "David B. Shmoys and Chaitanya Swamy",
  title =        "An approximation scheme for stochastic linear
                 programming and its application to stochastic integer
                 programs",
  journal =      j-J-ACM,
  volume =       "53",
  number =       "6",
  pages =        "978--1012",
  month =        nov,
  year =         "2006",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Grohe:2007:CHC,
  author =       "Martin Grohe",
  title =        "The complexity of homomorphism and constraint
                 satisfaction problems seen from the other side",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "1",
  pages =        "1:1--1:24",
  month =        mar,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "1",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jouannaud:2007:PHO,
  author =       "Jean-Pierre Jouannaud and Albert Rubio",
  title =        "Polymorphic higher-order recursive path orderings",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "1",
  pages =        "2:1--2:48",
  month =        mar,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "2",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bansal:2007:SSM,
  author =       "Nikhil Bansal and Tracy Kimbrel and Kirk Pruhs",
  title =        "Speed scaling to manage energy and temperature",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "1",
  pages =        "3:1--3:39",
  month =        mar,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "3",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hallgren:2007:PTQ,
  author =       "Sean Hallgren",
  title =        "Polynomial-time quantum algorithms for {Pell}'s
                 equation and the principal ideal problem",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "1",
  pages =        "4:1--4:19",
  month =        mar,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "4",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cohen:2007:DEA,
  author =       "Sara Cohen and Werner Nutt and Yehoshua Sagiv",
  title =        "Deciding equivalences among conjunctive aggregate
                 queries",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "2",
  pages =        "5:1--5:50",
  month =        apr,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "5",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Baeten:2007:CRE,
  author =       "J. C. M. Baeten and F. Corradini and C. A. Grabmayer",
  title =        "A characterization of regular expressions under
                 bisimulation",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "2",
  pages =        "6:1--6:28",
  month =        apr,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "6",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bergstra:2007:RNA,
  author =       "J. A. Bergstra and J. V. Tucker",
  title =        "The rational numbers as an abstract data type",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "2",
  pages =        "7:1--7:25",
  month =        apr,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "7",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Danos:2007:MC,
  author =       "Vincent Danos and Elham Kashefi and Prakash
                 Panangaden",
  title =        "The measurement calculus",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "2",
  pages =        "8:1--8:45",
  month =        apr,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "8",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Achlioptas:2007:FCL,
  author =       "Dimitris Achlioptas and Frank Mcsherry",
  title =        "Fast computation of low-rank matrix approximations",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "2",
  pages =        "9:1--9:19",
  month =        apr,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "9",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Achlioptas:2007:MSR,
  author =       "Dimitris Achlioptas and Assaf Naor and Yuval Peres",
  title =        "On the maximum satisfiability of random formulas",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "2",
  pages =        "10:1--10:21",
  month =        apr,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Apr 14 10:54:02 MDT 2007",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "10",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gupta:2007:ACS,
  author =       "Anupam Gupta and Amit Kumar and Martin P{\'{}}al and
                 Tim Roughgarden",
  title =        "Approximation via cost sharing: {Simpler} and better
                 approximation algorithms for network design",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "3",
  pages =        "11:1--11:38",
  month =        jun,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:18 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "11",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dinur:2007:PTG,
  author =       "Irit Dinur",
  title =        "The {PCP} theorem by gap amplification",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "3",
  pages =        "12:1--12:44",
  month =        jun,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:18 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "12",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Andersson:2007:DOS,
  author =       "Arne Andersson and Mikkel Thorup",
  title =        "Dynamic ordered sets with exponential search trees",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "3",
  pages =        "13:1--13:40",
  month =        jun,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:18 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "13",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Conitzer:2007:WEF,
  author =       "Vincent Conitzer and Tuomas Sandholm and
                 J{\'e}r{\^o}me Lang",
  title =        "When are elections with few candidates hard to
                 manipulate?",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "3",
  pages =        "14:1--14:33",
  month =        jun,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:18 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "14",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Halpern:2007:CRA,
  author =       "Joseph Y. Halpern and Riccardo Pucella",
  title =        "Characterizing and reasoning about probabilistic and
                 non-probabilistic expectation",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "3",
  pages =        "15:1--15:49",
  month =        jun,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:18 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "15",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chen:2007:ATB,
  author =       "Jiangzhuo Chen and Robert D. Kleinberg and
                 L{\'a}szl{\'o} Lov{\'a}sz and Rajmohan Rajaraman and
                 Ravi Sundaram and Adrian Vetta",
  title =        "(Almost) Tight bounds and existence theorems for
                 single-commodity confluent flows",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "4",
  pages =        "16:1--16:32",
  month =        jul,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:45:35 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "16",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Maneva:2007:NLS,
  author =       "Elitza Maneva and Elchanan Mossel and Martin J.
                 Wainwright",
  title =        "A new look at survey propagation and its
                 generalizations",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "4",
  pages =        "17:1--17:41",
  month =        jul,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:45:35 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "17",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{DeVerdiere:2007:OPD,
  author =       "{\'E}ric Colin {De Verdi{\`e}re} and Francis Lazarus",
  title =        "Optimal pants decompositions and shortest homotopic
                 cycles on an orientable surface",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "4",
  pages =        "18:1--18:27",
  month =        jul,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:45:35 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "18",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vansummeren:2007:DWD,
  author =       "Stijn Vansummeren",
  title =        "On deciding well-definedness for query languages on
                 trees",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "4",
  pages =        "19:1--19:37",
  month =        jul,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:45:35 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "19",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harju:2007:PUW,
  author =       "Tero Harju and Dirk Nowotka",
  title =        "Periodicity and unbordered words: a proof of the
                 extended {Duval} conjecture",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "4",
  pages =        "20:1--20:20",
  month =        jul,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:45:35 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "20",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Rudelson:2007:SLM,
  author =       "Mark Rudelson and Roman Vershynin",
  title =        "Sampling from large matrices: an approach through
                 geometric functional analysis",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "4",
  pages =        "21:1--21:19",
  month =        jul,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:45:35 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "21",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mehta:2007:AGO,
  author =       "Aranyak Mehta and Amin Saberi and Umesh Vazirani and
                 Vijay Vazirani",
  title =        "{AdWords} and generalized online matching",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "5",
  pages =        "22:1--22:19",
  month =        oct,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:19 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "22",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ostrovsky:2007:LDE,
  author =       "Rafail Ostrovsky and Yuval Rabani",
  title =        "Low distortion embeddings for edit distance",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "5",
  pages =        "23:1--23:16",
  month =        oct,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:19 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "23",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Eiter:2007:CAA,
  author =       "Thomas Eiter and Kazuhisa Makino",
  title =        "On computing all abductive explanations from a
                 propositional {Horn} theory",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "5",
  pages =        "24:1--24:54",
  month =        oct,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:19 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "24",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gilpin:2007:LAI,
  author =       "Andrew Gilpin and Tuomas Sandholm",
  title =        "Lossless abstraction of imperfect information games",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "5",
  pages =        "25:1--25:30",
  month =        oct,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:19 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "25",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sumii:2007:BTA,
  author =       "Eijiro Sumii and Benjamin C. Pierce",
  title =        "A bisimulation for type abstraction and recursion",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "5",
  pages =        "26:1--26:43",
  month =        oct,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:19 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "26",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dyer:2007:CHD,
  author =       "Martin Dyer and Leslie Ann Goldberg and Mike
                 Paterson",
  title =        "On counting homomorphisms to directed acyclic graphs",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "6",
  pages =        "27:1--27:23",
  month =        dec,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:20 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "27",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Thorup:2007:EBP,
  author =       "Mikkel Thorup",
  title =        "Equivalence between priority queues and sorting",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "6",
  pages =        "28:1--28:27",
  month =        dec,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:20 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "28",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cheung:2007:TSP,
  author =       "Ling Cheung and Mari{\"e}lle Stoelinga and Frits
                 Vaandrager",
  title =        "A testing scenario for probabilistic processes",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "6",
  pages =        "29:1--29:45",
  month =        dec,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:20 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "29",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ellen:2007:TLB,
  author =       "Faith Ellen and Panagiota Fatourou and Eric Ruppert",
  title =        "Time lower bounds for implementations of multi-writer
                 snapshots",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "6",
  pages =        "30:1--30:34",
  month =        dec,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:20 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "30",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Haldar:2007:SRW,
  author =       "Sibsankar Haldar and K. Vidyasankar",
  title =        "On specification of {Read\slash Write} shared
                 variables",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "6",
  pages =        "31:1--31:19",
  month =        dec,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:20 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "31",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Duffield:2007:PSE,
  author =       "Nick Duffield and Carsten Lund and Mikkel Thorup",
  title =        "Priority sampling for estimation of arbitrary subset
                 sums",
  journal =      j-J-ACM,
  volume =       "54",
  number =       "6",
  pages =        "32:1--32:37",
  month =        dec,
  year =         "2007",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 2 14:43:20 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "32",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yekhanin:2008:TQL,
  author =       "Sergey Yekhanin",
  title =        "Towards 3-query locally decodable codes of
                 subexponential length",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "1",
  pages =        "1:1--1:16",
  month =        feb,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1326554.1326555",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 11 12:05:42 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "1",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Flesca:2008:MXQ,
  author =       "S. Flesca and F. Furfaro and E. Masciari",
  title =        "On the minimization of {XPath} queries",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "1",
  pages =        "2:1--2:46",
  month =        feb,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1326554.1326556",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 11 12:05:42 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "2",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dinitz:2008:BCB,
  author =       "Yefim Dinitz and Shlomo Moran and Sergio Rajsbaum",
  title =        "Bit complexity of breaking and achieving symmetry in
                 chains and rings",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "1",
  pages =        "3:1--3:28",
  month =        feb,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1326554.1326557",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 11 12:05:42 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "3",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Halpern:2008:FFX,
  author =       "Joseph Y. Halpern and Vicky Weissman",
  title =        "A formal foundation for {XrML}",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "1",
  pages =        "4:1--4:42",
  month =        feb,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1326554.1326558",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 11 12:05:42 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "XrML is becoming a popular language in industry for
                 writing software licenses. The semantics for XrML is
                 implicitly given by an algorithm that determines if a
                 permission follows from a set of licenses. We focus on
                 a fragment of the language and use it to highlight some
                 problematic aspects of the algorithm. We then correct
                 the problems, introduce formal semantics, and show that
                 our semantics captures the (corrected) algorithm. Next,
                 we consider the complexity of determining if a
                 permission is implied by a set of XrML licenses. We
                 prove that the general problem is undecidable, but it
                 is polynomial-time computable for an expressive
                 fragment of the language. We extend XrML to capture a
                 wider range of licenses by adding negation to the
                 language. Finally, we discuss the key differences
                 between XrML and MPEG-21, an international standard
                 based on XrML.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "4",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jancar:2008:UBD,
  author =       "Petr Jan{\v{c}}ar and Jiv{\v{r}}{\'\i} Srba",
  title =        "Undecidability of bisimilarity by defender's forcing",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "1",
  pages =        "5:1--5:26",
  month =        feb,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1326554.1326559",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 11 12:05:42 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "5",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Abadi:2008:SAC,
  author =       "Mart{\'i}n Abadi and Bogdan Warinschi",
  title =        "Security analysis of cryptographically controlled
                 access to {XML} documents",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "2",
  pages =        "6:1--6:29",
  month =        may,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1346330.1346331",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jun 16 18:08:44 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Some promising recent schemes for XML access control
                 employ encryption for implementing security policies on
                 published data, avoiding data duplication. In this
                 article, we study one such scheme, due to Miklau and
                 Suciu [2003]. That scheme was introduced with some
                 intuitive explanations and goals, but without precise
                 definitions and guarantees for the use of cryptography
                 (specifically, symmetric encryption and secret
                 sharing). We bridge this gap in the present work. We
                 analyze the scheme in the context of the rigorous
                 models of modern cryptography. We obtain formal results
                 in simple, symbolic terms close to the vocabulary of
                 Miklau and Suciu. We also obtain more detailed
                 computational results that establish security against
                 probabilistic polynomial-time adversaries. Our
                 approach, which relates these two layers of the
                 analysis, continues a recent thrust in security
                 research and may be applicable to a broad class of
                 systems that rely on cryptographic data protection.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "6",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "access control; authorization; encryption; XML",
}

@Article{Arenas:2008:XDE,
  author =       "Marcelo Arenas and Leonid Libkin",
  title =        "{XML} data exchange: {Consistency} and query
                 answering",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "2",
  pages =        "7:1--7:72",
  month =        may,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1346330.1346332",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jun 16 18:08:44 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Data exchange is the problem of finding an instance of
                 a target schema, given an instance of a source schema
                 and a specification of the relationship between the
                 source and the target. Theoretical foundations of data
                 exchange have recently been investigated for relational
                 data.\par

                 In this article, we start looking into the basic
                 properties of XML data exchange, that is, restructuring
                 of XML documents that conform to a source DTD under a
                 target DTD, and answering queries written over the
                 target schema. We define XML data exchange settings in
                 which source-to-target dependencies refer to the
                 hierarchical structure of the data. Combining DTDs and
                 dependencies makes some XML data exchange settings
                 inconsistent. We investigate the consistency problem
                 and determine its exact complexity.\par

                 We then move to query answering, and prove a dichotomy
                 theorem that classifies data exchange settings into
                 those over which query answering is tractable, and
                 those over which it is coNP-complete, depending on
                 classes of regular expressions used in DTDs.
                 Furthermore, for all tractable cases we give
                 polynomial-time algorithms that compute target XML
                 documents over which queries can be answered.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "7",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "computing certain answers; consistency; data exchange;
                 XML",
}

@Article{Benedikt:2008:XSP,
  author =       "Michael Benedikt and Wenfei Fan and Floris Geerts",
  title =        "{XPath} satisfiability in the presence of {DTDs}",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "2",
  pages =        "8:1--8:79",
  month =        may,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1346330.1346333",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jun 16 18:08:44 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study the satisfiability problem associated with
                 XPath in the presence of DTDs. This is the problem of
                 determining, given a query p in an XPath fragment and a
                 DTD D, whether or not there exists an XML document T
                 such that $T$ conforms to $D$ and the answer of p on
                 $T$ is nonempty. We consider a variety of XPath
                 fragments widely used in practice, and investigate the
                 impact of different XPath operators on the
                 satisfiability analysis. We first study the problem for
                 negation-free XPath fragments with and without upward
                 axes, recursion and data-value joins, identifying which
                 factors lead to tractability and which to
                 NP-completeness. We then turn to fragments with
                 negation but without data values, establishing lower
                 and upper bounds in the absence and in the presence of
                 upward modalities and recursion. We show that with
                 negation the complexity ranges from PSPACE to EXPTIME.
                 Moreover, when both data values and negation are in
                 place, we find that the complexity ranges from NEXPTIME
                 to undecidable. Furthermore, we give a finer analysis
                 of the problem for particular classes of DTDs,
                 exploring the impact of various DTD constructs,
                 identifying tractable cases, as well as providing the
                 complexity in the query size alone. Finally, we
                 investigate the problem for XPath fragments with
                 sibling axes, exploring the impact of horizontal
                 modalities on the satisfiability analysis.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "8",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "containment; DTDs; satisfiability; XML; XPath",
}

@Article{Gottlob:2008:ECC,
  author =       "Georg Gottlob and Alan Nash",
  title =        "Efficient core computation in data exchange",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "2",
  pages =        "9:1--9:49",
  month =        may,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1346330.1346334",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jun 16 18:08:44 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Data exchange deals with inserting data from one
                 database into another database having a different
                 schema. Fagin et al. [2005] have shown that among the
                 universal solutions of a solvable data exchange
                 problem, there exists --- up to isomorphism --- a
                 unique most compact one, ``the core'', and have
                 convincingly argued that this core should be the
                 database to be materialized. They stated as an
                 important open problem whether the core can be computed
                 in polynomial time in the general setting where the
                 mapping between the source and target schemas is given
                 by source-to-target constraints that are arbitrary
                 tuple generating dependencies (tgds) and target
                 constraints consisting of equality generating
                 dependencies (egds) and a weakly acyclic set of tgds.
                 In this article, we solve this problem by developing
                 new methods for efficiently computing the core of a
                 universal solution. This positive result shows that
                 data exchange based on cores is feasible and applicable
                 in a very general setting. In addition to our main
                 result, we use the method of hypertree decompositions
                 to derive new algorithms and upper bounds for query
                 containment checking and computing cores of arbitrary
                 database instances. We also show that computing the
                 core of a data exchange problem is fixed-parameter
                 intractable with respect to a number of relevant
                 parameters, and that computing cores is NP-complete if
                 the rule bodies of target tgds are augmented by a
                 special predicate that distinguishes a null value from
                 a constant data value.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "9",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "chase; complexity; conjunctive queries; constraints;
                 core; data exchange; data integration; dependencies;
                 query evaluation; tractability; universal solutions",
}

@Article{Tardos:2008:OPF,
  author =       "G{\'a}bor Tardos",
  title =        "Optimal probabilistic fingerprint codes",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "2",
  pages =        "10:1--10:24",
  month =        may,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1346330.1346335",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jun 16 18:08:44 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We construct binary codes for fingerprinting digital
                 documents. Our codes for $n$ users that are $ \epsilon
                 $-secure against $c$ pirates have length $ O(c^2 \log
                 (n / \epsilon))$. This improves the codes proposed by
                 Boneh and Shaw [1998] whose length is approximately the
                 square of this length. The improvement carries over to
                 works using the Boneh--Shaw code as a primitive, for
                 example, to the dynamic traitor tracing scheme of Tassa
                 [2005].\par

                 By proving matching lower bounds we establish that the
                 length of our codes is best within a constant factor
                 for reasonable error probabilities. This lower bound
                 generalizes the bound found independently by Peikert et
                 al. [2003] that applies to a limited class of codes.
                 Our results also imply that randomized fingerprint
                 codes over a binary alphabet are as powerful as over an
                 arbitrary alphabet and the equal strength of two
                 distinct models for fingerprinting.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "10",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "collusion attack; fingerprint codes",
}

@Article{Mulzer:2008:MWT,
  author =       "Wolfgang Mulzer and G{\"u}nter Rote",
  title =        "Minimum-weight triangulation is {NP}-hard",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "2",
  pages =        "11:1--11:29",
  month =        may,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1346330.1346336",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jun 16 18:08:44 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A triangulation of a planar point set $S$ is a maximal
                 plane straight-line graph with vertex set $S$. In the
                 minimum-weight triangulation (MWT) problem, we are
                 looking for a triangulation of a given point set that
                 minimizes the sum of the edge lengths. We prove that
                 the decision version of this problem is NP-hard, using
                 a reduction from PLANAR 1-IN-3-SAT. The correct working
                 of the gadgets is established with computer assistance,
                 using dynamic programming on polygonal faces, as well
                 as the $ \beta $-skeleton heuristic to certify that
                 certain edges belong to the minimum-weight
                 triangulation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "11",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "optimal triangulations; PLANAR 1-IN-3-SAT",
}

@Article{Li:2008:BSD,
  author =       "Ninghui Li and Qihua Wang",
  title =        "Beyond separation of duty: an algebra for specifying
                 high-level security policies",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "3",
  pages =        "12:1--12:56",
  month =        jul,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1379759.1379760",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 6 08:30:17 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The process of introducing security controls into a
                 sensitive task, which we call {\em secure task
                 design\/} in this article, consists of two steps:
                 high-level security policy design and low-level
                 enforcement scheme design. A high-level security policy
                 states an overall requirement for a sensitive task. One
                 example of a high-level security policy is a separation
                 of duty policy, which requires a task to be performed
                 by a team of at least $k$ users. Unlike low-level
                 enforcement schemes such as security constraints in
                 workflows, a separation of duty policy states a
                 high-level requirement about the task without referring
                 to individual steps in the task. While extremely
                 important and widely used, separation of duty policies
                 state only requirements on the number of users involved
                 in the task and do not capture the requirements on
                 these users' attributes. In this article, we introduce
                 a novel algebra that enables the formal specification
                 of high-level policies that combine requirements on
                 users' attributes with requirements on the number of
                 users motivated by separation of duty considerations.
                 We give the syntax and semantics of the algebra and
                 study algebraic properties of its operators. After
                 that, we study potential mechanisms to enforce
                 high-level policies specified in the algebra and a
                 number of computational problems related to policy
                 analysis and enforcement.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "12",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "access control; policy design; separation of duty",
}

@Article{Chen:2008:MAB,
  author =       "Xi Chen and Xiaotie Deng",
  title =        "Matching algorithmic bounds for finding a {Brouwer}
                 fixed point",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "3",
  pages =        "13:1--13:23",
  month =        jul,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1379759.1379761",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 6 08:30:17 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We prove a new discrete fixed point theorem for
                 direction-preserving functions defined on integer
                 points, based on a novel characterization of boundary
                 conditions for the existence of fixed points. The
                 theorem allows us to derive an improved algorithm for
                 finding such a fixed point. We also develop a new lower
                 bound proof technique. Together, they allow us to
                 derive an asymptotic matching bound for the problem of
                 finding a fixed point in a hypercube of any constantly
                 bounded finite dimension.\par

                 Exploring a linkage with the approximation version of
                 the continuous fixed point problem, we obtain
                 asymptotic matching bounds for the complexity of the
                 approximate Brouwer fixed point problem in the
                 continuous case for Lipschitz functions. It settles a
                 fifteen-years-old open problem of Hirsch,
                 Papadimitriou, and Vavasis by improving both the upper
                 and lower bounds.\par

                 Our characterization for the existence of a fixed point
                 is also applicable to functions defined on nonconvex
                 domains, which makes it a potentially useful tool for
                 the design and analysis of algorithms for fixed points
                 in general domains.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "13",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "approximate fixed point; fixed point theorem;
                 Lipschitz function; Sperner's lemma",
}

@Article{Papadimitriou:2008:CCE,
  author =       "Christos H. Papadimitriou and Tim Roughgarden",
  title =        "Computing correlated equilibria in multi-player
                 games",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "3",
  pages =        "14:1--14:29",
  month =        jul,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1379759.1379762",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 6 08:30:17 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We develop polynomial-time algorithms for finding
                 correlated equilibria --- a well-studied notion of
                 rationality that generalizes the Nash equilibrium ---
                 in a broad class of succinctly representable
                 multiplayer games, encompassing graphical games,
                 anonymous games, polymatrix games, congestion games,
                 scheduling games, local effect games, as well as
                 several generalizations. Our algorithm is based on a
                 variant of the existence proof due to Hart and
                 Schmeidler, and employs linear programming duality, the
                 ellipsoid algorithm, Markov chain steady state
                 computations, as well as application-specific methods
                 for computing multivariate expectations over product
                 distributions.\par

                 For anonymous games and graphical games of bounded
                 tree-width, we provide a different polynomial-time
                 algorithm for optimizing an arbitrary linear function
                 over the set of correlated equilibria of the game. In
                 contrast to our sweeping positive results for computing
                 an arbitrary correlated equilibrium, we prove that
                 optimizing over correlated equilibria is NP-hard in all
                 of the other classes of games that we consider.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "14",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "complexity of equilibria; correlated equilibria; Nash
                 equilibria",
}

@Article{Rossman:2008:HPT,
  author =       "Benjamin Rossman",
  title =        "Homomorphism preservation theorems",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "3",
  pages =        "15:1--15:53",
  month =        jul,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1379759.1379763",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Aug 6 08:30:17 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The homomorphism preservation theorem (h.p.t.), a
                 result in classical model theory, states that a
                 first-order formula is preserved under homomorphisms on
                 all structures (finite and infinite) if and only if it
                 is equivalent to an existential-positive formula.
                 Answering a long-standing question in finite model
                 theory, we prove that the h.p.t. remains valid when
                 restricted to finite structures (unlike many other
                 classical preservation theorems, including the
                 {\L}o{\'s}--Tarski theorem and Lyndon's positivity
                 theorem). Applications of this result extend to
                 constraint satisfaction problems and to database theory
                 via a correspondence between existential-positive
                 formulas and unions of conjunctive queries. A further
                 result of this article strengthens the classical
                 h.p.t.: we show that a first-order formula is preserved
                 under homomorphisms on all structures if and only if it
                 is equivalent to an existential-positive formula {\em
                 of equal quantifier-rank}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "15",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "conjunctive queries; finite model theory; first-order
                 logic; homomorphisms; preservation theorems;
                 quantifier-rank; tree-depth",
}

@Article{Deineko:2008:AMC,
  author =       "Vladimir Deineko and Peter Jonsson and Mikael Klasson
                 and Andrei Krokhin",
  title =        "The approximability of {MAX CSP} with fixed-value
                 constraints",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "4",
  pages =        "16:1--16:37",
  month =        sep,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1391289.1391290",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 16 14:29:55 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In the maximum constraint satisfaction problem (MAX
                 CSP), one is given a finite collection of (possibly
                 weighted) constraints on overlapping sets of variables,
                 and the goal is to assign values from a given finite
                 domain to the variables so as to maximize the number
                 (or the total weight, for the weighted case) of
                 satisfied constraints. This problem is NP-hard in
                 general, and, therefore, it is natural to study how
                 restricting the allowed types of constraints affects
                 the approximability of the problem. In this article, we
                 show that any MAX CSP problem with a finite set of
                 allowed constraint types, which includes all
                 fixed-value constraints (i.e., constraints of the form
                 $ x = a$), is either solvable exactly in polynomial
                 time or else is APX-complete, even if the number of
                 occurrences of variables in instances is bounded.
                 Moreover, we present a simple description of all
                 polynomial-time solvable cases of our problem. This
                 description relies on the well-known algebraic
                 combinatorial property of supermodularity.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "16",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Complexity of approximation; dichotomy; maximum
                 constraint satisfaction; Monge properties;
                 supermodularity",
}

@Article{Reingold:2008:UCL,
  author =       "Omer Reingold",
  title =        "Undirected connectivity in log-space",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "4",
  pages =        "17:1--17:24",
  month =        sep,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1391289.1391291",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 16 14:29:55 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present a {\em deterministic}, log-space algorithm
                 that solves st-connectivity in undirected graphs. The
                 previous bound on the space complexity of undirected
                 st-connectivity was $ \log^{4 / 3}(\cdot) $ obtained by
                 Armoni, Ta-Shma, Wigderson and Zhou (JACM 2000). As
                 undirected st-connectivity is complete for the class of
                 problems solvable by symmetric, nondeterministic,
                 log-space computations (the class SL), this algorithm
                 implies that SL = L (where $L$ is the class of problems
                 solvable by deterministic log-space computations).
                 Independent of our work (and using different
                 techniques), Trifonov (STOC 2005) has presented an $
                 O(\log n \log \log n)$-space, deterministic algorithm
                 for undirected st-connectivity.\par

                 Our algorithm also implies a way to construct in
                 log-space a {\em fixed\/} sequence of directions that
                 guides a deterministic walk through all of the vertices
                 of any connected graph. Specifically, we give log-space
                 constructible universal-traversal sequences for graphs
                 with restricted labeling and log-space constructible
                 universal-exploration sequences for general graphs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "17",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "bounded space algorithms; Derandomization;
                 pseudorandom generator",
}

@Article{Awerbuch:2008:OMS,
  author =       "Baruch Awerbuch and Israel Cidon and Shay Kutten",
  title =        "Optimal maintenance of a spanning tree",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "4",
  pages =        "18:1--18:45",
  month =        sep,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1391289.1391292",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 16 14:29:55 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this article, we show that keeping track of history
                 enables significant improvements in the communication
                 complexity of dynamic network protocols. We present a
                 communication optimal maintenance of a spanning tree in
                 a dynamic network. The amortized (on the number of
                 topological changes) message complexity is $ O(V) $,
                 where $V$ is the number of nodes in the network. The
                 message size used by the algorithm is $ O(\log |I D|)$
                 where $ |I D|$ is the size of the name space of the
                 nodes. Typically, $ \log |I D| = O(\log
                 V)$.\par

                 Previous algorithms that adapt to dynamic networks
                 involved $ \Omega (E)$ messages per topological change
                 --- inherently paying for re-computation of the tree
                 from scratch.\par

                 Spanning trees are essential components in many
                 distributed algorithms. Some examples include {\em
                 broadcast\/} (dissemination of messages to all network
                 nodes), {\em multicast, reset\/} (general adaptation of
                 static algorithms to dynamic networks), routing, {\em
                 termination detection}, and more. Thus, our efficient
                 maintenance of a spanning tree implies the improvement
                 of algorithms for these tasks. Our results are obtained
                 using a novel technique to save communication. A node
                 uses information received in the past in order to
                 deduce present information from the fact that certain
                 messages were NOT sent by the node's neighbor. This
                 technique is one of our main contributions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "18",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "amortized complexity; Distributed algorithms; dynamic
                 networks; leader election; optimal message complexity;
                 spanning tree; topological changes",
}

@Article{Frisch:2008:SSD,
  author =       "Alain Frisch and Giuseppe Castagna and V{\'e}ronique
                 Benzaken",
  title =        "Semantic subtyping: {Dealing} set-theoretically with
                 function, union, intersection, and negation types",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "4",
  pages =        "19:1--19:64",
  month =        sep,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1391289.1391293",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 16 14:29:55 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Subtyping relations are usually defined either
                 syntactically by a formal system or semantically by an
                 interpretation of types into an untyped denotational
                 model. This work shows how to define a subtyping
                 relation semantically in the presence of Boolean
                 connectives, functional types and dynamic dispatch on
                 types, without the complexity of denotational models,
                 and how to derive a complete subtyping algorithm.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "19",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "higher-order functions; intersection types; negation
                 types; Subtyping; union types",
}

@Article{Attiya:2008:TBA,
  author =       "Hagit Attiya and Keren Censor",
  title =        "Tight bounds for asynchronous randomized consensus",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "5",
  pages =        "20:1--20:26",
  month =        oct,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1411509.1411510",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 11 15:50:40 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A distributed consensus algorithm allows $n$ processes
                 to reach a common decision value starting from
                 individual inputs. {\em Wait-free\/} consensus, in
                 which a process always terminates within a finite
                 number of its own steps, is impossible in an
                 asynchronous shared-memory system. However, consensus
                 becomes solvable using randomization when a process
                 only has to terminate with probability 1. Randomized
                 consensus algorithms are typically evaluated by their
                 {\em total step complexity}, which is the expected
                 total number of steps taken by all processes.\par

                 This article proves that the total step complexity of
                 randomized consensus is $ \Theta (n^2)$ in an
                 asynchronous shared memory system using multi-writer
                 multi-reader registers. This result is achieved by
                 improving both the lower and the upper bounds for this
                 problem.\par

                 In addition to improving upon the best previously known
                 result by a factor of $ \log^2 n$, the lower bound
                 features a greatly streamlined proof. Both goals are
                 achieved through restricting attention to a set of {\em
                 layered\/} executions and using an isoperimetric
                 inequality for analyzing their behavior.\par

                 The matching algorithm decreases the expected total
                 step complexity by a $ \log n$ factor, by leveraging
                 the multi-writing capability of the shared registers.
                 Its correctness proof is facilitated by viewing each
                 execution of the algorithm as a stochastic process and
                 applying Kolmogorov's inequality.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "20",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Distributed computing; isoperimetric inequality; lower
                 bound; randomized algorithms; shared-memory",
}

@Article{Chen:2008:FPA,
  author =       "Jianer Chen and Yang Liu and Songjian Lu and Barry
                 O'Sullivan and Igor Razgon",
  title =        "A fixed-parameter algorithm for the directed feedback
                 vertex set problem",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "5",
  pages =        "21:1--21:19",
  month =        oct,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1411509.1411511",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 11 15:50:40 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The (parameterized) FEEDBACK VERTEX SET problem on
                 directed graphs (i.e., the DFVS problem) is defined as
                 follows: given a directed graph $G$ and a parameter
                 $k$, either construct a feedback vertex set of at most
                 $k$ vertices in $G$ or report that no such a set
                 exists. It has been a well-known open problem in
                 parameterized computation and complexity whether the
                 DFVS problem is fixed-parameter tractable, that is,
                 whether the problem can be solved in time $ f(k)
                 n^{O(1)}$ for some function $f$. In this article, we
                 develop new algorithmic techniques that result in an
                 algorithm with running time $ 4^k k! n^{O(1)}$ for the
                 DFVS problem. Therefore, we resolve this open
                 problem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "21",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Deadlock; feedback vertex set; parameterized
                 computation",
}

@Article{Devanur:2008:MEP,
  author =       "Nikhil R. Devanur and Christos H. Papadimitriou and
                 Amin Saberi and Vijay V. Vazirani",
  title =        "Market equilibrium via a primal--dual algorithm for a
                 convex program",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "5",
  pages =        "22:1--22:18",
  month =        oct,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1411509.1411512",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 11 15:50:40 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We give the first polynomial time algorithm for
                 exactly computing an equilibrium for the linear
                 utilities case of the market model defined by Fisher.
                 Our algorithm uses the primal--dual paradigm in the
                 enhanced setting of KKT conditions and convex programs.
                 We pinpoint the added difficulty raised by this setting
                 and the manner in which our algorithm circumvents it.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "22",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Market equilibria; primal--dual algorithms",
}

@Article{Ailon:2008:AII,
  author =       "Nir Ailon and Moses Charikar and Alantha Newman",
  title =        "Aggregating inconsistent information: {Ranking} and
                 clustering",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "5",
  pages =        "23:1--23:27",
  month =        oct,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1411509.1411513",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 11 15:50:40 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We address optimization problems in which we are given
                 contradictory pieces of input information and the goal
                 is to find a globally consistent solution that
                 minimizes the extent of disagreement with the
                 respective inputs. Specifically, the problems we
                 address are rank aggregation, the feedback arc set
                 problem on tournaments, and correlation and consensus
                 clustering. We show that for all these problems (and
                 various weighted versions of them), we can obtain
                 improved approximation factors using essentially the
                 same remarkably simple algorithm. Additionally, we
                 almost settle a long-standing conjecture of Bang-Jensen
                 and Thomassen and show that unless NP $ \subseteq $
                 BPP, there is no polynomial time algorithm for the
                 problem of minimum feedback arc set in tournaments.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "23",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "consensus clustering; correlation clustering; minimum
                 feedback arc-set; Rank aggregation; tournaments",
}

@Article{Bar-Yossef:2008:RSS,
  author =       "Ziv Bar-Yossef and Maxim Gurevich",
  title =        "Random sampling from a search engine's index",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "5",
  pages =        "24:1--24:74",
  month =        oct,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1411509.1411514",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 11 15:50:40 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We revisit a problem introduced by Bharat and Broder
                 almost a decade ago: How to sample random pages from
                 the corpus of documents indexed by a search engine,
                 using only the search engine's public interface? Such a
                 primitive is particularly useful in creating objective
                 benchmarks for search engines.\par

                 The technique of Bharat and Broder suffers from a
                 well-recorded bias: it favors long documents. In this
                 article we introduce two novel sampling algorithms: a
                 lexicon-based algorithm and a random walk algorithm.
                 Our algorithms produce {\em biased\/} samples, but each
                 sample is accompanied by a {\em weight}, which
                 represents its bias. The samples, in conjunction with
                 the weights, are then used to {\em simulate\/}
                 near-uniform samples. To this end, we resort to four
                 well-known Monte Carlo simulation methods: {\em
                 rejection sampling}, {\em importance sampling}, the
                 {\em Metropolis--Hastings\/} algorithm, and the {\em
                 Maximum Degree\/} method.\par

                 The limited access to search engines force our
                 algorithms to use bias weights that are only
                 ``approximate''. We characterize analytically the
                 effect of approximate bias weights on Monte Carlo
                 methods and conclude that our algorithms are {\em
                 guaranteed\/} to produce near-uniform samples from the
                 search engine's corpus. Our study of approximate Monte
                 Carlo methods could be of independent
                 interest.\par

                 Experiments on a corpus of 2.4 million documents
                 substantiate our analytical findings and show that our
                 algorithms do not have significant bias towards long
                 documents. We use our algorithms to collect comparative
                 statistics about the corpora of the Google, MSN Search,
                 and Yahoo! search engines.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "24",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Benchmarks; sampling; search engines; size
                 estimation",
}

@Article{Ackermann:2008:ICS,
  author =       "Heiner Ackermann and Heiko R{\"o}glin and Berthold
                 V{\"o}cking",
  title =        "On the impact of combinatorial structure on congestion
                 games",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "6",
  pages =        "25:1--25:22",
  month =        dec,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1455248.1455249",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 23 12:10:55 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study the impact of combinatorial structure in
                 congestion games on the complexity of computing pure
                 Nash equilibria and the convergence time of best
                 response sequences. In particular, we investigate which
                 properties of the strategy spaces of individual players
                 ensure a polynomial convergence time. We show that if
                 the strategy space of each player consists of the bases
                 of a matroid over the set of resources, then the
                 lengths of all best response sequences are polynomially
                 bounded in the number of players and resources. We also
                 prove that this result is tight, that is, the matroid
                 property is a necessary and sufficient condition on the
                 players' strategy spaces for guaranteeing
                 polynomial-time convergence to a Nash
                 equilibrium.\par

                 In addition, we present an approach that enables us to
                 devise hardness proofs for various kinds of
                 combinatorial games, including first results about the
                 hardness of market sharing games and congestion games
                 for overlay network design. Our approach also yields a
                 short proof for the PLS-completeness of network
                 congestion games. In particular, we show that network
                 congestion games are PLS-complete for directed and
                 undirected networks even in case of linear latency
                 functions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "25",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Congestion games; convergence; local search; Nash
                 equilibria",
}

@Article{Korf:2008:LTD,
  author =       "Richard E. Korf",
  title =        "Linear-time disk-based implicit graph search",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "6",
  pages =        "26:1--26:40",
  month =        dec,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1455248.1455250",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 23 12:10:55 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Many search algorithms are limited by the amount of
                 memory available. Magnetic disk storage is over two
                 orders of magnitude cheaper than semiconductor memory,
                 and individual disks can hold up to a terabyte. We
                 augment memory with magnetic disks to perform
                 brute-force and heuristic searches that are orders of
                 magnitude larger than any previous such searches. The
                 main difficulty is detecting duplicate nodes, which is
                 normally done with a hash table. Due to long disk
                 latencies, however, randomly accessed hash tables are
                 infeasible on disk, and are replaced by a mechanism we
                 call delayed duplicate detection. In contrast to
                 previous work, we perform delayed duplicate detection
                 without sorting, which runs in time linear in the
                 number of nodes in practice. Using this technique, we
                 performed the first complete breadth-first searches of
                 the $ 2 \times 7 $, $ 3 \times 5 $, $ 4 \times 4 $, and
                 $ 2 \times 8 $ sliding-tile Puzzles, verifying the
                 radius of the $ 4 \times 4 $ puzzle and determining the
                 radius of the others. We also performed the first
                 complete breadth-first searches of the four-peg Towers
                 of Hanoi problem with up to 22 discs, discovering a
                 surprising anomaly regarding the radii of these
                 problems. In addition, we performed the first heuristic
                 searches of the four-peg Towers of Hanoi problem with
                 up to 31 discs, verifying a conjectured optimal
                 solution length to these problems. We also performed
                 partial breadth-first searches of Rubik's Cube to depth
                 ten in the face-turn metric, and depth eleven in the
                 quarter-turn metric, confirming previous results.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "26",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "External memory; magnetic disk storage; permutation
                 encodings; Rubik's Cube; sliding-tile puzzles; Towers
                 of Hanoi",
}

@Article{Andrews:2008:ATH,
  author =       "Matthew Andrews and Lisa Zhang",
  title =        "Almost-tight hardness of directed congestion
                 minimization",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "6",
  pages =        "27:1--27:20",
  month =        dec,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1455248.1455251",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 23 12:10:55 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Given a set of demands in a directed graph, the {\em
                 directed congestion minimization\/} problem is to route
                 every demand with the objective of minimizing the
                 heaviest load over all edges. We show that for any
                 constant $ \epsilon > 0 $, there is no $ \Omega
                 (\log^{1 - \epsilon } M)$-approximation algorithm on
                 networks of size $M$ unless {\em NP\_ZPTIME\/}$
                 (n^{\polylog (n)})$. This bound is almost tight given
                 the $ O(\log M / \log \log M)$-approximation via
                 randomized rounding due to Raghavan and Thompson.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "27",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "congestion minimization; Hardness of approximation;
                 undirected graphs",
}

@Article{Alon:2008:WNI,
  author =       "Noga Alon and Haim Kaplan and Gabriel Nivasch and
                 Micha Sharir and Shakhar Smorodinsky",
  title =        "Weak $ \epsilon $-nets and interval chains",
  journal =      j-J-ACM,
  volume =       "55",
  number =       "6",
  pages =        "28:1--28:32",
  month =        dec,
  year =         "2008",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1455248.1455252",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 23 12:10:55 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We construct weak $ \epsilon $-nets of almost linear
                 size for certain types of point sets. Specifically, for
                 planar point sets in convex position we construct weak
                 $ 1 / r$-nets of size $ O(r \alpha (r))$, where $
                 \alpha (r)$ denotes the inverse Ackermann function. For
                 point sets along the moment curve in $ \mathbb {R}^d$
                 we construct weak $ 1 / r$-nets of size $ r \cdot
                 2^{\mathrm {poly}(\alpha (r))}$, where the degree of
                 the polynomial in the exponent depends (quadratically)
                 on $d$.\par

                 Our constructions result from a reduction to a new
                 problem, which we call stabbing interval chains with
                 $j$-tuples. Given the range of integers $ N = [1, n]$,
                 an interval chain of length $k$ is a sequence of $k$
                 consecutive, disjoint, nonempty intervals contained in
                 $N$. A $j$-tuple $ \bar {P} = (p1, \ldots {}, p j)$ is
                 said to stab an interval chain $ C = I_1 \ldots {} I_k$
                 if each $ p_i$ falls on a different interval of $C$.
                 The problem is to construct a small-size family $Z$ of
                 $j$-tuples that stabs all $k$-interval chains in
                 $N$.\par

                 Let $ z^{(j)}_k(n)$ denote the minimum size of such a
                 family $Z$. We derive almost-tight upper and lower
                 bounds for $ z^{(j)}_k(n)$ for every fixed $j$; our
                 bounds involve functions $ \alpha_m(n)$ of the inverse
                 Ackermann hierarchy. Specifically, we show that for $ j
                 = 3$ we have $ z^{(3)}_k(n) = \Theta (n \alpha_{\lfloor
                 k / 2 \rfloor }(n))$ for all $ k \geq 6$. For each $ j
                 \geq 4$, we construct a pair of functions $ P'_j(m),
                 Q'_j(m)$, almost equal asymptotically, such that $
                 z^{(j)}_{P'} j(m)(n) = O(n \alpha_m (n))$ and $
                 z^{(j)}_{Q'} j(m)(n) = \Omega (n \alpha_m(n))$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "28",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Interval chain; inverse Ackermann function; moment
                 curve; weak epsilon-net",
}

@Article{Etessami:2009:RMC,
  author =       "Kousha Etessami and Mihalis Yannakakis",
  title =        "Recursive {Markov} chains, stochastic grammars, and
                 monotone systems of nonlinear equations",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "1",
  pages =        "1:1--1:66",
  month =        jan,
  year =         "2009",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Feb 2 16:30:40 MST 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "1",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Naor:2009:COM,
  author =       "Moni Naor and Guy N. Rothblum",
  title =        "The complexity of online memory checking",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "1",
  pages =        "2:1--2:46",
  month =        jan,
  year =         "2009",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Feb 2 16:30:40 MST 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "2",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Valiant:2009:E,
  author =       "Leslie G. Valiant",
  title =        "Evolvability",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "1",
  pages =        "3:1--3:21",
  month =        jan,
  year =         "2009",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Feb 2 16:30:40 MST 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "3",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Babaioff:2009:SVC,
  author =       "Moshe Babaioff and Ron Lavi and Elan Pavlov",
  title =        "Single-value combinatorial auctions and algorithmic
                 implementation in undominated strategies",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "1",
  pages =        "4:1--4:32",
  month =        jan,
  year =         "2009",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Feb 2 16:30:40 MST 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "4",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arora:2009:EFG,
  author =       "Sanjeev Arora and Satish Rao and Umesh Vazirani",
  title =        "Expander flows, geometric embeddings and graph
                 partitioning",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "2",
  pages =        "5:1--5:37",
  month =        apr,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1502793.1502794",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 16 14:07:37 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We give a $ O(\sqrt {\log n})$-approximation algorithm
                 for the sparsest cut, edge expansion, balanced
                 separator, and graph conductance problems. This
                 improves the $ O(\log n)$-approximation of Leighton and
                 Rao (1988). We use a well-known semidefinite relaxation
                 with triangle inequality constraints. Central to our
                 analysis is a geometric theorem about projections of
                 point sets in $ R^d$, whose proof makes essential use
                 of a phenomenon called measure concentration.\par

                 We also describe an interesting and natural
                 ``approximate certificate'' for a graph's expansion,
                 which involves embedding an $n$-node expander in it
                 with appropriate dilation and congestion. We call this
                 an expander flow.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "5",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "expanders; expansion; Graph partitioning; graph
                 separators; multicommodity flows; semidefinite
                 programs",
}

@Article{Chuzhoy:2009:PFC,
  author =       "Julia Chuzhoy and Sanjeev Khanna",
  title =        "Polynomial flow-cut gaps and hardness of directed cut
                 problems",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "2",
  pages =        "6:1--6:28",
  month =        apr,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1502793.1502795",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 16 14:07:37 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study the multicut and the sparsest cut problems in
                 directed graphs. In the multicut problem, we are a
                 given an $n$-vertex graph $G$ along with $k$
                 source-sink pairs, and the goal is to find the minimum
                 cardinality subset of edges whose removal separates all
                 source-sink pairs. The sparsest cut problem has the
                 same input, but the goal is to find a subset of edges
                 to delete so as to minimize the ratio of the number of
                 deleted edges to the number of source-sink pairs that
                 are separated by this deletion. The natural linear
                 programming relaxation for multicut corresponds, by
                 LP-duality, to the well-studied maximum (fractional)
                 multicommodity flow problem, while the standard
                 LP-relaxation for sparsest cut corresponds to maximum
                 concurrent flow. Therefore, the integrality gap of the
                 linear programming relaxation for multicut/sparsest cut
                 is also the {\em flow-cut gap\/}: the largest gap,
                 achievable for any graph, between the maximum flow
                 value and the minimum cost solution for the
                 corresponding cut problem.\par

                 Our first result is that the flow-cut gap between
                 maximum multicommodity flow and minimum multicut is $
                 \Omega \tilde (n^{1 / 7})$ in directed graphs. We show
                 a similar result for the gap between maximum concurrent
                 flow and sparsest cut in directed graphs. These results
                 improve upon a long-standing lower bound of $ \Omega
                 (\log n)$ for both types of flow-cut gaps. We notice
                 that these polynomially large flow-cut gaps are in a
                 sharp contrast to the undirected setting where both
                 these flow-cut gaps are known to be $ \Theta (\log n)$.
                 Our second result is that both directed multicut and
                 sparsest cut are hard to approximate to within a factor
                 of $ 2^{\Omega (\log 1 - \epsilon n)}$ for any constant
                 $ \epsilon > 0$, unless NP $ \subseteq $ ZPP. This
                 improves upon the recent $ \Omega (\log n / \log \log
                 n)$-hardness result for these problems. We also show
                 that existence of PCP's for NP with perfect
                 completeness, polynomially small soundness, and
                 constant number of queries would imply a polynomial
                 factor hardness of approximation for both these
                 problems. All our results hold for directed acyclic
                 graphs.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "6",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Directed multicut; hardness of approximation; sparsest
                 cut",
}

@Article{Arvestad:2009:GEM,
  author =       "Lars Arvestad and Jens Lagergren and Bengt Sennblad",
  title =        "The gene evolution model and computing its associated
                 probabilities",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "2",
  pages =        "7:1--7:44",
  month =        apr,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1502793.1502796",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 16 14:07:37 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Phylogeny is both a fundamental tool in biology and a
                 rich source of fascinating modeling and algorithmic
                 problems. Today's wealth of sequenced genomes makes it
                 increasingly important to understand evolutionary
                 events such as duplications, losses, transpositions,
                 inversions, lateral transfers, and domain shuffling. We
                 focus on the gene duplication event, that constitutes a
                 major force in the creation of genes with new function
                 [Ohno 1970; Lynch and Force 2000] and, thereby also, of
                 biodiversity.\par

                 We introduce the probabilistic {\em gene evolution
                 model}, which describes how a gene tree evolves within
                 a given species tree with respect to speciation, gene
                 duplication, and gene loss. The actual relation between
                 gene tree and species tree is captured by a
                 reconciliation, a concept which we generalize for more
                 expressiveness. The model is a canonical generalization
                 of the classical linear birth-death process, obtained
                 by replacing the interval where the process takes place
                 by a tree.\par

                 For the {\em gene evolution model}, we derive efficient
                 algorithms for some associated probability
                 distributions: the probability of a reconciled tree,
                 the probability of a gene tree, the maximum probability
                 reconciliation, the posterior probability of a
                 reconciliation, and sampling reconciliations with
                 respect to the posterior probability. These algorithms
                 provides the basis for several applications, including
                 species tree construction, reconciliation analysis,
                 orthology analysis, biogeography, and host-parasite
                 co-evolution.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "7",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "duplication; evolution; gene; loss; Phylogeny;
                 probability; reconciliation",
}

@Article{Raz:2009:MLF,
  author =       "Ran Raz",
  title =        "Multi-linear formulas for permanent and determinant
                 are of super-polynomial size",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "2",
  pages =        "8:1--8:17",
  month =        apr,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1502793.1502797",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 16 14:07:37 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "An arithmetic formula is multilinear if the polynomial
                 computed by each of its subformulas is multilinear. We
                 prove that any multilinear arithmetic formula for the
                 permanent or the determinant of an $ n \times n $
                 matrix is of size super-polynomial in $n$. Previously,
                 super-polynomial lower bounds were not known (for any
                 explicit function) even for the special case of
                 multilinear formulas of constant depth.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "8",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algebraic complexity; arithmetic formulas; circuit
                 complexity; lower bounds",
}

@Article{Borradaile:2009:AMS,
  author =       "Glencora Borradaile and Philip Klein",
  title =        "An {$ O(n \log n) $} algorithm for maximum {\em
                 st}-flow in a directed planar graph",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "2",
  pages =        "9:1--9:30",
  month =        apr,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1502793.1502798",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 16 14:07:37 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We give the first correct $ O(n \log n) $ algorithm
                 for finding a maximum {\em st\/}-flow in a directed
                 planar graph. After a preprocessing step that consists
                 in finding single-source shortest-path distances in the
                 dual, the algorithm consists of repeatedly saturating
                 the leftmost residual $s$-to-$t$ path.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "9",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Maximum flow; planar graphs",
}

@Article{Puschel:2009:PSD,
  author =       "Markus P{\"u}schel and Peter A. Milder and James C.
                 Hoe",
  title =        "Permuting streaming data using {RAMs}",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "2",
  pages =        "10:1--10:34",
  month =        apr,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1502793.1502799",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 16 14:07:37 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article presents a method for constructing
                 hardware structures that perform a fixed permutation on
                 streaming data. The method applies to permutations that
                 can be represented as linear mappings on the bit-level
                 representation of the data locations. This subclass
                 includes many important permutations such as stride
                 permutations (corner turn, perfect shuffle, etc.), the
                 bit reversal, the Hadamard reordering, and the Gray
                 code reordering.\par

                 The datapath for performing the streaming permutation
                 consists of several independent banks of memory and two
                 interconnection networks. These structures are built
                 for a given streaming width (i.e., number of inputs and
                 outputs per cycle) and operate at full throughput for
                 this streaming width.\par

                 We provide an algorithm that completely specifies the
                 datapath and control logic given the desired
                 permutation and streaming width. Further, we provide
                 lower bounds on the achievable cost of a solution and
                 show that for an important subclass of permutations our
                 solution is optimal.\par

                 We apply our algorithm to derive datapaths for several
                 important permutations, including a detailed example
                 that carefully illustrates each aspect of the design
                 process. Lastly, we compare our permutation structures
                 to those of J{\"a}rvinen et al. [2004], which are
                 specialized for stride permutations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "10",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "connection network; data reordering; linear bit
                 mapping; matrix transposition; Permutation; RAM;
                 streaming datapath; stride permutation; switch",
}

@Article{Vianu:2009:IPS,
  author =       "Victor Vianu and Jan {Van den Bussche}",
  title =        "Introduction to {PODS 2006} special section",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "3",
  pages =        "11:1--11:1",
  month =        may,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1516512.1516513",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri May 15 14:56:06 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "11",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Grohe:2009:LBP,
  author =       "Martin Grohe and Andr{\'e} Hernich and Nicole
                 Schweikardt",
  title =        "Lower bounds for processing data with few random
                 accesses to external memory",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "3",
  pages =        "12:1--12:58",
  month =        may,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1516512.1516514",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri May 15 14:56:06 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We consider a scenario where we want to query a large
                 dataset that is stored in external memory and does not
                 fit into main memory. The most constrained resources in
                 such a situation are the size of the main memory and
                 the number of random accesses to external memory. We
                 note that sequentially streaming data from external
                 memory through main memory is much less
                 prohibitive.\par

                 We propose an abstract model of this scenario in which
                 we restrict the size of the main memory and the number
                 of random accesses to external memory, but admit
                 arbitrary sequential access. A distinguishing feature
                 of our model is that it allows the usage of unlimited
                 external memory for storing intermediate results, such
                 as several hard disks that can be accessed in
                 parallel.\par

                 In this model, we prove lower bounds for the problem of
                 sorting a sequence of strings (or numbers), the problem
                 of deciding whether two given sets of strings are
                 equal, and two closely related decision problems.
                 Intuitively, our results say that there is no algorithm
                 for the problems that uses internal memory space
                 bounded by $ N^{1 - \epsilon } $ and at most $ o(\log
                 N) $ random accesses to external memory, but unlimited
                 ``streaming access'', both for writing to and reading
                 from external memory. (Here, $N$ denotes the size of
                 the input and $ \epsilon $ is an arbitrary constant
                 greater than 0.) We even permit randomized algorithms
                 with one-sided bounded error. We also consider the
                 problem of evaluating database queries and prove
                 similar lower bounds for evaluating relational algebra
                 queries against relational databases and XQuery and
                 XPath queries against XML-databases.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "12",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Complexity; data streams; query optimization; query
                 processing; real-time data; semi-structured data; XML",
}

@Article{Bojanczyk:2009:TVL,
  author =       "Mikoaj Boja{\'n}czyk and Anca Muscholl and Thomas
                 Schwentick and Luc Segoufin",
  title =        "Two-variable logic on data trees and {XML} reasoning",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "3",
  pages =        "13:1--13:48",
  month =        may,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1516512.1516515",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri May 15 14:56:06 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Motivated by reasoning tasks for XML languages, the
                 satisfiability problem of logics on {\em data trees\/}
                 is investigated. The nodes of a data tree have a {\em
                 label\/} from a finite set and a {\em data value\/}
                 from a possibly infinite set. It is shown that
                 satisfiability for two-variable first-order logic is
                 decidable if the tree structure can be accessed only
                 through the {\em child\/} and the {\em next sibling\/}
                 predicates and the access to data values is restricted
                 to equality tests. From this main result, decidability
                 of satisfiability and containment for a data-aware
                 fragment of XPath and of the implication problem for
                 unary key and inclusion constraints is concluded.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "13",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "consistency; DTDs; implications; Integrity
                 constraints; XML",
}

@Article{Chen:2009:SCC,
  author =       "Xi Chen and Xiaotie Deng and Shang-Hua Teng",
  title =        "Settling the complexity of computing two-player {Nash}
                 equilibria",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "3",
  pages =        "14:1--14:57",
  month =        may,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1516512.1516516",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri May 15 14:56:06 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We prove that Bimatrix, the problem of finding a Nash
                 equilibrium in a two-player game, is complete for the
                 complexity class PPAD (Polynomial Parity Argument,
                 Directed version) introduced by Papadimitriou in
                 1991.\par

                 Our result, building upon the work of Daskalakis et al.
                 [2006a] on the complexity of four-player Nash
                 equilibria, settles a long standing open problem in
                 algorithmic game theory. It also serves as a starting
                 point for a series of results concerning the complexity
                 of two-player Nash equilibria. In particular, we prove
                 the following theorems:\par

                 --- Bimatrix does not have a fully polynomial-time
                 approximation scheme unless every problem in PPAD is
                 solvable in polynomial time.\par

                 --- The smoothed complexity of the classic
                 Lemke--Howson algorithm and, in fact, of any algorithm
                 for Bimatrix is not polynomial unless every problem in
                 PPAD is solvable in randomized polynomial time.\par

                 Our results also have a complexity implication in
                 mathematical economics:\par

                 --- Arrow--Debreu market equilibria are PPAD-hard to
                 compute.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "14",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Arrow--Debreu market; Brouwer's fixed point;
                 Lemke--Howson algorithm; Nash equilibrium;
                 PPAD-completeness; smoothed analysis; Sperner's lemma;
                 Two-player game",
}

@Article{Remy:2009:QPT,
  author =       "Jan Remy and Angelika Steger",
  title =        "A quasi-polynomial time approximation scheme for
                 minimum weight triangulation",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "3",
  pages =        "15:1--15:47",
  month =        may,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1516512.1516517",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri May 15 14:56:06 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The Minimum Weight Triangulation problem is to find a
                 triangulation $ T* $ of minimum length for a given set
                 of points $P$ in the Euclidean plane. It was one of the
                 few longstanding open problems from the famous list of
                 twelve problems with unknown complexity status,
                 published by Garey and Johnson [1979]. Very recently,
                 the problem was shown to be {\em NP\/}-hard by Mulzer
                 and Rote [2006]. In this article, we present a
                 quasi-polynomial time approximation scheme for Minimum
                 Weight Triangulation.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "15",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "approximation algorithms; Minimum weight
                 triangulation",
}

@Article{Alur:2009:ANS,
  author =       "Rajeev Alur and P. Madhusudan",
  title =        "Adding nesting structure to words",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "3",
  pages =        "16:1--16:43",
  month =        may,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1516512.1516518",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri May 15 14:56:06 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We propose the model of {\em nested words\/} for
                 representation of data with both a linear ordering and
                 a hierarchically nested matching of items. Examples of
                 data with such dual linear-hierarchical structure
                 include executions of structured programs, annotated
                 linguistic data, and HTML/XML documents. Nested words
                 generalize both words and ordered trees, and allow both
                 word and tree operations. We define {\em nested word
                 automata\/} --- finite-state acceptors for nested
                 words, and show that the resulting class of regular
                 languages of nested words has all the appealing
                 theoretical properties that the classical regular word
                 languages enjoys: deterministic nested word automata
                 are as expressive as their nondeterministic
                 counterparts; the class is closed under union,
                 intersection, complementation, concatenation, Kleene-*,
                 prefixes, and language homomorphisms; membership,
                 emptiness, language inclusion, and language equivalence
                 are all decidable; and definability in monadic second
                 order logic corresponds exactly to finite-state
                 recognizability. We also consider regular languages of
                 infinite nested words and show that the closure
                 properties, MSO-characterization, and decidability of
                 decision problems carry over.\par

                 The linear encodings of nested words give the class of
                 {\em visibly pushdown languages\/} of words, and this
                 class lies between balanced languages and deterministic
                 context-free languages. We argue that for algorithmic
                 verification of structured programs, instead of viewing
                 the program as a context-free language over words, one
                 should view it as a regular language of nested words
                 (or equivalently, a visibly pushdown language), and
                 this would allow model checking of many properties
                 (such as stack inspection, pre-post conditions) that
                 are not expressible in existing specification
                 logics.\par

                 We also study the relationship between ordered trees
                 and nested words, and the corresponding automata: while
                 the analysis complexity of nested word automata is the
                 same as that of classical tree automata, they combine
                 both bottom-up and top-down traversals, and enjoy
                 expressiveness and succinctness benefits over tree
                 automata.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "16",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Pushdown automata; software model checking; tree
                 automata; XML processing",
}

@Article{Lueker:2009:IBA,
  author =       "George S. Lueker",
  title =        "Improved bounds on the average length of longest
                 common subsequences",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "3",
  pages =        "17:1--17:38",
  month =        may,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1516512.1516519",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri May 15 14:56:06 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It has long been known [Chv{\'a}tal and Sankoff 1975]
                 that the average length of the longest common
                 subsequence of two random strings of length $n$ over an
                 alphabet of size $k$ is asymptotic to $ \gamma_k n$ for
                 some constant $ \gamma_k$ depending on $k$. The value
                 of these constants remains unknown, and a number of
                 papers have proved upper and lower bounds on them. We
                 discuss techniques, involving numerical calculations
                 with recurrences on many variables, for determining
                 lower and upper bounds on these constants. To our
                 knowledge, the previous best-known lower and upper
                 bounds for $ \gamma_2$ were those of Dan{\v{c}}{\'\i}k
                 and Paterson, approximately 0.773911 and 0.837623
                 [Dan{\v{c}}{\'\i}k 1994; Dan{\v{c}}{\'\i}k and Paterson
                 1995]. We improve these to 0.788071 and 0.826280. This
                 upper bound is less than the $ \gamma_2$ given by
                 Steele's old conjecture (see Steele [1997, page 3])
                 that $ \gamma_2 = 2 / (1 + \sqrt 2) \approx 0.828427$.
                 (As Steele points out, experimental evidence had
                 already suggested that this conjectured value was too
                 high.) Finally, we show that the upper bound technique
                 described here could be used to produce, for any $k$, a
                 sequence of upper bounds converging to $ \gamma_k$,
                 though the computation time grows very quickly as
                 better bounds are guaranteed.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "17",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Arratia-Steele conjecture; average-case analysis;
                 dynamic programming; Longest common subsequences",
}

@Article{Stefankovic:2009:ASA,
  author =       "Daniel {\v{S}}tefankovi{\v{c}} and Santosh Vempala and
                 Eric Vigoda",
  title =        "Adaptive simulated annealing: a near-optimal
                 connection between sampling and counting",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "3",
  pages =        "18:1--18:36",
  month =        may,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1516512.1516520",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri May 15 14:56:06 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present a near-optimal reduction from approximately
                 counting the cardinality of a discrete set to
                 approximately sampling elements of the set. An
                 important application of our work is to approximating
                 the partition function $Z$ of a discrete system, such
                 as the Ising model, matchings or colorings of a graph.
                 The typical approach to estimating the partition
                 function $ Z(\beta^*)$ at some desired inverse
                 temperature $ \beta^*$ is to define a sequence, which
                 we call a {\em cooling schedule}, $ \beta_0 =
                 0$.\par

                 For well-studied problems such as estimating the
                 partition function of the Ising model, or approximating
                 the number of colorings or matchings of a graph, our
                 cooling schedule is of length $ O^*(\sqrt n)$, which
                 implies an overall savings of $ O^(n)$ in the running
                 time of the approximate counting algorithm (since
                 roughly $ \ell $ samples are needed to estimate each
                 ratio).\par

                 A similar improvement in the length of the cooling
                 schedule was recently obtained by Lov{\'a}sz and
                 Vempala in the context of estimating the volume of
                 convex bodies. While our reduction is inspired by
                 theirs, the discrete analogue of their result turns out
                 to be significantly more difficult. Whereas a fixed
                 schedule suffices in their setting, we prove that in
                 the discrete setting we need an adaptive schedule, that
                 is, the schedule depends on $Z$. More precisely, we
                 prove any nonadaptive cooling schedule has length at
                 least $ O^*(\ln A)$, and we present an algorithm to
                 find an adaptive schedule of length $ O^*(\sqrt {\ln
                 A})$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "18",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Counting; Markov chain Monte Carlo; simulated
                 annealing",
}

@Article{Khandekar:2009:GPU,
  author =       "Rohit Khandekar and Satish Rao and Umesh Vazirani",
  title =        "Graph partitioning using single commodity flows",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "4",
  pages =        "19:1--19:15",
  month =        jun,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1538902.1538903",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 2 12:21:01 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We show that the sparsest cut in graphs with $n$
                 vertices and $m$ edges can be approximated within $
                 O(\log^2 n)$ factor in $ \tilde {O}(m + n^{3 / 2})$
                 time using polylogarithmic single commodity max-flow
                 computations. Previous algorithms are based on
                 multicommodity flows that take time $ \tilde {O}(m +
                 n^2)$. Our algorithm iteratively employs max-flow
                 computations to embed an expander flow, thus providing
                 a certificate of expansion. Our technique can also be
                 extended to yield an $ O(\log^2 n)$-(pseudo-)
                 approximation algorithm for the edge-separator problem
                 with a similar running time.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "19",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Edge-separator; single commodity max-flow; sparse cut;
                 spectral method",
}

@Article{Guruswami:2009:UER,
  author =       "Venkatesan Guruswami and Christopher Umans and Salil
                 Vadhan",
  title =        "Unbalanced expanders and randomness extractors from
                 {Parvaresh--Vardy} codes",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "4",
  pages =        "20:1--20:34",
  month =        jun,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1538902.1538904",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 2 12:21:01 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We give an improved explicit construction of highly
                 unbalanced bipartite expander graphs with expansion
                 arbitrarily close to the degree (which is
                 polylogarithmic in the number of vertices). Both the
                 degree and the number of right-hand vertices are
                 polynomially close to optimal, whereas the previous
                 constructions of Ta-Shma et al. [2007] required at
                 least one of these to be quasipolynomial in the
                 optimal. Our expanders have a short and self-contained
                 description and analysis, based on the ideas underlying
                 the recent list-decodable error-correcting codes of
                 Parvaresh and Vardy [2005].\par

                 Our expanders can be interpreted as near-optimal
                 ``randomness condensers,'' that reduce the task of
                 extracting randomness from sources of arbitrary
                 min-entropy rate to extracting randomness from sources
                 of min-entropy rate arbitrarily close to 1, which is a
                 much easier task. Using this connection, we obtain a
                 new, self-contained construction of randomness
                 extractors that is optimal up to constant factors,
                 while being much simpler than the previous construction
                 of Lu et al. [2003] and improving upon it when the
                 error parameter is small (e.g., 1/poly(n)).",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "20",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "condensers; error-correcting codes; Expander graphs;
                 list decoding; randomness extractors",
}

@Article{Achlioptas:2009:BTS,
  author =       "Dimitris Achlioptas and Aaron Clauset and David Kempe
                 and Cristopher Moore",
  title =        "On the bias of traceroute sampling: {Or}, power-law
                 degree distributions in regular graphs",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "4",
  pages =        "21:1--21:28",
  month =        jun,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1538902.1538905",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 2 12:21:01 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Understanding the graph structure of the Internet is a
                 crucial step for building accurate network models and
                 designing efficient algorithms for Internet
                 applications. Yet, obtaining this graph structure can
                 be a surprisingly difficult task, as edges cannot be
                 explicitly queried. For instance, empirical studies of
                 the network of Internet Protocol (IP) addresses
                 typically rely on indirect methods like {\em
                 traceroute\/} to build what are approximately
                 single-source, all-destinations, shortest-path trees.
                 These trees only sample a fraction of the network's
                 edges, and a paper by Lakhina et al. [2003] found
                 empirically that the resulting sample is intrinsically
                 biased. Further, in simulations, they observed that the
                 degree distribution under traceroute sampling exhibits
                 a power law even when the underlying degree
                 distribution is Poisson.\par

                 In this article, we study the bias of traceroute
                 sampling mathematically and, for a very general class
                 of underlying degree distributions, explicitly
                 calculate the distribution that will be observed. As
                 example applications of our machinery, we prove that
                 traceroute sampling finds power-law degree
                 distributions in both $ \delta $-regular and
                 Poisson-distributed random graphs. Thus, our work puts
                 the observations of Lakhina et al. on a rigorous
                 footing, and extends them to nearly arbitrary degree
                 distributions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "21",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Internet topology; sampling bias; traceroute",
}

@Article{Leyton-Brown:2009:EHM,
  author =       "Kevin Leyton-Brown and Eugene Nudelman and Yoav
                 Shoham",
  title =        "Empirical hardness models: {Methodology} and a case
                 study on combinatorial auctions",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "4",
  pages =        "22:1--22:52",
  month =        jun,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1538902.1538906",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 2 12:21:01 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Is it possible to predict how long an algorithm will
                 take to solve a previously-unseen instance of an
                 NP-complete problem? If so, what uses can be found for
                 models that make such predictions? This article
                 provides answers to these questions and evaluates the
                 answers experimentally.\par

                 We propose the use of supervised machine learning to
                 build models that predict an algorithm's runtime given
                 a problem instance. We discuss the construction of
                 these models and describe techniques for interpreting
                 them to gain understanding of the characteristics that
                 cause instances to be hard or easy. We also present two
                 applications of our models: building algorithm
                 portfolios that outperform their constituent
                 algorithms, and generating test distributions that
                 emphasize hard problems.\par

                 We demonstrate the effectiveness of our techniques in a
                 case study of the combinatorial auction winner
                 determination problem. Our experimental results show
                 that we can build very accurate models of an
                 algorithm's running time, interpret our models, build
                 an algorithm portfolio that strongly outperforms the
                 best single algorithm, and tune a standard benchmark
                 suite to generate much harder problem instances.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "22",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithm portfolios; combinatorial auctions;
                 Empirical analysis of algorithms; runtime prediction",
}

@Article{Roughgarden:2009:QIC,
  author =       "Tim Roughgarden and Mukund Sundararajan",
  title =        "Quantifying inefficiency in cost-sharing mechanisms",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "4",
  pages =        "23:1--23:33",
  month =        jun,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1538902.1538907",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 2 12:21:01 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In a cost-sharing problem, several participants with
                 unknown preferences vie to receive some good or
                 service, and each possible outcome has a known cost. A
                 cost-sharing mechanism is a protocol that decides which
                 participants are allocated a good and at what prices.
                 Three desirable properties of a cost-sharing mechanism
                 are: incentive-compatibility, meaning that participants
                 are motivated to bid their true private value for
                 receiving the good; budget-balance, meaning that the
                 mechanism recovers its incurred cost with the prices
                 charged; and economic efficiency, meaning that the cost
                 incurred and the value to the participants are traded
                 off in an optimal way. These three goals have been
                 known to be mutually incompatible for thirty years.
                 Nearly all the work on cost-sharing mechanism design by
                 the economics and computer science communities has
                 focused on achieving two of these goals while
                 completely ignoring the third.\par

                 We introduce novel measures for quantifying efficiency
                 loss in cost-sharing mechanisms and prove simultaneous
                 approximate budget-balance and approximate efficiency
                 guarantees for mechanisms for a wide range of
                 cost-sharing problems, including all submodular and
                 Steiner tree problems. Our key technical tool is an
                 exact characterization of worst-case efficiency loss in
                 Moulin mechanisms, the dominant paradigm in
                 cost-sharing mechanism design.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "23",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "cost sharing; inefficiency; Mechanism design; Steiner
                 tree; submodular functions",
}

@Article{Attiya:2009:COF,
  author =       "Hagit Attiya and Rachid Guerraoui and Danny Hendler
                 and Petr Kuznetsov",
  title =        "The complexity of obstruction-free implementations",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "4",
  pages =        "24:1--24:24",
  month =        jun,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1538902.1538908",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Jul 2 12:21:01 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "{\em Obstruction-free\/} implementations of concurrent
                 objects are optimized for the common case where there
                 is no {\em step contention}, and were recently
                 advocated as a solution to the costs associated with
                 synchronization without locks. In this article, we
                 study this claim and this goes through precisely
                 defining the notions of obstruction-freedom and step
                 contention. We consider several classes of
                 obstruction-free implementations, present corresponding
                 generic object implementations, and prove lower bounds
                 on their complexity. Viewed collectively, our results
                 establish that the worst-case operation time complexity
                 of obstruction-free implementations is high, even in
                 the absence of step contention. We also show that
                 lock-based implementations are not subject to some of
                 the time-complexity lower bounds we present.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "24",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "lower bounds; memory contention; perturbable objects;
                 Shared memory; solo-fast implementations; step
                 contention",
}

@Article{Fomin:2009:MCA,
  author =       "Fedor V. Fomin and Fabrizio Grandoni and Dieter
                 Kratsch",
  title =        "A measure \& conquer approach for the analysis of
                 exact algorithms",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "5",
  pages =        "25:1--25:32",
  month =        aug,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1552285.1552286",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Aug 20 13:54:33 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "For more than 40 years, Branch \& Reduce
                 exponential-time backtracking algorithms have been
                 among the most common tools used for finding exact
                 solutions of NP-hard problems. Despite that, the way to
                 analyze such recursive algorithms is still far from
                 producing tight worst-case running time bounds.
                 Motivated by this, we use an approach, that we call
                 ``Measure \& Conquer'', as an attempt to step beyond
                 such limitations. The approach is based on the careful
                 design of a nonstandard measure of the subproblem size;
                 this measure is then used to lower bound the progress
                 made by the algorithm at each branching step. The idea
                 is that a smarter measure may capture behaviors of the
                 algorithm that a standard measure might not be able to
                 exploit, and hence lead to a significantly better
                 worst-case time analysis.\par

                 In order to show the potentialities of Measure \&
                 Conquer, we consider two well-studied NP-hard problems:
                 minimum dominating set and maximum independent set. For
                 the first problem, we consider the current best
                 algorithm, and prove (thanks to a better measure) a
                 much tighter running time bound for it. For the second
                 problem, we describe a new, simple algorithm, and show
                 that its running time is competitive with the current
                 best time bounds, achieved with far more complicated
                 algorithms (and standard analysis).\par

                 Our examples show that a good choice of the measure,
                 made in the very first stages of exact algorithms
                 design, can have a tremendous impact on the running
                 time bounds achievable.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "25",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Dominating set; exact algorithm; independent set",
}

@Article{Chadha:2009:ECR,
  author =       "Rohit Chadha and A. Prasad Sistla and Mahesh
                 Viswanathan",
  title =        "On the expressiveness and complexity of randomization
                 in finite state monitors",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "5",
  pages =        "26:1--26:44",
  month =        aug,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1552285.1552287",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Aug 20 13:54:33 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this article, we introduce the model of {\em finite
                 state probabilistic monitors\/} (FPM), which are finite
                 state automata on infinite strings that have
                 probabilistic transitions and an absorbing reject
                 state. FPMs are a natural automata model that can be
                 seen as either randomized run-time monitoring
                 algorithms or as models of open, probabilistic reactive
                 systems that can fail. We give a number of results that
                 characterize, topologically as well as with respect to
                 their computational power, the sets of languages
                 recognized by FPMs. We also study the emptiness and
                 universality problems for such automata and give exact
                 complexity bounds for these problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "26",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Omega automata; probabilistic automata; randomization;
                 runtime verification; topology",
}

@Article{Bilardi:2009:AIR,
  author =       "Gianfranco Bilardi and Kattamuri Ekanadham and Pratap
                 Pattnaik",
  title =        "On approximating the ideal random access machine by
                 physical machines",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "5",
  pages =        "27:1--27:57",
  month =        aug,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1552285.1552288",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Aug 20 13:54:33 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The capability of the {\em Random Access Machine\/}
                 (RAM) to execute any instruction in constant time is
                 not realizable, due to fundamental physical constraints
                 on the minimum size of devices and on the maximum speed
                 of signals. This work explores how well the ideal RAM
                 performance can be approximated, for significant
                 classes of computations, by machines whose building
                 blocks have constant size and are connected at a
                 constant distance.\par

                 A novel memory structure is proposed, which is {\em
                 pipelined\/} (can accept a new request at each cycle)
                 and {\em hierarchical}, exhibiting optimal latency $
                 a(x) = O(x^{1 / d}) $ to address $x$, in
                 $d$-dimensional realizations.\par

                 In spite of block-transfer or other memory-pipeline
                 capabilities, a number of previous machine models do
                 not achieve a full overlap of memory accesses. These
                 are examples of machines with {\em explicit data
                 movement}. It is shown that there are {\em
                 direct-flow\/} computations (without branches and
                 indirect accesses) that require time superlinear in the
                 number of instructions, on all such machines.\par

                 To circumvent the explicit-data-movement constraints,
                 the {\em Speculative Prefetcher\/} (SP) and the {\em
                 Speculative Prefetcher and Evaluator\/} (SPE)
                 processors are developed. Both processors can execute
                 any {\em direct-flow\/} program in linear time. The SPE
                 also executes in linear time a class of loop programs
                 that includes many significant algorithms. Even
                 quicksort, a somewhat irregular, recursive algorithm
                 admits a linear-time SPE implementation. A relation
                 between instructions called {\em address dependence\/}
                 is introduced, which limits memory-access overlap and
                 can lead to superlinear time, as illustrated with the
                 classical merging algorithm.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "27",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Physical constraints on machines; pipelined
                 hierarchical memory; speculative processors",
}

@Article{Kumar:2009:UAS,
  author =       "V. S. Anil Kumar and Madhav V. Marathe and Srinivasan
                 Parthasarathy and Aravind Srinivasan",
  title =        "A unified approach to scheduling on unrelated parallel
                 machines",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "5",
  pages =        "28:1--28:31",
  month =        aug,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1552285.1552289",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Aug 20 13:54:33 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We develop a single rounding algorithm for scheduling
                 on unrelated parallel machines; this algorithm works
                 well with the known linear programming-, quadratic
                 programming-, and convex programming-relaxations for
                 scheduling to minimize completion time, makespan, and
                 other well-studied objective functions. This algorithm
                 leads to the following applications for the general
                 setting of unrelated parallel machines: (i) a
                 bicriteria algorithm for a schedule whose weighted
                 completion-time and makespan {\em simultaneously\/}
                 exhibit the current-best individual approximations for
                 these criteria; (ii) better-than-two approximation
                 guarantees for scheduling to minimize the {\em L$_p$
                 \/} norm of the vector of machine-loads, for all 1",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "28",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Approximation algorithms; randomized rounding;
                 scheduling under multiple criteria",
}

@Article{Libkin:2009:IPS,
  author =       "Leonid Libkin and Victor Vianu",
  title =        "Introduction to {PODS 2007} special section",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "6",
  pages =        "29:1--29:1",
  month =        sep,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1568318.1568319",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 4 13:33:31 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "29",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gottlob:2009:GHD,
  author =       "Georg Gottlob and Zolt{\'a}n Mikl{\'o}s and Thomas
                 Schwentick",
  title =        "Generalized hypertree decompositions: {NP}-hardness
                 and tractable variants",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "6",
  pages =        "30:1--30:32",
  month =        sep,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1568318.1568320",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 4 13:33:31 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The generalized hypertree width GHW($H$) of a
                 hypergraph $H$ is a measure of its cyclicity. Classes
                 of conjunctive queries or constraint satisfaction
                 problems whose associated hypergraphs have bounded GHW
                 are known to be solvable in polynomial time. However,
                 it has been an open problem for several years if for a
                 fixed constant $k$ and input hypergraph $H$ it can be
                 determined in polynomial time whether GHW($H$) $ \leq
                 k$. Here, this problem is settled by proving that even
                 for $ k = 3$ the problem is already NP-hard. On the way
                 to this result, another long standing open problem,
                 originally raised by Goodman and Shmueli [1984] in the
                 context of join optimization is solved. It is proven
                 that determining whether a hypergraph $H$ admits a tree
                 projection with respect to a hypergraph $G$ is
                 NP-complete. Our intractability results on generalized
                 hypertree width motivate further research on more
                 restrictive tractable hypergraph decomposition methods
                 that approximate generalized hypertree decomposition
                 (GHD). We show that each such method is dominated by a
                 tractable decomposition method definable through a
                 function that associates a set of partial edges to a
                 hypergraph. By using one particular such function, we
                 define the new Component Hypertree Decomposition
                 method, which is tractable and strictly more general
                 than other approximations to GHD published so far.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "30",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "acyclic; Conjunctive query; hypergraph; hypertree
                 decomposition; NP-complete; tractable; TreeProjection
                 Problem",
}

@Article{tenCate:2009:CQC,
  author =       "Balder ten Cate and Carsten Lutz",
  title =        "The complexity of query containment in expressive
                 fragments of {XPath 2.0}",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "6",
  pages =        "31:1--31:48",
  month =        sep,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1568318.1568321",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 4 13:33:31 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "XPath is a prominent W3C standard for navigating XML
                 documents that has stimulated a lot of research into
                 query answering and static analysis. In particular,
                 query containment has been studied extensively for
                 fragments of the 1.0 version of this standard, whereas
                 little is known about query containment in (fragments
                 of) the richer language XPath 2.0. In this article, we
                 consider extensions of CoreXPath, the navigational core
                 of XPath 1.0, with operators that are part of or
                 inspired by XPath 2.0: path intersection, path
                 equality, path complementation, for-loops, and
                 transitive closure. For each combination of these
                 operators, we determine the complexity of query
                 containment, both with and without DTDs. It turns out
                 to range from ExpTime (for extensions with path
                 equality) and 2-ExpTime (for extensions with path
                 intersection) to non-elementary (for extensions with
                 path complementation or for-loops). In almost all
                 cases, adding transitive closure on top has no further
                 impact on the complexity. We also investigate the
                 effect of dropping the upward and/or sibling axes, and
                 show that this sometimes leads to a reduction in
                 complexity. Since the languages we study include
                 negation and conjunction in filters, our complexity
                 results can equivalently be stated in terms of
                 satisfiability. We also analyze the above languages in
                 terms of succinctness.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "31",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "complexity; containment; satisfiability; XML; XPath",
}

@Article{Kleinberg:2009:TEU,
  author =       "Jon Kleinberg and Aleksandrs Slivkins and Tom Wexler",
  title =        "Triangulation and embedding using small sets of
                 beacons",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "6",
  pages =        "32:1--32:37",
  month =        sep,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1568318.1568322",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 4 13:33:31 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Concurrent with recent theoretical interest in the
                 problem of metric embedding, a growing body of research
                 in the networking community has studied the distance
                 matrix defined by node-to-node latencies in the
                 Internet, resulting in a number of recent approaches
                 that approximately embed this distance matrix into
                 low-dimensional Euclidean space. There is a fundamental
                 distinction, however, between the theoretical
                 approaches to the embedding problem and this recent
                 Internet-related work: in addition to computational
                 limitations, Internet measurement algorithms operate
                 under the constraint that it is only feasible to
                 measure distances for a linear (or near-linear) number
                 of node pairs, and typically in a highly structured
                 way. Indeed, the most common framework for Internet
                 measurements of this type is a {\em beacon-based
                 approach\/} one chooses uniformly at random a constant
                 number of nodes (``beacons'') in the network, each node
                 measures its distance to all beacons, and one then has
                 access to only these measurements for the remainder of
                 the algorithm. Moreover, beacon-based algorithms are
                 often designed not for embedding but for the more basic
                 problem of {\em triangulation}, in which one uses the
                 triangle inequality to infer the distances that have
                 not been measured.\par

                 Here we give algorithms with provable performance
                 guarantees for beacon-based triangulation and
                 embedding. We show that in addition to multiplicative
                 error in the distances, performance guarantees for
                 beacon-based algorithms typically must include a notion
                 of {\em slack\/} --- a certain fraction of all
                 distances may be arbitrarily distorted. For metric
                 spaces of bounded doubling dimension (which have been
                 proposed as a reasonable abstraction of Internet
                 latencies), we show that triangulation-based distance
                 reconstruction with a constant number of beacons can
                 achieve multiplicative error $ 1 + \delta $ on a $ 1 -
                 \epsilon $ fraction of distances, for arbitrarily small
                 constants $ \delta $ and $ \epsilon $. For this same
                 class of metric spaces, we give a beacon-based
                 embedding algorithm that achieves constant distortion
                 on a $ 1 - \epsilon $ fraction of distances; this
                 provides some theoretical justification for the success
                 of the recent Global Network Positioning algorithm of
                 Ng and Zhang [2002], and it forms an interesting
                 contrast with lower bounds showing that it is not
                 possible to embed {\em all\/} distances in a doubling
                 metric space with constant distortion. We also give
                 results for other classes of metric spaces, as well as
                 distributed algorithms that require only a sparse set
                 of distances but do not place too much measurement load
                 on any one node.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "32",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Distributed algorithms; doubling dimension;
                 embeddings; metric spaces; triangulation",
}

@Article{Jain:2009:PQR,
  author =       "Rahul Jain and Jaikumar Radhakrishnan and Pranab Sen",
  title =        "A property of quantum relative entropy with an
                 application to privacy in quantum communication",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "6",
  pages =        "33:1--33:32",
  month =        sep,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1568318.1568323",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 4 13:33:31 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We prove the following information-theoretic property
                 about quantum states.\par

                 {\em Substate theorem:\/} Let $ \rho $ and $ \sigma $
                 be quantum states in the same Hilbert space with
                 relative entropy $ S(\rho || \sigma) : T r \rho (\log
                 \rho - \log \sigma) = c $. Then for all $ \epsilon > 0
                 $, there is a state $ \rho \prime $ such that the trace
                 distance $ || \rho \prime - \rho ||_{\rm tr} : T r
                 \sqrt (\rho \prime - \rho)^2 \leq \epsilon $, and $
                 \rho \prime / 2^{O(c / \epsilon 2)} \leq \sigma
                 $.\par

                 It states that if the relative entropy of $ \rho $ and
                 $ \sigma $ is small, then there is a state $ \rho
                 \prime $ close to $ \rho $, i.e. with small trace
                 distance $ || \rho \prime - \rho ||_{\rm tr} $, that
                 when scaled down by a factor $ 2^{O(c)} $ `sits
                 inside', or becomes a `substate' of, $ \sigma $. This
                 result has several applications in quantum
                 communication complexity and cryptography. Using the
                 substate theorem, we derive a privacy trade-off for the
                 {\em set membership problem\/} in the two-party quantum
                 communication model. Here Alice is given a subset $ A
                 \subseteq [n] $, Bob an input $ i \in [n] $, and they
                 need to determine if $ i \in A $.\par

                 {\em Privacy trade-off for set membership:\/} In any
                 two-party quantum communication protocol for the set
                 membership problem, if Bob reveals only $k$ bits of
                 information about his input, then Alice must reveal at
                 least $ n / 2^{O(k)}$ bits of information about her
                 input.\par

                 We also discuss relationships between various
                 information theoretic quantities that arise naturally
                 in the context of the substate theorem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "33",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Privacy; quantum communication complexity; quantum
                 information theory",
}

@Article{Regev:2009:LLE,
  author =       "Oded Regev",
  title =        "On lattices, learning with errors, random linear
                 codes, and cryptography",
  journal =      j-J-ACM,
  volume =       "56",
  number =       "6",
  pages =        "34:1--34:40",
  month =        sep,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1568318.1568324",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Sep 4 13:33:31 MDT 2009",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Our main result is a reduction from worst-case lattice
                 problems such as GapSVP and SIVP to a certain learning
                 problem. This learning problem is a natural extension
                 of the ``learning from parity with error'' problem to
                 higher moduli. It can also be viewed as the problem of
                 decoding from a random linear code. This, we believe,
                 gives a strong indication that these problems are hard.
                 Our reduction, however, is quantum. Hence, an efficient
                 solution to the learning problem implies a {\em
                 quantum\/} algorithm for GapSVP and SIVP. A main open
                 question is whether this reduction can be made
                 classical (i.e., nonquantum).\par

                 We also present a (classical) public-key cryptosystem
                 whose security is based on the hardness of the learning
                 problem. By the main result, its security is also based
                 on the worst-case quantum hardness of GapSVP and SIVP.
                 The new cryptosystem is much more efficient than
                 previous lattice-based cryptosystems: the public key is
                 of size $ \tilde {O}(n^2) $ and encrypting a message
                 increases its size by a factor of $ \tilde {O}(n) $ (in
                 previous cryptosystems these values are $ \tilde
                 {O}(n^4) $ and $ \tilde {O}(n^2) $, respectively). In
                 fact, under the assumption that all parties share a
                 random bit string of length $ \tilde {O}(n^2) $, the
                 size of the public key can be reduced to $ \tilde
                 {O}(n) $.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "34",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "average-case hardness; cryptography; Lattice; public
                 key encryption; quantum computation",
}

@Article{Arya:2009:STT,
  author =       "Sunil Arya and Theocharis Malamatos and David M.
                 Mount",
  title =        "Space-time tradeoffs for approximate nearest neighbor
                 searching",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "1",
  pages =        "1:1--1:54",
  month =        nov,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1613676.1613677",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:08 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Nearest neighbor searching is the problem of
                 preprocessing a set of $n$-point points in
                 $d$-dimensional space so that, given any query point
                 $q$, it is possible to report the closest point to $q$
                 rapidly. In approximate nearest neighbor searching, a
                 parameter $ \epsilon > 0$ is given, and a
                 multiplicative error of $ (1 + \epsilon)$ is allowed.
                 We assume that the dimension $d$ is a constant and
                 treat $n$ and $ \epsilon $ as asymptotic quantities.
                 Numerous solutions have been proposed, ranging from
                 low-space solutions having space $ O(n)$ and query time
                 $ O(\log n + 1 / \epsilon^{d - 1})$ to high-space
                 solutions having space roughly $ O(n \log n) /
                 \epsilon^d$ and query time $ O(\log (n /
                 \epsilon))$.\par

                 We show that there is a single approach to this
                 fundamental problem, which both improves upon existing
                 results and spans the spectrum of space-time tradeoffs.
                 Given a tradeoff parameter $ \gamma $, where $ 2 \leq
                 \gamma \leq 1 / \epsilon $, we show that there exists a
                 data structure of space $ O(n \gamma^{d - 1} \log (1 /
                 \epsilon))$ that can answer queries in time $ O(\log (n
                 \gamma) + 1 / (\epsilon \gamma)^{d - 1 / 2})$. When $
                 \gamma = 2$, this yields a data structure of space $
                 O(n \log (1 / \epsilon))$ that can answer queries in
                 time $ O(\log (n + 1 / \epsilon^{(d - 1) / 2}))$. When
                 $ \gamma = 1 / \epsilon $, it provides a data structure
                 of space $ O((n / \epsilon^{(d - 1)}) \log (1 /
                 \epsilon))$ that can answer queries in time $ O (\log
                 (n / \epsilon))$.\par

                 Our results are based on a data structure called a $
                 (t, \epsilon)$-AVD, which is a hierarchical
                 quadtree-based subdivision of space into cells. Each
                 cell stores up to $t$ representative points of the set,
                 such that for any query point $q$ in the cell at least
                 one of these points is an approximate nearest neighbor
                 of $q$. We provide new algorithms for constructing AVDs
                 and tools for analyzing their total space requirements.
                 We also establish lower bounds on the space complexity
                 of AVDs, and show that, up to a factor of $ O (\log (1
                 / \epsilon))$, our space bounds are asymptotically
                 tight in the two extremes, $ \gamma = 2$ and $ \gamma =
                 1 / \epsilon $.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "1",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Nearest neighbor searching; space-time tradeoffs",
}

@Article{Ezra:2009:UFT,
  author =       "Esther Ezra and Micha Sharir",
  title =        "On the union of fat tetrahedra in three dimensions",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "1",
  pages =        "2:1--2:23",
  month =        nov,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1613676.1613678",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:08 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We show that the combinatorial complexity of the union
                 of $n$ ``fat'' tetrahedra in 3-space (i.e., tetrahedra
                 all of whose solid angles are at least some fixed
                 constant) of arbitrary sizes, is $ O(n^{2 + \epsilon
                 })$, for any $ \epsilon > 0$;the bound is almost tight
                 in the worst case, thus almost settling a conjecture of
                 Pach et al. [2003]. Our result extends, in a
                 significant way, the result of Pach et al. [2003] for
                 the restricted case of {\em nearly congruent cubes}.
                 The analysis uses cuttings, combined with the
                 Dobkin-Kirkpatrick hierarchical decomposition of convex
                 polytopes, in order to partition space into subcells,
                 so that, on average, the overwhelming majority of the
                 tetrahedra intersecting a subcell $ \Delta $ behave as
                 fat {\em dihedral\/} wedges in $ \Delta $. As an
                 immediate corollary, we obtain that the combinatorial
                 complexity of the union of $n$ cubes in $ R^3$, having
                 arbitrary side lengths, is $ O(n^{2 + \epsilon })$, for
                 any $ \epsilon > 0$ (again, significantly extending the
                 result of Pach et al. [2003]). Finally, our analysis
                 can easily be extended to yield a nearly quadratic
                 bound on the complexity of the union of arbitrarily
                 oriented fat triangular prisms (whose cross-sections
                 have arbitrary sizes) in $ R^3$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "2",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "(1 / r)-cuttings; curve-sensitive cuttings;
                 hierarchical decomposition of convex polytopes; Union
                 of simply-shaped bodies",
}

@Article{Katz:2009:ESA,
  author =       "Jonathan Katz and Rafail Ostrovsky and Moti Yung",
  title =        "Efficient and secure authenticated key exchange using
                 weak passwords",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "1",
  pages =        "3:1--3:39",
  month =        nov,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1613676.1613679",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:08 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Mutual authentication and authenticated key exchange
                 are fundamental techniques for enabling secure
                 communication over public, insecure networks. It is
                 well known how to design secure protocols for achieving
                 these goals when parties share {\em high-entropy\/}
                 cryptographic keys in advance of the authentication
                 stage. Unfortunately, it is much more common for users
                 to share weak, {\em low-entropy\/} passwords which
                 furthermore may be chosen from a known space of
                 possibilities (say, a dictionary of English words). In
                 this case, the problem becomes much more difficult as
                 one must ensure that protocols are immune to {\em
                 off-line dictionary attacks\/} in which an adversary
                 exhaustively enumerates all possible passwords in an
                 attempt to determine the correct one.\par

                 We propose a 3-round protocol for password-only
                 authenticated key exchange, and provide a rigorous
                 proof of security for our protocol based on the
                 decisional Diffie--Hellman assumption. The protocol
                 assumes only public parameters --- specifically, a
                 ``common reference string'' --- which can be
                 ``hard-coded'' into an implementation of the protocol;
                 in particular, and in contrast to some previous work,
                 our protocol does {\em not\/} require either party to
                 pre-share a public key. The protocol is also remarkably
                 efficient, requiring computation only (roughly) 4 times
                 greater than ``classical'' Diffie--Hellman key exchange
                 that provides no authentication at all. Ours is the
                 first protocol for password-only authentication that is
                 both {\em practical\/} and {\em provably-secure using
                 standard cryptographic assumptions}.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "3",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Authentication; cryptography; passwords",
}

@Article{Ferragina:2009:CIL,
  author =       "Paolo Ferragina and Fabrizio Luccio and Giovanni
                 Manzini and S. Muthukrishnan",
  title =        "Compressing and indexing labeled trees, with
                 applications",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "1",
  pages =        "4:1--4:33",
  month =        nov,
  year =         "2009",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1613676.1613680",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:08 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Consider an ordered, static tree $T$ where each node
                 has a label from alphabet $ \Sigma $. Tree $T$ may be
                 of arbitrary degree and shape. Our goal is designing a
                 compressed storage scheme of $T$ that supports basic
                 {\em navigational\/} operations among the immediate
                 neighbors of a node (i.e. parent, {\em i\/} th child,
                 or any child with some label,\ldots{}) as well as more
                 sophisticated {\em path\/}-based search operations over
                 its labeled structure.\par

                 We present a novel approach to this problem by
                 designing what we call the XBW-transform of the tree in
                 the spirit of the well-known Burrows--Wheeler transform
                 for strings [1994]. The XBW-transform uses path-sorting
                 to linearize the labeled tree $T$ into {\em two\/}
                 coordinated arrays, one capturing the structure and the
                 other the labels. For the first time, by using the
                 properties of the XBW-transform, our compressed indexes
                 go beyond the information-theoretic lower bound, and
                 support navigational and path-search operations over
                 labeled trees within (near-)optimal time bounds and
                 entropy-bounded space.\par

                 Our XBW-transform is simple and likely to spur new
                 results in the theory of tree compression and indexing,
                 as well as interesting application contexts. As an
                 example, we use the XBW-transform to design and
                 implement a compressed index for XML documents whose
                 compression ratio is significantly better than the one
                 achievable by state-of-the-art tools, and its query
                 time performance is order of magnitudes faster.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "4",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Burrows--Wheeler transform; labeled tree compression;
                 labeled tree indexing; path searching; tree navigation;
                 XML compression; XML indexing",
}

@Article{Kumar:2010:LTA,
  author =       "Amit Kumar and Yogish Sabharwal and Sandeep Sen",
  title =        "Linear-time approximation schemes for clustering
                 problems in any dimensions",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "2",
  pages =        "5:1--5:32",
  month =        jan,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1667053.1667054",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present a general approach for designing
                 approximation algorithms for a fundamental class of
                 geometric clustering problems in arbitrary dimensions.
                 More specifically, our approach leads to simple
                 randomized algorithms for the $k$-means, $k$-median and
                 discrete $k$-means problems that yield $ (1 +
                 \epsilon)$ approximations with probability $ \geq 1 /
                 2$ and running times of $ O(2^{(k / \epsilon) O(1)} d
                 n)$. These are the first algorithms for these problems
                 whose running times are linear in the size of the input
                 ($ n d$ for $n$ points in $d$ dimensions) assuming $k$
                 and $ \epsilon $ are fixed. Our method is general
                 enough to be applicable to clustering problems
                 satisfying certain simple properties and is likely to
                 have further applications.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "5",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "$k$-means; $k$-medians; approximation; Clustering",
}

@Article{Gottlob:2010:SMD,
  author =       "Georg Gottlob and Pierre Senellart",
  title =        "Schema mapping discovery from data instances",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "2",
  pages =        "6:1--6:37",
  month =        jan,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1667053.1667055",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We introduce a theoretical framework for discovering
                 relationships between two database instances over
                 distinct and unknown schemata. This framework is
                 grounded in the context of {\em data exchange}. We
                 formalize the problem of understanding the relationship
                 between two instances as that of obtaining a schema
                 mapping so that a {\em minimum repair\/} of this
                 mapping provides a perfect description of the target
                 instance given the source instance. We show that this
                 definition yields ``intuitive'' results when applied on
                 database instances derived from each other by basic
                 operations. We study the complexity of decision
                 problems related to this optimality notion in the
                 context of different logical languages and show that,
                 even in very restricted cases, the problem is of high
                 complexity.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "6",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "complexity; data exchange; instance; match; Schema
                 mapping",
}

@Article{Blei:2010:NCR,
  author =       "David M. Blei and Thomas L. Griffiths and Michael I.
                 Jordan",
  title =        "The nested {Chinese} restaurant process and {Bayesian}
                 nonparametric inference of topic hierarchies",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "2",
  pages =        "7:1--7:30",
  month =        jan,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1667053.1667056",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present the nested Chinese restaurant process
                 (nCRP), a stochastic process that assigns probability
                 distributions to ensembles of infinitely deep,
                 infinitely branching trees. We show how this stochastic
                 process can be used as a prior distribution in a
                 Bayesian nonparametric model of document collections.
                 Specifically, we present an application to information
                 retrieval in which documents are modeled as paths down
                 a random tree, and the preferential attachment dynamics
                 of the nCRP leads to clustering of documents according
                 to sharing of topics at multiple levels of abstraction.
                 Given a corpus of documents, a posterior inference
                 algorithm finds an approximation to a posterior
                 distribution over trees, topics and allocations of
                 words to levels of the tree. We demonstrate this
                 algorithm on collections of scientific abstracts from
                 several journals. This model exemplifies a recent trend
                 in statistical machine learning --- the use of Bayesian
                 nonparametric methods to infer distributions on
                 flexible data structures.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "7",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Bayesian nonparametric statistics; unsupervised
                 learning",
}

@Article{Lenzen:2010:TBC,
  author =       "Christoph Lenzen and Thomas Locher and Roger
                 Wattenhofer",
  title =        "Tight bounds for clock synchronization",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "2",
  pages =        "8:1--8:42",
  month =        jan,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1667053.1667057",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present a novel clock synchronization algorithm and
                 prove tight upper and lower bounds on the worst-case
                 clock skew that may occur between any two participants
                 in any given distributed system. More importantly, the
                 worst-case clock skew between neighboring nodes is
                 (asymptotically) at most a factor of two larger than
                 the best possible bound. While previous results solely
                 focused on the dependency of the skew bounds on the
                 network diameter, we prove that our techniques are
                 optimal also with respect to the maximum clock drift,
                 the uncertainty in message delays, and the imposed
                 bounds on the clock rates. The presented results all
                 hold in a general model where both the clock drifts and
                 the message delays may vary arbitrarily within
                 pre-specified bounds.\par

                 Furthermore, our algorithm exhibits a number of other
                 highly desirable properties. First, the algorithm
                 ensures that the clock values remain in an affine
                 linear envelope of real time. A better worst-case bound
                 on the accuracy with respect to real time cannot be
                 achieved in the absence of an external timer. Second,
                 the algorithm minimizes the number and size of messages
                 that need to be exchanged in a given time period.
                 Moreover, only a small number of bits must be stored
                 locally for each neighbor. Finally, our algorithm can
                 easily be adapted for a variety of other prominent
                 synchronization models.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "8",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Bounded rates; global skew; gradient property; local
                 skew; variable clock drifts; worst-case analysis",
}

@Article{Bodirsky:2010:CTC,
  author =       "Manuel Bodirsky and Jan K{\'a}ra",
  title =        "The complexity of temporal constraint satisfaction
                 problems",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "2",
  pages =        "9:1--9:41",
  month =        jan,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1667053.1667058",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A {\em temporal constraint language\/} is a set of
                 relations that has a first-order definition in(Q;$<$),
                 the dense linear order of the rational numbers. We
                 present a complete complexity classification of the
                 constraint satisfaction problem (CSP) for temporal
                 constraint languages: if the constraint language is
                 contained in one out of nine temporal constraint
                 languages, then the CSP can be solved in polynomial
                 time; otherwise, the CSP is NP-complete. Our proof
                 combines model-theoretic concepts with techniques from
                 universal algebra, and also applies the so-called
                 product Ramsey theorem, which we believe will useful in
                 similar contexts of constraint satisfaction complexity
                 classification.\par

                 An extended abstract of this article appeared in the
                 proceedings of STOC'08.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "9",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "algorithms; complexity; constraints; Logic",
}

@Article{Fisher:2010:NDD,
  author =       "Kathleen Fisher and Yitzhak Mandelbaum and David
                 Walker",
  title =        "The next 700 data description languages",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "2",
  pages =        "10:1--10:51",
  month =        jan,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1667053.1667059",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In the spirit of Landin, we present a calculus of
                 dependent types to serve as the semantic foundation for
                 a family of languages called {\em data description
                 languages}. Such languages, which include pads,
                 datascript, and packettypes, are designed to facilitate
                 programming with {\em ad hoc data}, that is, data not
                 in well-behaved relational or xml formats. In the
                 calculus, each type describes the physical layout and
                 semantic properties of a data source. In the semantics,
                 we interpret types simultaneously as the in-memory
                 representation of the data described and as parsers for
                 the data source. The parsing functions are robust,
                 automatically detecting and recording errors in the
                 data stream without halting parsing. We show the
                 parsers are type-correct, returning data whose type
                 matches the simple-type interpretation of the
                 specification. We also prove the parsers are
                 ``error-correct,'' accurately reporting the number of
                 physical and semantic errors that occur in the returned
                 data. We use the calculus to describe the features of
                 various data description languages, and we discuss how
                 we have used the calculus to improve pads.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "10",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "ad hoc data formats; context-sensitive grammars; data
                 description languages; data processing; data-dependent
                 grammars; dependent types; domain-specific languages;
                 PADS; Parsing",
}

@Article{Moser:2010:CPG,
  author =       "Robin A. Moser and G{\'a}bor Tardos",
  title =        "A constructive proof of the general {Lov{\'a}sz} local
                 lemma",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "2",
  pages =        "11:1--11:15",
  month =        jan,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1667053.1667060",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Mar 15 11:20:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The Lov{\'a}sz Local Lemma discovered by Erd{\H{o}}s
                 and Lov{\'a}sz in 1975 is a powerful tool to
                 non-constructively prove the existence of combinatorial
                 objects meeting a prescribed collection of criteria. In
                 1991, J{\'o}zsef Beck was the first to demonstrate that
                 a constructive variant can be given under certain more
                 restrictive conditions, starting a whole line of
                 research aimed at improving his algorithm's performance
                 and relaxing its restrictions. In the present article,
                 we improve upon recent findings so as to provide a
                 method for making almost all known applications of the
                 general Local Lemma algorithmic.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "11",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Constructive proof; Lov{\'a} parallelization; sz local
                 lemma",
}

@Article{Vianu:2010:EJS,
  author =       "Victor Vianu",
  title =        "Editorial: {JACM} at the start of a new decade",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "3",
  pages =        "12:1--12:3",
  month =        mar,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1706591.1706592",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Mar 25 09:08:48 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "12",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Biswal:2010:EBS,
  author =       "Punyashloka Biswal and James R. Lee and Satish Rao",
  title =        "Eigenvalue bounds, spectral partitioning, and metrical
                 deformations via flows",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "3",
  pages =        "13:1--13:23",
  month =        mar,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1706591.1706593",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Mar 25 09:08:48 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present a new method for upper bounding the second
                 eigenvalue of the Laplacian of graphs. Our approach
                 uses multi-commodity flows to deform the geometry of
                 the graph; we embed the resulting metric into Euclidean
                 space to recover a bound on the Rayleigh quotient.
                 Using this, we show that every $n$-vertex graph of
                 genus $g$ and maximum degree $D$ satisfies $ \lambda_2
                 (G) = O((g + 1)^3 D / n)$. This recovers the $ O(D /
                 n)$ bound of Spielman and Teng for planar graphs, and
                 compares to Kelner's bound of $ O((g + 1)p o l y(D) /
                 n)$, but our proof does not make use of conformal
                 mappings or circle packings. We are thus able to extend
                 this to resolve positively a conjecture of Spielman and
                 Teng, by proving that $ \lambda_2 (G) = O(D h^6 \log h
                 / n)$ whenever $G$ is $ K_h$-minor free. This shows, in
                 particular, that spectral partitioning can be used to
                 recover $ O(\sqrt n)$-sized separators in bounded
                 degree graphs that exclude a fixed minor. We extend
                 this further by obtaining nearly optimal bounds on $
                 \lambda_2$ for graphs that exclude small-depth minors
                 in the sense of Plotkin, Rao, and Smith. Consequently,
                 we show that spectral algorithms find separators of
                 sublinear size in a general class of geometric
                 graphs.\par Moreover, while the standard ``sweep''
                 algorithm applied to the second eigenvector may fail to
                 find good quotient cuts in graphs of unbounded degree,
                 our approach produces a vector that works for {\em
                 arbitrary\/} graphs. This yields an alternate proof of
                 the well-known nonplanar separator theorem of Alon,
                 Seymour, and Thomas that states that every
                 excluded-minor family of graphs has $ O(\sqrt n)$-node
                 balanced separators.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "13",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Metric embeddings; network flows; spectral graph
                 theory",
}

@Article{Allender:2010:ALB,
  author =       "Eric Allender and Michal Kouck{\'y}",
  title =        "Amplifying lower bounds by means of
                 self-reducibility",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "3",
  pages =        "14:1--14:36",
  month =        mar,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1706591.1706594",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Mar 25 09:08:48 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We observe that many important computational problems
                 in NC$^1$ share a simple self-reducibility property. We
                 then show that, for any problem $A$ having this
                 self-reducibility property, $A$ has polynomial-size
                 TC$^0$ circuits if and only if it has TC$^0$ circuits
                 of size $ n^{1 + \epsilon }$ for every $ \epsilon > 0$
                 (counting the number of wires in a circuit as the size
                 of the circuit). As an example of what this observation
                 yields, consider the Boolean Formula Evaluation problem
                 (BFE), which is complete for NC$^1$ and has the
                 self-reducibility property. It follows from a lower
                 bound of Impagliazzo, Paturi, and Saks, that BFE
                 requires depth $d$ TC$^0$ circuits of size $ n^{1 +
                 \epsilon d}$. If one were able to improve this lower
                 bound to show that there is some constant $ \epsilon >
                 0$ (independent of the depth $d$) such that every
                 TC$^0$ circuit family recognizing BFE has size at least
                 $ n^{1 + \epsilon }$, then it would follow that TC$^0
                 \neq $ NC$^1$. We show that proving lower bounds of the
                 form $ n^{1 + \epsilon }$ is not ruled out by the
                 Natural Proof framework of Razborov and Rudich and
                 hence there is currently no known barrier for
                 separating classes such as ACC$^0$, TC$^0$ and NC$^1$
                 via existing ``natural'' approaches to proving circuit
                 lower bounds.\par

                 We also show that problems with small uniform
                 constant-depth circuits have algorithms that
                 simultaneously have small space and time bounds. We
                 then make use of known time-space tradeoff lower bounds
                 to show that SAT requires uniform depth $d$ TC$^0$ and
                 AC$^0$ [6] circuits of size $ n^{1 + c}$ for some
                 constant $c$ depending on $d$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "14",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Circuit complexity; lower bounds; natural proofs;
                 self-reducibility; time-space tradeoffs",
}

@Article{Shibuya:2010:GST,
  author =       "Tetsuo Shibuya",
  title =        "Geometric suffix tree: {Indexing} protein {$3$-D}
                 structures",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "3",
  pages =        "15:1--15:17",
  month =        mar,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1706591.1706595",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Mar 25 09:08:48 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Protein structure analysis is one of the most
                 important research issues in the post-genomic era, and
                 faster and more accurate index data structures for such
                 3-D structures are highly desired for research on
                 proteins. This article proposes a new data structure
                 for indexing protein 3-D structures. For strings, there
                 are many efficient indexing structures such as suffix
                 trees, but it has been considered very difficult to
                 design such sophisticated data structures against 3-D
                 structures like proteins. Our index structure is based
                 on the suffix tree and is called the geometric suffix
                 tree. By using the geometric suffix tree for a set of
                 protein structures, we can exactly search for all of
                 their substructures whose RMSDs (root mean square
                 deviations) or URMSDs (unit-vector root mean square
                 deviations) to a given query 3-D structure are not
                 larger than a given bound. Though there are $ O(N^2) $
                 substructures in a structure of size $N$, our data
                 structure requires only $ O(N)$ space for indexing all
                 the substructures. We propose an $ O(N^2)$ construction
                 algorithm for it, while a naive algorithm would require
                 $ O(N^3)$ time to construct it. Moreover we propose an
                 efficient search algorithm. Experiments show that we
                 can search for similar structures much faster than
                 previous algorithms if the RMSD threshold is not larger
                 than 1{\AA}. The experiments also show that the
                 construction time of the geometric suffix tree is
                 practically almost linear to the size of the database,
                 when applied to a protein structure database.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "15",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "protein 3-D structure; root mean square deviation;
                 Suffix tree",
}

@Article{Chan:2010:DDS,
  author =       "Timothy M. Chan",
  title =        "A dynamic data structure for {$3$-D} convex hulls and
                 {$2$-D} nearest neighbor queries",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "3",
  pages =        "16:1--16:15",
  month =        mar,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1706591.1706596",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Mar 25 09:08:48 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present a fully dynamic randomized data structure
                 that can answer queries about the convex hull of a set
                 of $n$ points in three dimensions, where insertions
                 take $ O(\log^3 n)$ expected amortized time, deletions
                 take $ O(\log^6 n)$ expected amortized time, and
                 extreme-point queries take $ O(\log^2 n)$ worst-case
                 time. This is the first method that guarantees
                 polylogarithmic update and query cost for arbitrary
                 sequences of insertions and deletions, and improves the
                 previous $ O(n^{\epsilon })$-time method by Agarwal and
                 Matou{\v{s}}ek a decade ago. As a consequence, we
                 obtain similar results for nearest neighbor queries in
                 two dimensions and improved results for numerous
                 fundamental geometric problems (such as levels in three
                 dimensions and dynamic Euclidean minimum spanning trees
                 in the plane).",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "16",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Computational geometry; convex hulls; dynamic data
                 structures; nearest neighbor search",
}

@Article{Nivasch:2010:IBN,
  author =       "Gabriel Nivasch",
  title =        "Improved bounds and new techniques for
                 {Davenport--Schinzel} sequences and their
                 generalizations",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "3",
  pages =        "17:1--17:44",
  month =        mar,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1706591.1706597",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Mar 25 09:08:48 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present several new results regarding $
                 \lambda_s(n) $, the maximum length of a
                 Davenport--Schinzel sequence of order $s$ on $n$
                 distinct symbols.\par

                 First, we prove that $ \lambda_s(n) \leq n \cdot 2^{(1
                 / t!) \alpha (n) t} + O(\alpha (n)^{t - 1})$ for $ s
                 \geq 4$ even, and $ \lambda_s(n) \leq n \cdot 2^{(1 /
                 t!) \alpha (n) t} \log_2 \alpha (n) + O(\alpha (n)^t)$
                 for $ s \geq 3$ odd, where $ t = \lfloor (s - 2) / 2
                 \rfloor $, and $ \alpha (n)$ denotes the inverse
                 Ackermann function. The previous upper bounds, by
                 Agarwal et al. [1989], had a leading coefficient of $1$
                 instead of $ 1 / t!$ in the exponent. The bounds for
                 even $s$ are now tight up to lower-order terms in the
                 exponent. These new bounds result from a small
                 improvement on the technique of Agarwal et al.\par

                 More importantly, we also present a new technique for
                 deriving upper bounds for $ \lambda_s(n)$. This new
                 technique is very similar to the one we applied to the
                 problem of stabbing interval chains [Alon et al. 2008].
                 With this new technique we: (1) re-derive the upper
                 bound of $ \lambda_3 (n) \leq 2 n \alpha (n) + O(n
                 \sqrt \alpha (n))$ (first shown by Klazar [1999]); (2)
                 re-derive our own new upper bounds for general $s$ and
                 (3) obtain improved upper bounds for the generalized
                 Davenport--Schinzel sequences considered by Adamec et
                 al. [1992].\par

                 Regarding lower bounds, we show that $ \lambda_3 (n)
                 \geq 2 n \alpha (n) - O(n)$ (the previous lower bound
                 (Sharir and Agarwal, 1995) had a coefficient of $ 1 /
                 2$), so the coefficient $2$ is tight. We also present a
                 simpler variant of the construction of Agarwal et al.
                 [1989] that achieves the known lower bounds of $
                 \lambda_s(n) \geq n \cdot 2^{(1 / t!)} \alpha (n) t -
                 O(\alpha (n)^{t - 1})$ for $ s \geq 4$ even.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "17",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Davenport--Schinzel sequence; inverse Ackermann
                 function; lower envelope",
}

@Article{TenCate:2010:TCL,
  author =       "Balder {Ten Cate} and Luc Segoufin",
  title =        "Transitive closure logic, and nested tree walking
                 automata, and {Xpath}",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "3",
  pages =        "18:1--18:41",
  month =        mar,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1706591.1706598",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Mar 25 09:08:48 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study FO(MTC), first-order logic with monadic
                 transitive closure, a logical formalism in between FO
                 and MSO on trees. We characterize the expressive power
                 of FO(MTC) in terms of nested tree-walking automata.
                 Using the latter, we show that FO(MTC) is strictly less
                 expressive than MSO, solving an open problem. We also
                 present a temporal logic on trees that is expressively
                 complete for FO(MTC), in the form of an extension of
                 the XML document navigation language XPath with two
                 operators: the Kleene star for taking the transitive
                 closure of path expressions, and a subtree
                 relativisation operator, allowing one to restrict
                 attention to a specific subtree while evaluating a
                 subexpression. We show that the expressive power of
                 this XPath dialect equals that of FO(MTC) for Boolean,
                 unary and binary queries. We also investigate the
                 complexity of the automata model as well as the XPath
                 dialect. We show that query evaluation be done in
                 polynomial time (combined complexity), but that
                 emptiness (or, satisfiability) is 2ExpTime-complete.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "18",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Transitive closure logic; tree automata; XPath",
}

@Article{Balcan:2010:DMS,
  author =       "Maria-Florina Balcan and Avrim Blum",
  title =        "A discriminative model for semi-supervised learning",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "3",
  pages =        "19:1--19:46",
  month =        mar,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1706591.1706599",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Mar 25 09:08:48 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Supervised learning --- that is, learning from labeled
                 examples --- is an area of Machine Learning that has
                 reached substantial maturity. It has generated
                 general-purpose and practically successful algorithms
                 and the foundations are quite well understood and
                 captured by theoretical frameworks such as the
                 PAC-learning model and the Statistical Learning theory
                 framework. However, for many contemporary practical
                 problems such as classifying web pages or detecting
                 spam, there is often additional information available
                 in the form of {\em unlabeled\/} data, which is often
                 much cheaper and more plentiful than labeled data. As a
                 consequence, there has recently been substantial
                 interest in {\em semi-supervised\/} learning --- using
                 unlabeled data together with labeled data --- since any
                 useful information that reduces the amount of labeled
                 data needed can be a significant benefit. Several
                 techniques have been developed for doing this, along
                 with experimental results on a variety of different
                 learning problems. Unfortunately, the standard learning
                 frameworks for reasoning about supervised learning do
                 not capture the key aspects and the assumptions
                 underlying these {\em semi\/}-supervised learning
                 methods.\par

                 In this article, we describe an augmented version of
                 the PAC model designed for semi-supervised learning,
                 that can be used to reason about many of the different
                 approaches taken over the past decade in the Machine
                 Learning community. This model provides a unified
                 framework for analyzing when and why unlabeled data can
                 help, in which one can analyze both sample-complexity
                 and algorithmic issues. The model can be viewed as an
                 extension of the standard PAC model where, in addition
                 to a concept class $C$, one also proposes a
                 compatibility notion: a type of compatibility that one
                 believes the target concept should have with the
                 underlying distribution of data. Unlabeled data is then
                 potentially helpful in this setting because it allows
                 one to estimate compatibility over the space of
                 hypotheses, and to reduce the size of the search space
                 from the whole set of hypotheses $C$ down to those
                 that, according to one's assumptions, are a-priori
                 reasonable with respect to the distribution. As we
                 show, many of the assumptions underlying existing
                 semi-supervised learning algorithms can be formulated
                 in this framework.\par

                 After proposing the model, we then analyze
                 sample-complexity issues in this setting: that is, how
                 much of each type of data one should expect to need in
                 order to learn well, and what the key quantities are
                 that these numbers depend on. We also consider the
                 algorithmic question of how to efficiently optimize for
                 natural classes and compatibility notions, and provide
                 several algorithmic results including an improved bound
                 for Co-Training with linear separators when the
                 distribution satisfies independence given the label.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "19",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "co-training; cover bounds; data dependent SRM;
                 efficient learning algorithms; Machine learning;
                 multi-view classification; sample complexity;
                 semi-supervised learning; structural risk minimization
                 (SRM); uniform convergence bounds; value of unlabeled
                 data",
}

@Article{Barak:2010:SIN,
  author =       "B. Barak and G. Kindler and R. Shaltiel and B. Sudakov
                 and A. Wigderson",
  title =        "Simulating independence: {New} constructions of
                 condensers, {Ramsey} graphs, dispersers, and
                 extractors",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "4",
  pages =        "20:1--20:52",
  month =        apr,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1734213.1734214",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 29 13:26:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present new explicit constructions of {\em
                 deterministic\/} randomness extractors, dispersers and
                 related objects. We say that a distribution $X$ on
                 binary strings of length $n$ is a $ \delta $-source if
                 $X$ assigns probability at most $ 2^{- \delta n}$ to
                 any string of length $n$. For every $ \delta > 0$, we
                 construct the following $ \poly (n)$-time computable
                 functions:\par

                 {\em 2-source disperser:\/} $ D : (\{ 0, 1 \}^n)^2
                 \rightarrow \{ 0, 1 \} $ such that for any two
                 independent $ \delta $-sources $ X_1$, $ X_2$ we have
                 that the support of $ D(X_1, X_2)$ is $ \{ 0, 1 \}
                 $.\par

                 {\em Bipartite Ramsey graph:\/} Let $ n = 2^n$. A
                 corollary is that the function $D$ is a 2-coloring of
                 the edges of $ K_{N, N}$ (the complete bipartite graph
                 over two sets of $n$ vertices) such that any induced
                 subgraph of size $ n^\delta $ by $ N^\delta $ is not
                 monochromatic.\par

                 {\em 3-source extractor:\/} $ E : (\{ 0, 1 \}^n)^3
                 \rightarrow \{ 0, 1 \} $ such that for any three
                 independent $ \delta $-sources $ X_1$, $ X_2$, $ X_3$
                 we have that $ E(X_1, X_2, X_3)$ is $ o(1)$-close to
                 being an unbiased random bit.\par

                 No previous explicit construction was known for either
                 of these for any $ \delta $.\par

                 A component in these results is a new construction of
                 condensers that may be of independent interest: This is
                 a function $ C : \{ 0, 1 \}^n \rightarrow (\{ 0, 1
                 \}^{n / c})^d$ (where $c$ and $d$ are constants that
                 depend only on $ \delta $) such that for every $ \delta
                 $-source $X$ one of the output blocks of $ C(X)$ is
                 (exponentially close to) a 0.9-source. (This result was
                 obtained independently by Ran Raz.)\par

                 The constructions are quite involved and use as
                 building blocks other new and known objects. A
                 recurring theme in these constructions is that objects
                 that were designed to work with independent inputs,
                 sometimes perform well enough with correlated, high
                 entropy inputs.\par

                 The construction of the disperser is based on a new
                 technique which we call ``the challenge-response
                 mechanism'' that (in some sense) allows ``identifying
                 high entropy regions'' in a given pair of sources using
                 only one sample from the two sources.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "20",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Condensers; Dispersers; Explicit constructions;
                 Extractors; Ramsey graphs",
}

@Article{Chan:2010:ULD,
  author =       "T.-H. Hubert Chan and Anupam Gupta and Kunal Talwar",
  title =        "Ultra-low-dimensional embeddings for doubling
                 metrics",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "4",
  pages =        "21:1--21:26",
  month =        apr,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1734213.1734215",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 29 13:26:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We consider the problem of embedding a metric into
                 low-dimensional Euclidean space. The classical theorems
                 of Bourgain, and of Johnson and Lindenstrauss say that
                 any metric on $n$ points embeds into an $ O(\log
                 n)$-dimensional Euclidean space with $ O(\log n)$
                 distortion. Moreover, a simple ``volume'' argument
                 shows that this bound is nearly tight: a uniform metric
                 on $n$ points requires nearly logarithmic number of
                 dimensions to embed with logarithmic distortion. It is
                 natural to ask whether such a volume restriction is the
                 only hurdle to low-dimensional embeddings. In other
                 words, do {\em doubling\/} metrics, that do not have
                 large uniform submetrics, and thus no volume hurdles to
                 low dimensional embeddings, embed in low dimensional
                 Euclidean spaces with small distortion?\par

                 In this article, we give a positive answer to this
                 question. We show how to embed any doubling metrics
                 into $ O(\log \log n)$ dimensions with $ O(\log n)$
                 distortion. This is the first embedding for doubling
                 metrics into fewer than logarithmic number of
                 dimensions, even allowing for logarithmic
                 distortion.\par

                 This result is one extreme point of our general
                 trade-off between distortion and dimension: given an
                 $n$-point metric $ (V, d)$ with doubling dimension $
                 \dim_D$, and any target dimension $T$ in the range $
                 \Omega (\dim_D \log \log n) \leq T \leq O(\log n)$, we
                 show that the metric embeds into Euclidean space $
                 \mathbb {R}^T$ with $ O(\log n \sqrt {\dim_D / T})$
                 distortion.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "21",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "dimension reduction; Euclidean embedding; Metric
                 spaces",
}

@Article{Fauconnier:2010:TFD,
  author =       "Carole Delporte-Gallet Hugues Fauconnier and Rachid
                 Guerraoui",
  title =        "Tight failure detection bounds on atomic object
                 implementations",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "4",
  pages =        "22:1--22:32",
  month =        apr,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1734213.1734216",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 29 13:26:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article determines the weakest failure detectors
                 to implement shared atomic objects in a distributed
                 system with crash-prone processes. We first determine
                 the weakest failure detector for the basic register
                 object. We then use that to determine the weakest
                 failure detector for all popular atomic objects
                 including test-and-set, fetch-and-add, queue, consensus
                 and compare-and-swap, which we show is the same.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "22",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Atomic objects; failure detection",
}

@Article{Pacholski:2010:SCP,
  author =       "Witold Charatonik Leszek Pacholski",
  title =        "Set constraints with projections",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "4",
  pages =        "23:1--23:37",
  month =        apr,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1734213.1734217",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 29 13:26:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Set constraints form a constraint system where
                 variables range over the domain of sets of trees. They
                 give a natural formalism for many problems in program
                 analysis. Syntactically, set constraints are
                 conjunctions of inclusions between expressions built
                 over variables, constructors (constants and function
                 symbols from a given signature) and a choice of set
                 operators that defines the specific class of set
                 constraints. In this article, we are interested in the
                 class of {\em set constraints with projections}, which
                 is the class with all Boolean operators (union,
                 intersection and complement) and {\em projections\/}
                 that in program analysis directly correspond to type
                 destructors. We prove that the problem of existence of
                 a solution of a system of set constraints with
                 projections is in NEXPTIME, and thus that it is
                 NEXPTIME-complete.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "23",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Computational complexity; program analysis; set
                 constraints",
}

@Article{Chebolu:2010:FMM,
  author =       "Prasad Chebolu and Alan Frieze and P'all Melsted",
  title =        "Finding a maximum matching in a sparse random graph in
                 $ {O}(n) $ expected time",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "4",
  pages =        "24:1--24:27",
  month =        apr,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1734213.1734218",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 29 13:26:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present a linear expected time algorithm for
                 finding maximum cardinality matchings in sparse random
                 graphs. This is optimal and improves on previous
                 results by a logarithmic factor.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "24",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "matching; Random graphs",
}

@Article{Dolev:2010:RBC,
  author =       "Shlomi Dolev and Yuval Elovici and Rami Puzis",
  title =        "Routing betweenness centrality",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "4",
  pages =        "25:1--25:27",
  month =        apr,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1734213.1734219",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 29 13:26:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Betweenness-Centrality measure is often used in social
                 and computer communication networks to estimate the
                 potential monitoring and control capabilities a vertex
                 may have on data flowing in the network. In this
                 article, we define the Routing Betweenness Centrality
                 (RBC) measure that generalizes previously well known
                 Betweenness measures such as the Shortest Path
                 Betweenness, Flow Betweenness, and Traffic Load
                 Centrality by considering network flows created by
                 arbitrary loop-free routing strategies.\par

                 We present algorithms for computing RBC of all the
                 individual vertices in the network and algorithms for
                 computing the RBC of a given group of vertices, where
                 the RBC of a group of vertices represents their
                 potential to collaboratively monitor and control data
                 flows in the network. Two types of collaborations are
                 considered: (i) conjunctive --- the group is a
                 sequences of vertices controlling traffic where all
                 members of the sequence process the traffic in the
                 order defined by the sequence and (ii) disjunctive ---
                 the group is a set of vertices controlling traffic
                 where at least one member of the set processes the
                 traffic. The algorithms presented in this paper also
                 take into consideration different sampling rates of
                 network monitors, accommodate arbitrary communication
                 patterns between the vertices (traffic matrices), and
                 can be applied to groups consisting of vertices and/or
                 edges.\par

                 For the cases of routing strategies that depend on both
                 the source and the target of the message, we present
                 algorithms with time complexity of $ O(n^2 m) $ where
                 $n$ is the number of vertices in the network and $m$ is
                 the number of edges in the routing tree (or the routing
                 directed acyclic graph (DAG) for the cases of
                 multi-path routing strategies). The time complexity can
                 be reduced by an order of $n$ if we assume that the
                 routing decisions depend solely on the target of the
                 messages.\par

                 Finally, we show that a preprocessing of $ O(n^2 m)$
                 time, supports computations of RBC of sequences in $
                 O(k n)$ time and computations of RBC of sets in $ O(n^3
                 n)$ time, where $k$ in the number of vertices in the
                 sequence or the set.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "25",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Betwenness; centrality; communication networks;
                 probabilistic routing",
}

@Article{Altman:2010:AAP,
  author =       "Alon Altman and Moshe Tennenholtz",
  title =        "An axiomatic approach to personalized ranking
                 systems",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "4",
  pages =        "26:1--26:35",
  month =        apr,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1734213.1734220",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 29 13:26:36 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Personalized ranking systems and trust systems are an
                 essential tool for collaboration in a multi-agent
                 environment. In these systems, trust relations between
                 many agents are aggregated to produce a personalized
                 trust rating of the agents. In this article, we
                 introduce the first extensive axiomatic study of this
                 setting, and explore a wide array of well-known and new
                 personalized ranking systems. We adapt several axioms
                 (basic criteria) from the literature on global ranking
                 systems to the context of personalized ranking systems,
                 and fully classify the set of systems that satisfy all
                 of these axioms. We further show that all these axioms
                 are necessary for this result.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "26",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Axiomatic approach; manipulation; ranking systems;
                 social networks",
}

@Article{Mandow:2010:MSC,
  author =       "Lawrence Mandow and Jos{\'e} Luis {P{\'e}rez De La
                 Cruz}",
  title =        "Multiobjective {$ A^* $} search with consistent
                 heuristics",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "5",
  pages =        "27:1--27:25",
  month =        jun,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1754399.1754400",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jun 23 14:39:04 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The article describes and analyzes NAMOA$^*$, an
                 algorithm for multiobjective heuristic graph search
                 problems. The algorithm is presented as an extension of
                 A$^*$, an admissible scalar shortest path algorithm.
                 Under consistent heuristics A$^*$ is known to improve
                 its efficiency with more informed heuristics, and to be
                 optimal over the class of admissible algorithms in
                 terms of the set of expanded nodes and the number of
                 node expansions. Equivalent beneficial properties are
                 shown to prevail in the new algorithm.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "27",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "Consistent heuristics; multiobjective search;
                 optimality",
}

@Article{Braverman:2010:PIF,
  author =       "Mark Braverman",
  title =        "Polylogarithmic independence fools {$ A C^0 $}
                 circuits",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "5",
  pages =        "28:1--28:10",
  month =        jun,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1754399.1754401",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jun 23 14:39:04 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We prove that poly-sized $ A C^0 $ circuits cannot
                 distinguish a polylogarithmically independent
                 distribution from the uniform one. This settles the
                 1990 conjecture by Linial and Nisan [1990]. The only
                 prior progress on the problem was by Bazzi [2007], who
                 showed that $ O(\log^2 n)$-independent distributions
                 fool poly-size DNF formulas. [Razborov 2008] has later
                 given a much simpler proof for Bazzi's theorem.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "28",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "circuit complexity; lower bounds; polynomial
                 approximations; pseudorandomness",
}

@Article{Moshkovitz:2010:TQP,
  author =       "Dana Moshkovitz and Ran Raz",
  title =        "Two-query {PCP} with subconstant error",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "5",
  pages =        "29:1--29:29",
  month =        jun,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1754399.1754402",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jun 23 14:39:04 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We show that the NP-Complete language 3Sat has a PCP
                 verifier that makes two queries to a proof of
                 almost-linear size and achieves subconstant probability
                 of error $ \epsilon = o(1) $. The verifier performs
                 only projection tests, meaning that the answer to the
                 first query determines at most one accepting answer to
                 the second query. The number of bits representing a
                 symbol in the proof depends only on the error $
                 \epsilon $. Previously, by the parallel repetition
                 theorem, there were PCP Theorems with two-query
                 projection tests, but only (arbitrarily small) {\em
                 constant\/} error and {\em polynomial\/} size. There
                 were also PCP Theorems with {\em subconstant\/} error
                 and {\em almost-linear\/} size, but a constant number
                 of queries that is {\em larger\/} than 2.\par

                 As a corollary, we obtain a host of new results. In
                 particular, our theorem improves many of the hardness
                 of approximation results that are proved using the
                 parallel repetition theorem. A partial list includes
                 the following:\par

                 (1) 3Sat cannot be efficiently approximated to within a
                 factor of $ 7 / 8 + o(1) $, unless P = NP. This holds
                 even under almost-linear reductions. Previously, the
                 best known NP-hardness factor was $ 7 / 8 + \epsilon $
                 for any constant $ \epsilon > 0 $, under polynomial
                 reductions (H{\aa}stad).\par

                 (2) 3Lin cannot be efficiently approximated to within a
                 factor of $ 1 / 2 + o(1) $, unless P = NP. This holds
                 even under almost-linear reductions. Previously, the
                 best known NP-hardness factor was $ 1 / 2 + \epsilon $
                 for any constant $ \epsilon > 0 $, under polynomial
                 reductions (H{\aa}stad).\par

                 (3) A PCP Theorem with amortized query complexity $ 1 +
                 o(1) $ and amortized free bit complexity $ o(1) $.
                 Previously, the best-known amortized query complexity
                 and free bit complexity were $ 1 + \epsilon $ and $
                 \epsilon $, respectively, for any constant $ \epsilon >
                 0 $ (Samorodnitsky and Trevisan).\par

                 One of the new ideas that we use is a new technique for
                 doing the {\em composition\/} step in the (classical)
                 proof of the PCP Theorem, without increasing the number
                 of queries to the proof. We formalize this as a
                 composition of new objects that we call {\em Locally
                 Decode/Reject Codes\/} (LDRC). The notion of LDRC was
                 implicit in several previous works, and we make it
                 explicit in this work. We believe that the formulation
                 of LDRCs and their construction are of independent
                 interest.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "29",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "composition; label cover; locally decode/reject code
                 (LDRC); probabilistically checkable proofs (PCP)",
}

@Article{Motik:2010:RDL,
  author =       "Boris Motik and Riccardo Rosati",
  title =        "Reconciling description logics and rules",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "5",
  pages =        "30:1--30:62",
  month =        jun,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1754399.1754403",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jun 23 14:39:04 MDT 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Description logics (DLs) and rules are formalisms that
                 emphasize different aspects of knowledge
                 representation: whereas DLs are focused on specifying
                 and reasoning about conceptual knowledge, rules are
                 focused on nonmonotonic inference. Many applications,
                 however, require features of both DLs and rules.
                 Developing a formalism that integrates DLs and rules
                 would be a natural outcome of a large body of research
                 in knowledge representation and reasoning of the last
                 two decades; however, achieving this goal is very
                 challenging and the approaches proposed thus far have
                 not fully reached it. In this paper, we present a
                 hybrid formalism of {\em MKNF$^+$ \/} {\em knowledge
                 bases}, which integrates DLs and rules in a coherent
                 semantic framework. Achieving seamless integration is
                 nontrivial, since DLs use an open-world assumption,
                 while the rules are based on a closed-world assumption.
                 We overcome this discrepancy by basing the semantics of
                 our formalism on the logic of minimal knowledge and
                 negation as failure (MKNF) by Lifschitz. We present
                 several algorithms for reasoning with MKNF$^+$
                 knowledge bases, each suitable to different kinds of
                 rules, and establish tight complexity bounds.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "30",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
  keywords =     "answer set programming; combined complexity; data
                 complexity; description logics",
}

@Article{Fagin:2010:SIS,
  author =       "Ronald Fagin and Alan Nash",
  title =        "The structure of inverses in schema mappings",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "6",
  pages =        "31:1--31:57",
  month =        oct,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1857914.1857915",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 23 11:02:30 MST 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A schema mapping is a specification that describes how
                 data structured under one schema (the source schema) is
                 to be transformed into data structured under a
                 different schema (the target schema). The notion of an
                 inverse of a schema mapping is subtle, because a schema
                 mapping may associate many target instances with each
                 source instance, and many source instances with each
                 target instance. In PODS 2006, Fagin defined a notion
                 of the inverse of a schema mapping. This notion is
                 tailored to the types of schema mappings that commonly
                 arise in practice (those specified by
                 ``source-to-target tuple-generating dependencies'', or
                 s-t tgds).",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "31",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vempala:2010:RSB,
  author =       "Santosh S. Vempala",
  title =        "A random-sampling-based algorithm for learning
                 intersections of halfspaces",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "6",
  pages =        "32:1--32:14",
  month =        oct,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1857914.1857916",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 23 11:02:30 MST 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We give an algorithm to learn an intersection of $k$
                 halfspaces in $ R_n$ whose normals span an
                 $l$-dimensional subspace. For any input distribution
                 with a logconcave density such that the bounding
                 hyperplanes of the $k$ halfspaces pass through its
                 mean, the algorithm $ (\ldots {}, \Delta)$-learns with
                 time and sample complexity bounded by $ (n k l / \ldots
                 {}) O(l) \log 1 / \ldots {} \Delta $. The hypothesis
                 found is an intersection of $ O(k \log (1 / \ldots
                 {}))$ halfspaces. This improves on Blum and Kannan's
                 algorithm for the uniform distribution over a ball, in
                 the time and sample complexity (previously doubly
                 exponential) and in the generality of the input
                 distribution.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "32",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Esparza:2010:NPA,
  author =       "Javier Esparza and Stefan Kiefer and Michael
                 Luttenberger",
  title =        "{Newtonian} program analysis",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "6",
  pages =        "33:1--33:47",
  month =        oct,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1857914.1857917",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 23 11:02:30 MST 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article presents a novel generic technique for
                 solving dataflow equations in interprocedural dataflow
                 analysis. The technique is obtained by generalizing
                 Newton's method for computing a zero of a
                 differentiable function to $ \omega $-continuous
                 semirings. Complete semilattices, the common program
                 analysis framework, are a special class of $ \omega
                 $-continuous semirings. We show that our generalized
                 method always converges to the solution, and requires
                 at most as many iterations as current methods based on
                 Kleene's fixed-point theorem. We also show that,
                 contrary to Kleene's method, Newton's method always
                 terminates for arbitrary idempotent and commutative
                 semirings.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "33",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hallgren:2010:LQC,
  author =       "Sean Hallgren and Cristopher Moore and Martin
                 R{\"o}tteler and Alexander Russell and Pranab Sen",
  title =        "Limitations of quantum coset states for graph
                 isomorphism",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "6",
  pages =        "34:1--34:33",
  month =        oct,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1857914.1857918",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Nov 23 11:02:30 MST 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It has been known for some time that graph isomorphism
                 reduces to the hidden subgroup problem (HSP). What is
                 more, most exponential speedups in quantum computation
                 are obtained by solving instances of the HSP. A common
                 feature of the resulting algorithms is the use of
                 quantum coset states, which encode the hidden subgroup.
                 An open question has been how hard it is to use these
                 states to solve graph isomorphism. It was recently
                 shown by Moore et al. [2005] that only an exponentially
                 small amount of information is available from one, or a
                 pair of coset states. A potential source of power to
                 exploit are entangled quantum measurements that act
                 jointly on many states at once.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "34",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2010:IAS,
  author =       "Victor Vianu",
  title =        "Invited articles section foreword",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "1",
  pages =        "1:1--1:1",
  month =        dec,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1870103.1870104",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 23 16:57:47 MST 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "1",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Evfimievski:2010:EP,
  author =       "Alexandre Evfimievski and Ronald Fagin and David
                 Woodruff",
  title =        "Epistemic privacy",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "1",
  pages =        "2:1--2:45",
  month =        dec,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1870103.1870105",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 23 16:57:47 MST 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present a novel definition of privacy in the
                 framework of offline (retroactive) database query
                 auditing. Given information about the database, a
                 description of sensitive data, and assumptions about
                 users' prior knowledge, our goal is to determine if
                 answering a past user's query could have led to a
                 privacy breach. According to our definition, an audited
                 property A is private, given the disclosure of property
                 B, if no user can gain confidence in A by learning B,
                 subject to prior knowledge constraints. Privacy is not
                 violated if the disclosure of B causes a loss of
                 confidence in A. The new notion of privacy is
                 formalized using the well-known semantics for reasoning
                 about knowledge, where logical properties correspond to
                 sets of possible worlds (databases) that satisfy these
                 properties.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "2",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Guha:2010:AAR,
  author =       "Sudipto Guha and Kamesh Munagala and Peng Shi",
  title =        "Approximation algorithms for restless bandit
                 problems",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "1",
  pages =        "3:1--3:50",
  month =        dec,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1870103.1870106",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 23 16:57:47 MST 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The restless bandit problem is one of the most
                 well-studied generalizations of the celebrated
                 stochastic multi-armed bandit (MAB) problem in decision
                 theory. In its ultimate generality, the restless bandit
                 problem is known to be PSPACE-Hard to approximate to
                 any nontrivial factor, and little progress has been
                 made on this problem despite its significance in
                 modeling activity allocation under uncertainty. In this
                 article, we consider the Feedback MAB problem, where
                 the reward obtained by playing each of $n$ independent
                 arms varies according to an underlying on/off Markov
                 process whose exact state is only revealed when the arm
                 is played. The goal is to design a policy for playing
                 the arms in order to maximize the infinite horizon time
                 average expected reward.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "3",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Barcelo:2010:XII,
  author =       "Pablo Barcel{\'o} and Leonid Libkin and Antonella
                 Poggi and Cristina Sirangelo",
  title =        "{XML} with incomplete information",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "1",
  pages =        "4:1--4:62",
  month =        dec,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1870103.1870107",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 23 16:57:47 MST 2010",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study models of incomplete information for XML,
                 their computational properties, and query answering.
                 While our approach is motivated by the study of
                 relational incompleteness, incomplete information in
                 XML documents may appear not only as null values but
                 also as missing structural information. Our goal is to
                 provide a classification of incomplete descriptions of
                 XML documents, and separate features---or groups of
                 features---that lead to hard computational problems
                 from those that admit efficient algorithms. Our
                 classification of incomplete information is based on
                 the combination of null values with partial structural
                 descriptions of documents. The key computational
                 problems we consider are consistency of partial
                 descriptions, representability of complete documents by
                 incomplete ones, and query answering.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "4",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mulmuley:2011:PVN,
  author =       "Ketan D. Mulmuley",
  title =        "On {P} vs. {NP} and geometric complexity theory:
                 Dedicated to {Sri Ramakrishna}",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "2",
  pages =        "5:1--5:26",
  month =        apr,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1944345.1944346",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Apr 6 16:33:20 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article gives an overview of the geometric
                 complexity theory (GCT) approach towards the P vs. NP
                 and related problems focusing on its main complexity
                 theoretic results. These are: (1) two concrete lower
                 bounds, which are currently the best known lower bounds
                 in the context of the P vs. NC and permanent vs.
                 determinant problems, (2) the Flip Theorem, which
                 formalizes the self-referential paradox in the P vs. NP
                 problem, and (3) the Decomposition Theorem, which
                 decomposes the arithmetic P vs. NP and permanent vs.
                 determinant problems into subproblems without
                 self-referential difficulty, consisting of positivity
                 hypotheses in algebraic geometry and representation
                 theory and easier hardness hypotheses.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "5",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Buchin:2011:DTT,
  author =       "Kevin Buchin and Wolfgang Mulzer",
  title =        "{Delaunay} triangulations in {$ O(\mathrm {sort}(n))
                 $} time and more",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "2",
  pages =        "6:1--6:27",
  month =        apr,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1944345.1944347",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Apr 6 16:33:20 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We present several results about Delaunay
                 triangulations (DTs) and convex hulls in
                 transdichotomous and hereditary settings: (i) the DT of
                 a planar point set can be computed in expected time {$
                 O(\mathrm {sort}(n)) $} on a word RAM, where $ \mathrm
                 {sort}(n) $ is the time to sort $n$ numbers. We assume
                 that the word RAM supports the {\em shuffle\/}
                 operation in constant time; (ii) if we know the
                 ordering of a planar point set in $x$- and in
                 $y$-direction, its DT can be found by a randomized
                 algebraic computation tree of expected linear depth;
                 (iii) given a universe {$U$} of points in the plane, we
                 construct a data structure {$D$} for {\em Delaunay
                 queries\/}: for any {$ P \subseteq U $}, {$D$} can find
                 the DT of {$P$} in expected time {$ O(|P| \log \log
                 |U|) $}; (iv) given a universe {$U$} of points in
                 3-space in general convex position, there is a data
                 structure {$D$} for convex hull queries: for any {$ P
                 \subseteq U $}, {$D$} can find the convex hull of {$P$}
                 in expected time {$ O(|P| (\log \log |U|)^2) $}; (v)
                 given a convex polytope in 3-space with $n$ vertices
                 which are colored with $2$ colors, we can split it into
                 the convex hulls of the individual color classes in
                 expected time {$ O(n (\log \log n)^2) $}.\par

                 The results (i)--(iii) generalize to higher dimensions,
                 where the expected running time now also depends on the
                 complexity of the resulting DT. We need a wide range of
                 techniques. Most prominently, we describe a reduction
                 from DTs to nearest-neighbor graphs that relies on a
                 new variant of randomized incremental constructions
                 using {\em dependent\/} sampling.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "6",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aguilera:2011:DAS,
  author =       "Marcos K. Aguilera and Idit Keidar and Dahlia Malkhi
                 and Alexander Shraer",
  title =        "Dynamic atomic storage without consensus",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "2",
  pages =        "7:1--7:32",
  month =        apr,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1944345.1944348",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Apr 6 16:33:20 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article deals with the emulation of atomic
                 read/write (R/W) storage in dynamic asynchronous
                 message passing systems. In static settings, it is well
                 known that atomic R/W storage can be implemented in a
                 fault-tolerant manner even if the system is completely
                 asynchronous, whereas consensus is not solvable. In
                 contrast, all existing emulations of atomic storage in
                 dynamic systems rely on consensus or stronger
                 primitives, leading to a popular belief that dynamic
                 R/W storage is unattainable without consensus. In this
                 article, we specify the problem of dynamic atomic
                 read/write storage in terms of the interface available
                 to the users of such storage.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "7",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Avron:2011:RAE,
  author =       "Haim Avron and Sivan Toledo",
  title =        "Randomized algorithms for estimating the trace of an
                 implicit symmetric positive semi-definite matrix",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "2",
  pages =        "8:1--8:17",
  month =        apr,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1944345.1944349",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Apr 6 16:33:20 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We analyze the convergence of randomized trace
                 estimators. Starting at 1989, several algorithms have
                 been proposed for estimating the trace of a matrix by $
                 1 / M \sum_{i = 1}^M z_i^T A z_i $, where the $ z_i $
                 are random vectors; different estimators use different
                 distributions for the zis, all of which lead to $ E(1 /
                 M \sum_{i = 1}^M z_i^T A z_i) = \mathrm {trace}(A) $.
                 These algorithms are useful in applications in which
                 there is no explicit representation of $A$ but rather
                 an efficient method compute $ z^T A z$ given $z$.
                 Existing results only analyze the variance of the
                 different estimators. In contrast, we analyze the
                 number of samples $M$ required to guarantee that with
                 probability at least $ 1 - \delta $, the relative error
                 in the estimate is at most $ \epsilon $. We argue that
                 such bounds are much more useful in applications than
                 the variance. We found that these bounds rank the
                 estimators differently than the variance; this suggests
                 that minimum-variance estimators may not be the
                 best.\par

                 We also make two additional contributions to this area.
                 The first is a specialized bound for projection
                 matrices, whose trace (rank) needs to be computed in
                 electronic structure calculations. The second is a new
                 estimator that uses less randomness than all the
                 existing estimators.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "8",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cicalese:2011:CRE,
  author =       "Ferdinando Cicalese and Eduardo Sany Laber",
  title =        "On the competitive ratio of evaluating priced
                 functions",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "3",
  pages =        "9:1--9:40",
  month =        may,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1970392.1970393",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jun 3 18:12:24 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $f$ be a function on a set of variables $V$. For
                 each $ x \in V$, let $ c(x)$ be the cost of reading the
                 value of $x$. An algorithm for evaluating $f$ is a
                 strategy for adaptively identifying and reading a set
                 of variables $ U \subseteq V$ whose values uniquely
                 determine the value of $f$. We are interested in
                 finding algorithms which minimize the cost incurred to
                 evaluate $f$ in the above sense. Competitive analysis
                 is employed to measure the performance of the
                 algorithms. We address two variants of the above
                 problem. We consider the basic model in which the
                 evaluation algorithm knows the cost $ c(x)$, for each $
                 x \in V$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "9",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vazirani:2011:MEU,
  author =       "Vijay V. Vazirani and Mihalis Yannakakis",
  title =        "Market equilibrium under separable, piecewise-linear,
                 concave utilities",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "3",
  pages =        "10:1--10:25",
  month =        may,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1970392.1970394",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jun 3 18:12:24 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We consider Fisher and Arrow--Debreu markets under
                 additively separable, piecewise-linear, concave utility
                 functions and obtain the following results. For both
                 market models, if an equilibrium exists, there is one
                 that is rational and can be written using polynomially
                 many bits. There is no simple necessary and sufficient
                 condition for the existence of an equilibrium: The
                 problem of checking for existence of an equilibrium is
                 NP-complete for both market models; the same holds for
                 existence of an $ \epsilon $-approximate equilibrium,
                 for $ \epsilon = O(n^{-5})$. Under standard (mild)
                 sufficient conditions, the problem of finding an exact
                 equilibrium is in PPAD for both market models.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "10",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Candes:2011:RPC,
  author =       "Emmanuel J. Cand{\`e}s and Xiaodong Li and Yi Ma and
                 John Wright",
  title =        "Robust principal component analysis?",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "3",
  pages =        "11:1--11:37",
  month =        may,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1970392.1970395",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jun 3 18:12:24 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article is about a curious phenomenon. Suppose we
                 have a data matrix, which is the superposition of a
                 low-rank component and a sparse component. Can we
                 recover each component individually? We prove that
                 under some suitable assumptions, it is possible to
                 recover both the low-rank and the sparse components
                 exactly by solving a very convenient convex program
                 called Principal Component Pursuit; among all feasible
                 decompositions, simply minimize a weighted combination
                 of the nuclear norm and of the $ \ell_1 $ norm. This
                 suggests the possibility of a principled approach to
                 robust principal component analysis since our
                 methodology and results assert that one can recover the
                 principal components of a data matrix even though a
                 positive fraction of its entries are arbitrarily
                 corrupted. This extends to the situation where a
                 fraction of the entries are missing as well.We discuss
                 an algorithm for solving this optimization problem, and
                 present applications in the area of video surveillance,
                 where our methodology allows for the detection of
                 objects in a cluttered background, and in the area of
                 face recognition, where it offers a principled way of
                 removing shadows and specularities in images of
                 faces.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "11",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2011:IJI,
  author =       "Victor Vianu",
  title =        "Introduction to {JACM} invited article",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "3",
  pages =        "12:1--12:1",
  month =        may,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1970392.1970396",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jun 3 18:12:24 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "12",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sarma:2011:EPG,
  author =       "Atish Das Sarma and Sreenivas Gollapudi and Rina
                 Panigrahy",
  title =        "Estimating {PageRank} on graph streams",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "3",
  pages =        "13:1--13:19",
  month =        may,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1970392.1970397",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Jun 3 18:12:24 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article focuses on computations on large graphs
                 (e.g., the web-graph) where the edges of the graph are
                 presented as a stream. The objective in the streaming
                 model is to use small amount of memory (preferably
                 sub-linear in the number of nodes $n$) and a smaller
                 number of passes.\par In the streaming model, we show
                 how to perform several graph computations including
                 estimating the probability distribution after a random
                 walk of length $l$, the mixing time $M$, and other
                 related quantities such as the conductance of the
                 graph. By applying our algorithm for computing
                 probability distribution on the web-graph, we can
                 estimate the PageRank $p$ of any node up to an additive
                 error of $ \sqrt {\epsilon p} + \epsilon $ in $ \tilde
                 {O}(\sqrt {M / \alpha })$ passes and $ \tilde {O}(\min
                 (n \alpha + 1 / \epsilon \sqrt {M / \alpha } + (1 /
                 \epsilon) M \alpha, \alpha n \sqrt {M \alpha } + (1 /
                 \epsilon) \sqrt {M / \alpha }))$ space, for any $
                 \alpha \in (0, 1]$. Specifically, for $ \epsilon = M /
                 n$, $ \alpha = M^{-1 / 2}$, we can compute the
                 approximate PageRank values in $ \tilde {O}(n M^{-1 /
                 4})$ space and $ \tilde {O}(M^{3 / 4})$ passes. In
                 comparison, a standard implementation of the PageRank
                 algorithm will take $ O(n)$ space and $ O(M)$ passes.
                 We also give an approach to approximate the PageRank
                 values in just $ \tilde {O}(1)$ passes although this
                 requires $ \tilde {O}(n M)$ space.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "13",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chazelle:2011:OGR,
  author =       "Bernard Chazelle and C. Seshadhri",
  title =        "Online geometric reconstruction",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "4",
  pages =        "14:1--14:32",
  month =        jul,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1989727.1989728",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 18 12:34:51 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We investigate a new class of geometric problems based
                 on the idea of online error correction. Suppose one is
                 given access to a large geometric dataset though a
                 query mechanism; for example, the dataset could be a
                 terrain and a query might ask for the coordinates of a
                 particular vertex or for the edges incident to it.
                 Suppose, in addition, that the dataset satisfies some
                 known structural property P (for example, monotonicity
                 or convexity) but that, because of errors and noise,
                 the queries occasionally provide answers that violate
                 P.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "14",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Fagin:2011:PDE,
  author =       "Ronald Fagin and Benny Kimelfeld and Phokion G.
                 Kolaitis",
  title =        "Probabilistic data exchange",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "4",
  pages =        "15:1--15:55",
  month =        jul,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1989727.1989729",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 18 12:34:51 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The work reported here lays the foundations of data
                 exchange in the presence of probabilistic data. This
                 requires rethinking the very basic concepts of
                 traditional data exchange, such as solution, universal
                 solution, and the certain answers of target queries. We
                 develop a framework for data exchange over
                 probabilistic databases, and make a case for its
                 coherence and robustness. This framework applies to
                 arbitrary schema mappings, and finite or countably
                 infinite probability spaces on the source and target
                 instances. After establishing this framework and
                 formulating the key concepts, we study the application
                 of the framework to a concrete and practical setting
                 where probabilistic databases are compactly encoded by
                 means of annotations formulated over random Boolean
                 variables.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "15",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2011:IAFa,
  author =       "Victor Vianu",
  title =        "Invited articles foreword",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "4",
  pages =        "16:1--16:1",
  month =        jul,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1989727.1989730",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 18 12:34:51 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "16",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bojanczyk:2011:XEL,
  author =       "Miko{\l}aj Boja{\'n}czyk and Pawe{\l} Parys",
  title =        "{XPath} evaluation in linear time",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "4",
  pages =        "17:1--17:33",
  month =        jul,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1989727.1989731",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 18 12:34:51 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We consider a fragment of XPath 1.0, where attribute
                 and text values may be compared. We show that for any
                 unary query $ \varphi $ in this fragment, the set of
                 nodes that satisfy the query in a document t can be
                 calculated in time $ O(| \varphi |^3 |t|) $. We show
                 that for a query in a bigger fragment with Kleene star
                 allowed, the same can be done in time $ O(2^{O(|
                 \varphi |)} |t|) $ or in time $ O(| \varphi |^3 |t|
                 \log |t|) $. Finally, we present algorithms for binary
                 queries of XPath, which do a precomputation on the
                 document and then output the selected pairs with
                 constant delay.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "17",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{King:2011:BBB,
  author =       "Valerie King and Jared Saia",
  title =        "Breaking the {$ O(n^2) $} bit barrier: {Scalable}
                 {Byzantine} agreement with an adaptive adversary",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "4",
  pages =        "18:1--18:24",
  month =        jul,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1989727.1989732",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 18 12:34:51 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We describe an algorithm for Byzantine agreement that
                 is scalable in the sense that each processor sends only
                 $ \tilde {O}(\sqrt {n}) $ bits, where $n$ is the total
                 number of processors. Our algorithm succeeds with high
                 probability against an adaptive adversary, which can
                 take over processors at any time during the protocol,
                 up to the point of taking over arbitrarily close to a $
                 1 / 3$ fraction. We assume synchronous communication
                 but a rushing adversary. Moreover, our algorithm works
                 in the presence of flooding: processors controlled by
                 the adversary can send out any number of messages. We
                 assume the existence of private channels between all
                 pairs of processors but make no other cryptographic
                 assumptions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "18",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Arthur:2011:SAM,
  author =       "David Arthur and Bodo Manthey and Heiko R{\"o}glin",
  title =        "Smoothed Analysis of the $k$-Means Method",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "5",
  pages =        "19:1--19:??",
  month =        oct,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2027216.2027217",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 06:23:00 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "19",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Mastrolilli:2011:HAF,
  author =       "Monaldo Mastrolilli and Ola Svensson",
  title =        "Hardness of Approximating Flow and Job Shop Scheduling
                 Problems",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "5",
  pages =        "20:1--20:??",
  month =        oct,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2027216.2027218",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 06:23:00 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "20",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bateni:2011:ASS,
  author =       "Mohammadhossein Bateni and Mohammadtaghi Hajiaghayi
                 and D{\'a}niel Marx",
  title =        "Approximation Schemes for {Steiner} Forest on Planar
                 Graphs and Graphs of Bounded Treewidth",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "5",
  pages =        "21:1--21:??",
  month =        oct,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2027216.2027219",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 06:23:00 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "21",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2011:IAFb,
  author =       "Victor Vianu",
  title =        "Invited Articles Foreword",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "5",
  pages =        "22:1--22:??",
  month =        oct,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2027216.2027220",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 06:23:00 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "22",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Barenboim:2011:DDV,
  author =       "Leonid Barenboim and Michael Elkin",
  title =        "Deterministic Distributed Vertex Coloring in
                 Polylogarithmic Time",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "5",
  pages =        "23:1--23:??",
  month =        oct,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2027216.2027221",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sun Nov 6 06:23:00 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "23",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gordon:2011:CFS,
  author =       "S. Dov Gordon and Carmit Hazay and Jonathan Katz and
                 Yehuda Lindell",
  title =        "Complete Fairness in Secure {Two-Party} Computation",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "6",
  pages =        "24:1--24:37",
  month =        dec,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2049697.2049698",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 15 09:33:01 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In the setting of secure two-party computation, two
                 mutually distrusting parties wish to compute some
                 function of their inputs while preserving, to the
                 extent possible, various security properties such as
                 privacy, correctness, and more. One desirable property
                 is fairness which guarantees, informally, that if one
                 party receives its output, then the other party does
                 too. Cleve [1986] showed that complete fairness cannot
                 be achieved in general without an honest majority.
                 Since then, the accepted folklore has been that nothing
                 non-trivial can be computed with complete fairness in
                 the two-party setting. We demonstrate that this
                 folklore belief is false by showing completely fair
                 protocols for various nontrivial functions in the
                 two-party setting based on standard cryptographic
                 assumptions.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "24",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Lavi:2011:TNO,
  author =       "Ron Lavi and Chaitanya Swamy",
  title =        "Truthful and Near-Optimal Mechanism Design via Linear
                 Programming",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "6",
  pages =        "25:1--25:24",
  month =        dec,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2049697.2049699",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 15 09:33:01 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We give a general technique to obtain approximation
                 mechanisms that are truthful in expectation. We show
                 that for packing domains, any $ \alpha $-approximation
                 algorithm that also bounds the integrality gap of the
                 LP relaxation of the problem by $ \alpha $ can be used
                 to construct an $ \alpha $-approximation mechanism that
                 is truthful in expectation. This immediately yields a
                 variety of new and significantly improved results for
                 various problem domains and furthermore, yields
                 truthful (in expectation) mechanisms with guarantees
                 that match the best-known approximation guarantees when
                 truthfulness is not required. In particular, we obtain
                 the first truthful mechanisms with approximation
                 guarantees for a variety of multiparameter domains.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "25",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Calcagno:2011:CSA,
  author =       "Cristiano Calcagno and Dino Distefano and Peter W.
                 O'Hearn and Hongseok Yang",
  title =        "Compositional Shape Analysis by Means of
                 Bi-Abduction",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "6",
  pages =        "26:1--26:66",
  month =        dec,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2049697.2049700",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 15 09:33:01 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The accurate and efficient treatment of mutable data
                 structures is one of the outstanding problem areas in
                 automatic program verification and analysis. Shape
                 analysis is a form of program analysis that attempts to
                 infer descriptions of the data structures in a program,
                 and to prove that these structures are not misused or
                 corrupted. It is one of the more challenging and
                 expensive forms of program analysis, due to the
                 complexity of aliasing and the need to look arbitrarily
                 deeply into the program heap. This article describes a
                 method of boosting shape analyses by defining a
                 compositional method, where each procedure is analyzed
                 independently of its callers.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "26",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goodrich:2011:RSS,
  author =       "Michael T. Goodrich",
  title =        "Randomized {Shellsort}: a Simple Data-Oblivious
                 Sorting Algorithm",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "6",
  pages =        "27:1--27:26",
  month =        dec,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2049697.2049701",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 15 09:33:01 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib;
                 https://www.math.utah.edu/pub/tex/bib/jalg.bib",
  abstract =     "In this article, we describe a randomized Shellsort
                 algorithm. This algorithm is a simple, randomized,
                 data-oblivious version of the Shellsort algorithm that
                 always runs in $ O(n \log n) $ time and succeeds in
                 sorting any given input permutation with very high
                 probability. Taken together, these properties imply
                 applications in the design of new efficient
                 privacy-preserving computations based on the secure
                 multiparty computation (SMC) paradigm. In addition, by
                 a trivial conversion of this Monte Carlo algorithm to
                 its Las Vegas equivalent, one gets the first version of
                 Shellsort with a running time that is provably O$ (n
                 \log n) $ with very high probability.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "27",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Haeupler:2011:NCA,
  author =       "Bernhard Haeupler and Barna Saha and Aravind
                 Srinivasan",
  title =        "New Constructive Aspects of the {Lov{\'a}sz Local
                 Lemma}",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "6",
  pages =        "28:1--28:28",
  month =        dec,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2049697.2049702",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 15 09:33:01 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The Lov{\'a}sz Local Lemma (LLL) is a powerful tool
                 that gives sufficient conditions for avoiding all of a
                 given set of ``bad'' events, with positive probability.
                 A series of results have provided algorithms to
                 efficiently construct structures whose existence is
                 non-constructively guaranteed by the LLL, culminating
                 in the recent breakthrough of Moser and Tardos [2010]
                 for the full asymmetric LLL. We show that the output
                 distribution of the Moser-Tardos algorithm
                 well-approximates the conditional LLL-distribution, the
                 distribution obtained by conditioning on all bad events
                 being avoided. We show how a known bound on the
                 probabilities of events in this distribution can be
                 used for further probabilistic analysis and give new
                 constructive and nonconstructive results.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "28",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2011:IAF,
  author =       "Victor Vianu",
  title =        "Invited Article Foreword",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "6",
  pages =        "29:1--29:1",
  month =        dec,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2049697.2049703",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 15 09:33:01 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "29",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Jain:2011:QP,
  author =       "Rahul Jain and Zhengfeng Ji and Sarvagya Upadhyay and
                 John Watrous",
  title =        "{QIP $=$ PSPACE}",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "6",
  pages =        "30:1--30:27",
  month =        dec,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2049697.2049704",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 15 09:33:01 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This work considers the quantum interactive proof
                 system model of computation, which is the (classical)
                 interactive proof system model's natural quantum
                 computational analogue. An exact characterization of
                 the expressive power of quantum interactive proof
                 systems is obtained: the collection of computational
                 problems having quantum interactive proof systems
                 consists precisely of those problems solvable by
                 deterministic Turing machines that use at most a
                 polynomial amount of space (or, more succinctly, QIP =
                 PSPACE). This characterization is proved through the
                 use of a parallelized form of the matrix multiplicative
                 weights update method, applied to a class of
                 semidefinite programs that captures the computational
                 power of quantum interactive proof systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "30",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Baier:2012:PA,
  author =       "Christel Baier and Marcus Gr{\"o}sser and Nathalie
                 Bertrand",
  title =        "Probabilistic {$ \omega $}-automata",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "1",
  pages =        "1:1--1:52",
  month =        feb,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2108242.2108243",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Feb 28 16:42:44 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Probabilistic $ \omega $-automata are variants of
                 nondeterministic automata over infinite words where all
                 choices are resolved by probabilistic distributions.
                 Acceptance of a run for an infinite input word can be
                 defined using traditional acceptance criteria for $
                 \omega $-automata, such as B{\"u}chi, Rabin or Streett
                 conditions. The accepted language of a probabilistic $
                 \omega $-automata is then defined by imposing a
                 constraint on the probability measure of the accepting
                 runs. In this paper, we study a series of fundamental
                 properties of probabilistic $ \omega $-automata with
                 three different language-semantics: (1) the probable
                 semantics that requires positive acceptance
                 probability, (2) the almost-sure semantics that
                 requires acceptance with probability $1$, and (3) the
                 threshold semantics that relies on an additional
                 parameter $ \lambda \in]0, 1 [$ that specifies a lower
                 probability bound for the acceptance probability.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "1",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Aspnes:2012:PCD,
  author =       "James Aspnes and Hagit Attiya and Keren
                 Censor-Hillel",
  title =        "Polylogarithmic concurrent data structures from
                 monotone circuits",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "1",
  pages =        "2:1--2:24",
  month =        feb,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2108242.2108244",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Feb 28 16:42:44 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article presents constructions of useful
                 concurrent data structures, including max registers and
                 counters, with step complexity that is sublinear in the
                 number of processes, $n$. This result avoids a
                 well-known lower bound by having step complexity that
                 is polylogarithmic in the number of values the object
                 can take or the number of operations applied to it. The
                 key step in these implementations is a method for
                 constructing a max register, a linearizable, wait-free
                 concurrent data structure that supports a write
                 operation and a read operation that returns the largest
                 value previously written. For fixed $m$, an $m$-valued
                 max register is constructed from one-bit multi-writer
                 multi-reader registers at a cost of at most $ \lceil
                 \log m \rceil $ atomic register operations per write or
                 read.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "2",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Castaneda:2012:NCT,
  author =       "Armando Casta{\~n}eda and Sergio Rajsbaum",
  title =        "New combinatorial topology bounds for renaming: The
                 upper bound",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "1",
  pages =        "3:1--3:49",
  month =        feb,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2108242.2108245",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Feb 28 16:42:44 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In the renaming task, n+1 processes start with unique
                 input names from a large space and must choose unique
                 output names taken from a smaller name space, $ 0, 1,
                 \ldots, K $. To rule out trivial solutions, a protocol
                 must be anonymous: the value chosen by a process can
                 depend on its input name and on the execution, but not
                 on the specific process ID. Attiya et al. [1990] showed
                 that renaming has a wait-free solution when $ K \geq 2
                 n $. Several algebraic topology proofs of a lower bound
                 stating that no such protocol exists when $ K < 2 n $
                 have been published. In a companion article, we present
                 the first completely combinatorial renaming lower bound
                 proof stating if $ n + 1 $ is a primer power, then
                 renaming is not wait-free solvable when $ K < 2 n $.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "3",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2012:IAFa,
  author =       "Victor Vianu",
  title =        "Invited article foreword",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "1",
  pages =        "4:1--4:1",
  month =        feb,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2108242.2108246",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Feb 28 16:42:44 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "4",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Otto:2012:HAG,
  author =       "Martin Otto",
  title =        "Highly acyclic groups, hypergraph covers, and the
                 guarded fragment",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "1",
  pages =        "5:1--5:40",
  month =        feb,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2108242.2108247",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Feb 28 16:42:44 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We construct finite groups whose Cayley graphs have
                 large girth even with respect to a discounted distance
                 measure that contracts arbitrarily long sequences of
                 edges from the same color class (subgroup), and only
                 counts transitions between color classes (cosets).
                 These groups are shown to be useful in the construction
                 of finite bisimilar hypergraph covers that avoid any
                 small cyclic configurations.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "5",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Barak:2012:IPO,
  author =       "Boaz Barak and Oded Goldreich and Russell Impagliazzo
                 and Steven Rudich and Amit Sahai and Salil Vadhan and
                 Ke Yang",
  title =        "On the (im)possibility of obfuscating programs",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "2",
  pages =        "6:1--6:48",
  month =        apr,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2160158.2160159",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 27 16:20:34 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Informally, an obfuscator $O$ is an (efficient,
                 probabilistic) ``compiler'' that takes as input a
                 program (or circuit) $P$ and produces a new program $
                 O(P)$ that has the same functionality as $P$ yet is
                 ``unintelligible'' in some sense. Obfuscators, if they
                 exist, would have a wide variety of cryptographic and
                 complexity-theoretic applications, ranging from
                 software protection to homomorphic encryption to
                 complexity-theoretic analogues of Rice's theorem. Most
                 of these applications are based on an interpretation of
                 the ``unintelligibility'' condition in obfuscation as
                 meaning that $ O(P)$ is a ``virtual black box,'' in the
                 sense that anything one can efficiently compute given $
                 O(P)$, one could also efficiently compute given oracle
                 access to $P$. In this work, we initiate a theoretical
                 investigation of obfuscation. Our main result is that,
                 even under very weak formalizations of the above
                 intuition, obfuscation is impossible. We prove this by
                 constructing a family of efficient programs $P$ that
                 are unobfuscatable in the sense that (a) given any
                 efficient program $ P'$ that computes the same function
                 as a program $ P \in p$, the ``source code'' $P$ can be
                 efficiently reconstructed, yet (b) given oracle access
                 to a (randomly selected) program $ P \in p$, no
                 efficient algorithm can reconstruct $P$ (or even
                 distinguish a certain bit in the code from random)
                 except with negligible probability. We extend our
                 impossibility result in a number of ways, including
                 even obfuscators that (a) are not necessarily
                 computable in polynomial time, (b) only approximately
                 preserve the functionality, and (c) only need to work
                 for very restricted models of computation (TC$^0$). We
                 also rule out several potential applications of
                 obfuscators, by constructing ``unobfuscatable''
                 signature schemes, encryption schemes, and pseudorandom
                 function families.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "6",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vazirani:2012:NRC,
  author =       "Vijay V. Vazirani",
  title =        "The notion of a rational convex program, and an
                 algorithm for the {Arrow--Debreu Nash} bargaining
                 game",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "2",
  pages =        "7:1--7:36",
  month =        apr,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2160158.2160160",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 27 16:20:34 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We introduce the notion of a rational convex program
                 (RCP) and we classify the known RCPs into two classes:
                 quadratic and logarithmic. The importance of
                 rationality is that it opens up the possibility of
                 computing an optimal solution to the program via an
                 algorithm that is either combinatorial or uses an
                 LP-oracle. Next, we define a new Nash bargaining game,
                 called ADNB, which is derived from the linear case of
                 the Arrow--Debreu market model. We show that the convex
                 program for ADNB is a logarithmic RCP, but unlike other
                 known members of this class, it is nontotal. Our main
                 result is a combinatorial, polynomial-time algorithm
                 for ADNB. It turns out that the reason for
                 infeasibility of logarithmic RCPs is quite different
                 from that for LPs and quadratic RCPs. We believe that
                 our ideas for surmounting the new difficulties will be
                 useful for dealing with other nontotal RCPs as well. We
                 give an application of our combinatorial algorithm for
                 ADNB to an important ``fair'' throughput allocation
                 problem on a wireless channel. Finally, we present a
                 number of interesting questions that the new notion of
                 RCP raises.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "7",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldreich:2012:TGO,
  author =       "Oded Goldreich and Brendan Juba and Madhu Sudan",
  title =        "A theory of goal-oriented communication",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "2",
  pages =        "8:1--8:65",
  month =        apr,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2160158.2160161",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 27 16:20:34 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We put forward a general theory of goal-oriented
                 communication, where communication is not an end in
                 itself, but rather a means to achieving some goals of
                 the communicating parties. Focusing on goals provides a
                 framework for addressing the problem of potential
                 ``misunderstanding'' during communication, where the
                 misunderstanding arises from lack of initial agreement
                 on what protocol and/or language is being used in
                 communication. In this context, ``reliable
                 communication'' means overcoming any initial
                 misunderstanding between parties towards achieving a
                 given goal. Despite the enormous diversity among the
                 goals of communication, we propose a simple model that
                 captures all goals. In the simplest form of
                 communication we consider, two parties, a user and a
                 server, attempt to communicate with each other in order
                 to achieve some goal of the user. We show that any goal
                 of communication can be modeled mathematically by
                 introducing a third party, which we call the referee,
                 who hypothetically monitors the conversation between
                 the user and the server and determines whether or not
                 the goal has been achieved. Potential misunderstanding
                 between the players is captured by allowing each player
                 (the user/server) to come from a (potentially infinite)
                 class of players such that each player is unaware which
                 instantiation of the other it is talking to. We
                 identify a main concept, which we call sensing, that
                 allows goals to be achieved even under
                 misunderstanding. Informally, sensing captures the
                 user's ability (potentially using help from the server)
                 to simulate the referee's assessment on whether the
                 communication is achieving the goal. We show that when
                 the user can sense progress, the goal of communication
                 can be achieved despite initial misunderstanding. We
                 also show that in certain settings sensing is necessary
                 for overcoming such initial misunderstanding. Our
                 results significantly extend the scope of the
                 investigation started by Juba and Sudan (STOC 2008) who
                 studied the foregoing phenomenon in the case of a
                 single specific goal. Our study shows that their main
                 suggestion, that misunderstanding can be detected and
                 possibly corrected by focusing on the goal, can be
                 proved in full generality.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "8",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2012:IAFb,
  author =       "Victor Vianu",
  title =        "Invited article foreword",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "2",
  pages =        "9:1--9:1",
  month =        apr,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2160158.2160162",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 27 16:20:34 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this issue, the Invited Articles section is
                 comprised of the article ``Continuous Sampling from
                 Distributed Streams'' by Graham Cormode, Muthu
                 Muthukrishnan, Ke Yi and Qin Zhang. This article was
                 selected from the 29th ACM SIGMOD-SIGACT-SIGART
                 Symposium on Principles of Database Systems, held in
                 Indianapolis, Indiana, June 7--9, 2010. I thank the
                 Program Committee of PODS 2010 and the PC Chair, Dirk
                 Van Gucht, for their help in selecting this invited
                 article. I am also grateful to JACM Associate Editor
                 Phokion Kolaitis for his editorial work on this
                 article.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "9",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cormode:2012:CSD,
  author =       "Graham Cormode and S. Muthukrishnan and Ke Yi and Qin
                 Zhang",
  title =        "Continuous sampling from distributed streams",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "2",
  pages =        "10:1--10:25",
  month =        apr,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2160158.2160163",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 27 16:20:34 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A fundamental problem in data management is to draw
                 and maintain a sample of a large data set, for
                 approximate query answering, selectivity estimation,
                 and query planning. With large, streaming data sets,
                 this problem becomes particularly difficult when the
                 data is shared across multiple distributed sites. The
                 main challenge is to ensure that a sample is drawn
                 uniformly across the union of the data while minimizing
                 the communication needed to run the protocol on the
                 evolving data. At the same time, it is also necessary
                 to make the protocol lightweight, by keeping the space
                 and time costs low for each participant. In this
                 article, we present communication-efficient protocols
                 for continuously maintaining a sample (both with and
                 without replacement) from $k$ distributed streams.
                 These apply to the case when we want a sample from the
                 full streams, and to the sliding window cases of only
                 the W most recent elements, or arrivals within the last
                 $w$ time units. We show that our protocols are optimal
                 (up to logarithmic factors), not just in terms of the
                 communication used, but also the time and space costs
                 for each participant.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "10",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Groth:2012:NTN,
  author =       "Jens Groth and Rafail Ostrovsky and Amit Sahai",
  title =        "New Techniques for Noninteractive Zero-Knowledge",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "3",
  pages =        "11:1--11:35",
  month =        jun,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2220357.2220358",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 9 16:30:52 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Noninteractive zero-knowledge (NIZK) proof systems are
                 fundamental primitives used in many cryptographic
                 constructions, including public-key encryption secure
                 against chosen ciphertext attack, digital signatures,
                 and various other cryptographic protocols. We introduce
                 new techniques for constructing NIZK proofs based on
                 groups with a bilinear map. Compared to previous
                 constructions of NIZK proofs, our techniques yield
                 dramatic reduction in the length of the common
                 reference string (proportional to security parameter)
                 and the size of the proofs (proportional to security
                 parameter times the circuit size). Our novel techniques
                 allow us to answer several long-standing open questions
                 in the theory of noninteractive proofs. We construct
                 the first perfect NIZK argument system for all NP. We
                 construct the first universally composable NIZK
                 argument for all NP in the presence of an adaptive
                 adversary. We construct a non-interactive zap for all
                 NP, which is the first that is based on a standard
                 cryptographic security assumption.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "11",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kirsch:2012:ERA,
  author =       "Adam Kirsch and Michael Mitzenmacher and Andrea
                 Pietracaprina and Geppino Pucci and Eli Upfal and Fabio
                 Vandin",
  title =        "An Efficient Rigorous Approach for Identifying
                 Statistically Significant Frequent Itemsets",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "3",
  pages =        "12:1--12:22",
  month =        jun,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2220357.2220359",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 9 16:30:52 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "As advances in technology allow for the collection,
                 storage, and analysis of vast amounts of data, the task
                 of screening and assessing the significance of
                 discovered patterns is becoming a major challenge in
                 data mining applications. In this work, we address
                 significance in the context of frequent itemset mining.
                 Specifically, we develop a novel methodology to
                 identify a meaningful support threshold $ s^* $ for a
                 dataset, such that the number of itemsets with support
                 at least $ s^* $ represents a substantial deviation
                 from what would be expected in a random dataset with
                 the same number of transactions and the same individual
                 item frequencies. These itemsets can then be flagged as
                 statistically significant with a small false discovery
                 rate. We present extensive experimental results to
                 substantiate the effectiveness of our methodology.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "12",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Volzer:2012:DFR,
  author =       "Hagen V{\"o}lzer and Daniele Varacca",
  title =        "Defining Fairness in Reactive and Concurrent Systems",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "3",
  pages =        "13:1--13:37",
  month =        jun,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2220357.2220360",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 9 16:30:52 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We define when a linear-time temporal property is a
                 fairness property with respect to a given system. This
                 captures the essence shared by most fairness
                 assumptions that are used in the specification and
                 verification of reactive and concurrent systems, such
                 as weak fairness, strong fairness, $k$-fairness, and
                 many others. We provide three characterizations of
                 fairness: a language-theoretic, a game-theoretic, and a
                 topological characterization. It turns out that the
                 fairness properties are the sets that are ``large''
                 from a topological point of view, that is, they are the
                 co-meager sets in the natural topology of runs of a
                 given system. This insight provides a link to
                 probability theory where a set is ``large'' when it has
                 measure 1. While these two notions of largeness are
                 similar, they do not coincide in general. However, we
                 show that they coincide for $ \omega $-regular
                 properties and bounded Borel measures. That is, an $
                 \omega $-regular temporal property of a finite-state
                 system has measure 1 under a bounded Borel measure if
                 and only if it is a fairness property with respect to
                 that system. The definition of fairness leads to a
                 generic relaxation of correctness of a system in
                 linear-time semantics. We define a system to be fairly
                 correct if there exists a fairness assumption under
                 which it satisfies its specification. Equivalently, a
                 system is fairly correct if the set of runs satisfying
                 the specification is topologically large. We motivate
                 this notion of correctness and show how it can be
                 verified in a system.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "13",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Patrascu:2012:PST,
  author =       "Mihai P{\u{a}}tra{\c{s}}cu and Mikkel Thorup",
  title =        "The Power of Simple Tabulation Hashing",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "3",
  pages =        "14:1--14:50",
  month =        jun,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2220357.2220361",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 9 16:30:52 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Randomized algorithms are often enjoyed for their
                 simplicity, but the hash functions used to yield the
                 desired theoretical guarantees are often neither simple
                 nor practical. Here we show that the simplest possible
                 tabulation hashing provides unexpectedly strong
                 guarantees. The scheme itself dates back to Zobrist in
                 1970 who used it for game playing programs. Keys are
                 viewed as consisting of $c$ characters. We initialize
                 $c$ tables $ H_1, \ldots {}, H_c $ mapping characters
                 to random hash codes. A key $ x = (x_1, \ldots, x_c) $
                 is hashed to $ H_1 [x_1] \oplus \cdot \cdot \cdot
                 \oplus H_c[x_c] $, where $ \oplus $ denotes bit-wise
                 exclusive-or. While this scheme is not even
                 4-independent, we show that it provides many of the
                 guarantees that are normally obtained via higher
                 independence, for example, Chernoff-type concentration,
                 min-wise hashing for estimating set intersection, and
                 cuckoo hashing.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "14",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2012:IAFc,
  author =       "Victor Vianu",
  title =        "Invited Article Foreword",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "3",
  pages =        "15:1--15:1",
  month =        jun,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2220357.2220362",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 9 16:30:52 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "15",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Gottlob:2012:STB,
  author =       "Georg Gottlob and Stephanie Tien Lee and Gregory
                 Valiant and Paul Valiant",
  title =        "Size and Treewidth Bounds for Conjunctive Queries",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "3",
  pages =        "16:1--16:35",
  month =        jun,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2220357.2220363",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 9 16:30:52 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "This article provides new worst-case bounds for the
                 size and tree with of the result $ Q(D) $ of a
                 conjunctive query $Q$ applied to a database D. We
                 derive bounds for the result size $ |Q(D)|$ in terms of
                 structural properties of $Q$, both in the absence and
                 in the presence of keys and functional dependencies.
                 These bounds are based on a novel ``coloring'' of the
                 query variables that associates a coloring number $
                 C(Q)$ to each query $Q$. Intuitively, each color used
                 represents some possible entropy of that variable.
                 Using this coloring number, we derive tight bounds for
                 the size of $ Q(D)$ in case (i) no functional
                 dependencies or keys are specified, and (ii) simple
                 functional dependencies (keys) are given. These results
                 generalize recent size-bounds for join queries obtained
                 by Atserias et al. [2008]. In the case of arbitrary
                 (compound) functional dependencies, we use tools from
                 information theory to provide lower and upper bounds,
                 establishing a close connection between size bounds and
                 a basic question in information theory. Our new
                 coloring scheme also allows us to precisely
                 characterize (both in the absence of keys and with
                 simple keys) the treewidth-preserving queries --- the
                 queries for which the treewidth of the output relation
                 is bounded by a function of the treewidth of the input
                 database. Finally, we give some results on the
                 computational complexity of determining the size
                 bounds, and of deciding whether the treewidth is
                 preserved.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "16",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Chen:2012:AOA,
  author =       "Yijia Chen and J{\"o}rg Flum",
  title =        "From Almost Optimal Algorithms to Logics for
                 Complexity Classes via Listings and a Halting Problem",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "4",
  pages =        "17:1--17:34",
  month =        aug,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2339123.2339124",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 4 13:21:54 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Let $C$ denote one of the complexity classes
                 ``polynomial time,'' ``logspace,'' or
                 ``nondeterministic logspace.'' We introduce a logic $
                 L(C)_{\rm inv}$ and show generalizations and variants
                 of the equivalence $ L(C)_{\rm inv}$ captures $C$ if
                 and only if there is an almost $C$-optimal algorithm in
                 $C$ for the set Taut of tautologies of propositional
                 logic. These statements are also equivalent to the
                 existence of a listing of subsets in $C$ of Taut by
                 corresponding Turing machines and equivalent to the
                 fact that a certain parameterized halting problem is in
                 the parameterized complexity class $ X C_{\rm uni}$.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "17",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Avin:2012:SDC,
  author =       "Chen Avin and Yuval Emek and Erez Kantor and Zvi
                 Lotker and David Peleg and Liam Roditty",
  title =        "{SINR} Diagrams: Convexity and Its Applications in
                 Wireless Networks",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "4",
  pages =        "18:1--18:34",
  month =        aug,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2339123.2339125",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 4 13:21:54 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The rules governing the availability and quality of
                 connections in a wireless network are described by
                 physical models such as the signal-to-interference \&
                 noise ratio (SINR) model. For a collection of
                 simultaneously transmitting stations in the plane, it
                 is possible to identify a reception zone for each
                 station, consisting of the points where its
                 transmission is received correctly. The resulting SINR
                 diagram partitions the plane into a reception zone per
                 station and the remaining plane where no station can be
                 heard. SINR diagrams appear to be fundamental to
                 understanding the behavior of wireless networks, and
                 may play a key role in the development of suitable
                 algorithms for such networks, analogous perhaps to the
                 role played by Voronoi diagrams in the study of
                 proximity queries and related issues in computational
                 geometry. So far, however, the properties of SINR
                 diagrams have not been studied systematically, and most
                 algorithmic studies in wireless networking rely on
                 simplified graph-based models such as the unit disk
                 graph (UDG) model, which conveniently abstract away
                 interference-related complications, and make it easier
                 to handle algorithmic issues, but consequently fail to
                 capture accurately some important aspects of wireless
                 networks. This article focuses on obtaining some basic
                 understanding of SINR diagrams, their properties and
                 their usability in algorithmic applications.
                 Specifically, we have shown that assuming uniform power
                 transmissions, the reception zones are convex and
                 relatively well-rounded. These results are then used to
                 develop an efficient approximation algorithm for a
                 fundamental point location problem in wireless
                 networks.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "18",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Bansal:2012:PDR,
  author =       "Nikhil Bansal and Niv Buchbinder and Joseph (Seffi)
                 Naor",
  title =        "A Primal-Dual Randomized Algorithm for Weighted
                 Paging",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "4",
  pages =        "19:1--19:24",
  month =        aug,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2339123.2339126",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 4 13:21:54 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study the weighted version of the classic online
                 paging problem where there is a weight (cost) for
                 fetching each page into the cache. We design a
                 randomized $ O(\log k)$-competitive online algorithm
                 for this problem, where $k$ is the cache size. This is
                 the first randomized $ o(k)$-competitive algorithm and
                 its competitive ratio matches the known lower bound for
                 the problem, up to constant factors. More generally, we
                 design an $ O(\log (k / (k - h + 1)))$-competitive
                 online algorithm for the version of the problem where
                 the online algorithm has cache size $k$ and it is
                 compared to an optimal offline solution with cache size
                 $ h \leq k$. Our solution is based on a two-step
                 approach. We first obtain an $ O(\log k)$-competitive
                 fractional algorithm based on an online primal-dual
                 approach. Next, we obtain a randomized algorithm by
                 rounding in an online manner the fractional solution to
                 a probability distribution on the possible cache
                 states. We also give an online primal-dual randomized $
                 O(\log N)$-competitive algorithm for the Metrical Task
                 System problem (MTS) on a weighted star metric on $N$
                 leaves.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "19",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2012:IAFd,
  author =       "Victor Vianu",
  title =        "Invited Article Foreword",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "4",
  pages =        "20:1--20:1",
  month =        aug,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2339123.2339128",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 4 13:21:54 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "20",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Yi:2012:DIO,
  author =       "Ke Yi",
  title =        "Dynamic Indexability and the Optimality of {B}-Trees",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "4",
  pages =        "21:1--21:19",
  month =        aug,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2339123.2339129",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Sep 4 13:21:54 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "One-dimensional range queries, as one of the most
                 basic type of queries in databases, have been studied
                 extensively in the literature. For large databases, the
                 goal is to build an external index that is optimized
                 for disk block accesses (or I/Os). The problem is well
                 understood in the static case. Theoretically, there
                 exists an index of linear size that can answer a range
                 query in $ O(1 + K B) $ I/Os, where $K$ is the output
                 size and $B$ is the disk block size, but it is highly
                 impractical. In practice, the standard solution is the
                 B-tree, which answers a query in $ O(\log_B N M + K B)$
                 I/Os on a data set of size $N$, where $M$ is the main
                 memory size. For typical values of $N$, $M$, and $B$, $
                 \log_B $N$ M$ can be considered a constant. However,
                 the problem is still wide open in the dynamic setting,
                 when insertions and deletions of records are to be
                 supported. With smart buffering, it is possible to
                 speed up updates significantly to $ o(1)$ I/Os
                 amortized. Indeed, several dynamic B-trees have been
                 proposed, but they all cause certain levels of
                 degradation in the query performance, with the most
                 interesting tradeoff point at $ O(1 B \log N M)$ I/Os
                 for updates and $ O(\log N M + K B)$ I/Os for queries.
                 In this article, we prove that the query-update
                 tradeoffs of all the known dynamic B-trees are optimal,
                 when $ \log_B N M$ is a constant. This implies that one
                 should not hope for substantially better solutions for
                 all practical values of the parameters. Our lower
                 bounds hold in a dynamic version of the indexability
                 model, which is of independent interests. Dynamic
                 indexability is a clean yet powerful model for studying
                 dynamic indexing problems, and can potentially lead to
                 more interesting lower bound results.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "21",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Badanidiyuru:2012:TBN,
  author =       "Ashwinkumar Badanidiyuru and Arpita Patra and Ashish
                 Choudhury and Kannan Srinathan and C. Pandu Rangan",
  title =        "On the trade-off between network connectivity, round
                 complexity, and communication complexity of reliable
                 message transmission",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "5",
  pages =        "22:1--22:35",
  month =        oct,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2371656.2371657",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 7 18:15:56 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Perfectly reliable message transmission (PRMT) is one
                 of the fundamental problems in distributed computing.
                 It allows a sender to reliably transmit a message to a
                 receiver in an unreliable network, even in the presence
                 of a computationally unbounded adversary. In this
                 article, we study the inherent trade-off between the
                 three important parameters of the PRMT protocols,
                 namely, the network connectivity ($n$), the round
                 complexity ($r$), and the communication complexity by
                 considering the following generic question (which can
                 be considered as the holy grail problem) in the context
                 of the PRMT protocols. Given an $n$-connected network,
                 a message of size $l$ (to be reliably communicated) and
                 a limit $c$ for the total communication allowed between
                 the sender and the receiver, what is the minimum number
                 of communication rounds required by a PRMT protocol to
                 send the message, such that the communication
                 complexity of the protocol is $ O(c)$ ? We answer this
                 interesting question by deriving a nontrivial lower
                 bound on the round complexity. Moreover, we show that
                 the lower bound is tight in the amortized sense, by
                 designing a PRMT protocol whose round complexity
                 matches the lower bound. The lower bound is the first
                 of its kind, that simultaneously captures the inherent
                 tradeoff between the three important parameters of a
                 PRMT protocol.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "22",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Clarkson:2012:SOM,
  author =       "Kenneth L. Clarkson and Elad Hazan and David P.
                 Woodruff",
  title =        "Sublinear optimization for machine learning",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "5",
  pages =        "23:1--23:49",
  month =        oct,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2371656.2371658",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 7 18:15:56 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this article we describe and analyze sublinear-time
                 approximation algorithms for some optimization problems
                 arising in machine learning, such as training linear
                 classifiers and finding minimum enclosing balls. Our
                 algorithms can be extended to some kernelized versions
                 of these problems, such as SVDD, hard margin SVM, and
                 L$_2$-SVM, for which sublinear-time algorithms were not
                 known before. These new algorithms use a combination of
                 a novel sampling techniques and a new multiplicative
                 update algorithm. We give lower bounds which show the
                 running times of many of our algorithms to be nearly
                 best possible in the unit-cost RAM model.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "23",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ambainis:2012:QLL,
  author =       "Andris Ambainis and Julia Kempe and Or Sattath",
  title =        "A quantum {Lov{\'a}sz} local lemma",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "5",
  pages =        "24:1--24:24",
  month =        oct,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2371656.2371659",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 7 18:15:56 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The Lov{\'a}sz Local Lemma (LLL) is a powerful tool in
                 probability theory to show the existence of
                 combinatorial objects meeting a prescribed collection
                 of ``weakly dependent'' criteria. We show that the LLL
                 extends to a much more general geometric setting, where
                 events are replaced with subspaces and probability is
                 replaced with relative dimension, which allows to lower
                 bound the dimension of the intersection of vector
                 spaces under certain independence conditions. Our
                 result immediately applies to the $k$-qsat problem
                 (quantum analog of $k$-sat): For instance we show that
                 any collection of rank-$1$ projectors, with the
                 property that each qubit appears in at most $ 2^k / (e
                 c k)$ of them, has a joint satisfiable state. We then
                 apply our results to the recently studied model of
                 random $k$-qsat. Recent works have shown that the
                 satisfiable region extends up to a density of $1$ in
                 the large $k$ limit, where the density is the ratio of
                 projectors to qubits. Using a hybrid approach building
                 on work by Laumann et al. [2009, 2010] we greatly
                 extend the known satisfiable region for random $k$-qsat
                 to a density of $ \Omega (2^k / k^2)$. Since our tool
                 allows us to show the existence of joint satisfying
                 states without the need to construct them, we are able
                 to penetrate into regions where the satisfying states
                 are conjectured to be entangled, avoiding the need to
                 construct them, which has limited previous approaches
                 to product states.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "24",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Goldberg:2012:APF,
  author =       "Leslie Ann Goldberg and Mark Jerrum",
  title =        "Approximating the partition function of the
                 ferromagnetic {Potts} model",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "5",
  pages =        "25:1--25:31",
  month =        oct,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2371656.2371660",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 7 18:15:56 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We provide evidence that it is computationally
                 difficult to approximate the partition function of the
                 ferromagnetic $q$-state Potts model when $ q > 2$.
                 Specifically, we show that the partition function is
                 hard for the complexity class \#RHPi under
                 approximation-preserving reducibility. Thus, it is as
                 hard to approximate the partition function as it is to
                 find approximate solutions to a wide range of counting
                 problems, including that of determining the number of
                 independent sets in a bipartite graph. Our proof
                 exploits the first-order phase transition of the
                 ``random cluster'' model, which is a probability
                 distribution on graphs that is closely related to the
                 $q$-state Potts model.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "25",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2012:IAF,
  author =       "Victor Vianu",
  title =        "Invited article foreword",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "5",
  pages =        "26:1--26:1",
  month =        oct,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2371656.2371661",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 7 18:15:56 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "26",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Grohe:2012:FPD,
  author =       "Martin Grohe",
  title =        "Fixed-point definability and polynomial time on graphs
                 with excluded minors",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "5",
  pages =        "27:1--27:64",
  month =        oct,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2371656.2371662",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Nov 7 18:15:56 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We give a logical characterization of the
                 polynomial-time properties of graphs embeddable in some
                 surface. For every surface $S$, a property $P$ of
                 graphs embeddable in $S$ is decidable in polynomial
                 time if and only if it is definable in fixed-point
                 logic with counting. It is a consequence of this result
                 that for every surface $S$ there is a $k$ such that a
                 simple combinatorial algorithm, namely ``the
                 $k$-dimensional Weisfeiler-Lehman algorithm'', decides
                 isomorphism of graphs embeddable in $S$ in polynomial
                 time. We also present (without proof) generalizations
                 of these results to arbitrary classes of graphs with
                 excluded minors.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "27",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ostrovsky:2012:ELT,
  author =       "Rafail Ostrovsky and Yuval Rabani and Leonard J.
                 Schulman and Chaitanya Swamy",
  title =        "The effectiveness of {Lloyd}-type methods for the
                 $k$-means problem",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "6",
  pages =        "28:1--28:22",
  month =        dec,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2395116.2395117",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 5 09:36:17 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Special issue text supplied by Joanne Pello.",
  abstract =     "We investigate variants of Lloyd's heuristic for
                 clustering high-dimensional data in an attempt to
                 explain its popularity (a half century after its
                 introduction) among practitioners, and in order to
                 suggest improvements in its application. We propose and
                 justify a clusterability criterion for data sets. We
                 present variants of Lloyd's heuristic that quickly lead
                 to provably near-optimal clustering solutions when
                 applied to well-clusterable instances. This is the
                 first performance guarantee for a variant of Lloyd's
                 heuristic. The provision of a guarantee on output
                 quality does not come at the expense of speed: some of
                 our algorithms are candidates for being faster in
                 practice than currently used variants of Lloyd's
                 method. In addition, our other algorithms are faster on
                 well-clusterable instances than recently proposed
                 approximation algorithms, while maintaining similar
                 guarantees on clustering quality. Our main algorithmic
                 contribution is a novel probabilistic seeding process
                 for the starting configuration of a Lloyd-type
                 iteration.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "28",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harsha:2012:IPP,
  author =       "Prahladh Harsha and Adam Klivans and Raghu Meka",
  title =        "An invariance principle for polytopes",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "6",
  pages =        "29:1--29:25",
  month =        dec,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2395116.2395118",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 5 09:36:17 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Special issue text supplied by Joanne Pello.",
  abstract =     "Let $X$ be randomly chosen from $ \{ - 1, 1 \}^n$, and
                 let $Y$ be randomly chosen from the standard spherical
                 Gaussian on $ R^n$. For any (possibly unbounded)
                 polytope $P$ formed by the intersection of $k$
                 halfspaces, we prove that $ |P r[X \in P] - P r[Y \in
                 P]| \leq \log^{8 / 5} k \cdot \Delta $, where $ \Delta
                 $ is a parameter that is small for polytopes formed by
                 the intersection of ``regular'' halfspaces (i.e.,
                 halfspaces with low influence). The novelty of our
                 invariance principle is the polylogarithmic dependence
                 on $k$. Previously, only bounds that were at least
                 linear in $k$ were known. The proof of the invariance
                 principle is based on a generalization of the Lindeberg
                 method for proving central limit theorems and could be
                 of use elsewhere. We give two important applications of
                 our invariance principle, one from learning theory and
                 the other from pseudorandomness. (1) A bound of $
                 \log^{O(1)} k \cdot \epsilon^{1 / 6}$ on the Boolean
                 noise sensitivity of intersections of $k$ ``regular''
                 halfspaces (previous work gave bounds linear in $k$).
                 This gives a corresponding agnostic learning algorithm
                 for intersections of regular halfspaces. (2) A
                 pseudorandom generator (PRG) for estimating the
                 Gaussian volume of polytopes with k faces within error
                 $ \delta $ and seed-length $ O(\log n \poly (\log k, 1
                 / \delta))$. We also obtain PRGs with similar
                 parameters that fool polytopes formed by intersection
                 of regular halfspaces over the hypercube. Using our PRG
                 constructions, we obtain the first deterministic
                 quasi-polynomial time algorithms for approximately
                 counting the number of solutions to a broad class of
                 integer programs, including dense covering problems and
                 contingency tables.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "29",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Dalvi:2012:DPI,
  author =       "Nilesh Dalvi and Dan Suciu",
  title =        "The dichotomy of probabilistic inference for unions of
                 conjunctive queries",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "6",
  pages =        "30:1--30:87",
  month =        dec,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2395116.2395119",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 5 09:36:17 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Special issue text supplied by Joanne Pello.",
  abstract =     "We study the complexity of computing a query on a
                 probabilistic database. We consider unions of
                 conjunctive queries, UCQ, which are equivalent to
                 positive, existential First Order Logic sentences, and
                 also to nonrecursive datalog programs. The tuples in
                 the database are independent random events. We prove
                 the following dichotomy theorem. For every UCQ query,
                 either its probability can be computed in polynomial
                 time in the size of the database, or is \#P-hard. Our
                 result also has applications to the problem of
                 computing the probability of positive, Boolean
                 expressions, and establishes a dichotomy for such
                 classes based on their structure. For the tractable
                 case, we give a very simple algorithm that alternates
                 between two steps: applying the inclusion/exclusion
                 formula, and removing one existential variable. A key
                 and novel feature of this algorithm is that it avoids
                 computing terms that cancel out in the
                 inclusion/exclusion formula, in other words it only
                 computes those terms whose M{\"o}bius function in an
                 appropriate lattice is nonzero. We show that this
                 simple feature is a key ingredient needed to ensure
                 completeness. For the hardness proof, we give a
                 reduction from the counting problem for positive,
                 partitioned 2CNF, which is known to be \#P-complete.
                 The hardness proof is nontrivial, and combines
                 techniques from logic, classical algebra, and
                 analysis.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "30",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Cousot:2012:TSS,
  author =       "Patrick Cousot and Radhia Cousot and Laurent
                 Mauborgne",
  title =        "Theories, solvers and static analysis by abstract
                 interpretation",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "6",
  pages =        "31:1--31:56",
  month =        dec,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2395116.2395120",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 5 09:36:17 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Special issue text supplied by Joanne Pello.",
  abstract =     "The algebraic/model theoretic design of static
                 analyzers uses abstract domains based on
                 representations of properties and pre-calculated
                 property transformers. It is very efficient. The
                 logical/proof theoretic approach uses SMT
                 solvers/theorem provers and computation of property
                 transformers on-the-fly. It is very expressive. We
                 propose to unify both approaches, so that they can be
                 combined to reach the sweet spot best adapted to a
                 specific application domain in the precision/cost
                 spectrum. We first give a new formalization of the
                 proof theoretic approach in the abstract interpretation
                 framework, introducing a semantics based on multiple
                 interpretations to deal with the soundness of such
                 approaches. Then we describe how to combine them with
                 any other abstract interpretation-based analysis using
                 an iterated reduction to combine abstractions. The key
                 observation is that the Nelson-Oppen procedure, which
                 decides satisfiability in a combination of logical
                 theories by exchanging equalities and disequalities,
                 computes a reduced product (after the state is enhanced
                 with some new ``observations'' corresponding to alien
                 terms). By abandoning restrictions ensuring
                 completeness (such as disjointness, convexity,
                 stably-infiniteness, or shininess, etc.), we can even
                 broaden the application scope of logical abstractions
                 for static analysis (which is incomplete anyway).",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "31",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Ballard:2012:GEC,
  author =       "Grey Ballard and James Demmel and Olga Holtz and Oded
                 Schwartz",
  title =        "Graph expansion and communication costs of fast matrix
                 multiplication",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "6",
  pages =        "32:1--32:23",
  month =        dec,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2395116.2395121",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Sat Jan 5 09:36:17 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Special issue text supplied by Joanne Pello.",
  abstract =     "The communication cost of algorithms (also known as
                 I/O-complexity) is shown to be closely related to the
                 expansion properties of the corresponding computation
                 graphs. We demonstrate this on Strassen's and other
                 fast matrix multiplication algorithms, and obtain the
                 first lower bounds on their communication costs. In the
                 sequential case, where the processor has a fast memory
                 of size $M$, too small to store three $ n \times n$
                 matrices, the lower bound on the number of words moved
                 between fast and slow memory is, for a large class of
                 matrix multiplication algorithms, $ \Omega ((n / \sqrt
                 M)^{\omega_0} \cdot M)$, where $ \omega_0$ is the
                 exponent in the arithmetic count (e.g., $ \omega_0 =
                 \lg 7$ for Strassen, and $ \omega_0 = 3$ for
                 conventional matrix multiplication). With $p$ parallel
                 processors, each with fast memory of size $M$, the
                 lower bound is asymptotically lower by a factor of $p$.
                 These bounds are attainable both for sequential and for
                 parallel algorithms and hence optimal.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "32",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Hansen:2013:SIS,
  author =       "Thomas Dueholm Hansen and Peter Bro Miltersen and Uri
                 Zwick",
  title =        "Strategy Iteration Is Strongly Polynomial for
                 $2$-Player Turn-Based Stochastic Games with a Constant
                 Discount Factor",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "1",
  pages =        "1:1--1:16",
  month =        feb,
  year =         "2013",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2432622.2432623",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Mon Mar 4 16:03:31 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Ye [2011] showed recently that the simplex method with
                 Dantzig's pivoting rule, as well as Howard's policy
                 iteration algorithm, solve discounted Markov decision
                 processes (MDPs), with a constant discount factor, in
                 strongly polynomial time. More precisely, Ye showed
                 that both algorithms terminate after at most {$ O(m n /
                 (1 - \gamma) \log (n / (1 - \gamma))) $} iterations,
                 where $n$ is the number of states, $m$ is the total
                 number of actions in the MDP, and $ 0 < \gamma < 1 $ is
                 the discount factor. We improve Ye's analysis in two
                 respects. First, we improve the bound given by Ye and
                 show that Howard's policy iteration algorithm actually
                 terminates after at most {$ O(m / (1 - \gamma) \log (n
                 / (1 - \gamma))) $} iterations. Second, and more
                 importantly, we show that the same bound applies to the
                 number of iterations performed by the strategy
                 iteration (or strategy improvement) algorithm, a
                 generalization of Howard's policy iteration algorithm
                 used for solving $2$-player turn-based stochastic games
                 with discounted zero-sum rewards. This provides the
                 first strongly polynomial algorithm for solving these
                 games, solving a long standing open problem. Combined
                 with other recent results, this provides a complete
                 characterization of the complexity the standard
                 strategy iteration algorithm for $2$-player turn-based
                 stochastic games; it is strongly polynomial for a fixed
                 discount factor, and exponential otherwise.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "1",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Sarma:2013:DRW,
  author =       "Atish Das Sarma and Danupon Nanongkai and Gopal
                 Pandurangan and Prasad Tetali",
  title =        "Distributed Random Walks",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "1",
  pages =        "2:1--2:31",
  month =        feb,
  year =         "2013",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2432622.2432624",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Mon Mar 4 16:03:31 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Performing random walks in networks is a fundamental
                 primitive that has found applications in many areas of
                 computer science, including distributed computing. In
                 this article, we focus on the problem of sampling
                 random walks efficiently in a distributed network and
                 its applications. Given bandwidth constraints, the goal
                 is to minimize the number of rounds required to obtain
                 random walk samples. All previous algorithms that
                 compute a random walk sample of length $ \ell $ as a
                 subroutine always do so naively, that is, in {$ O(\ell)
                 $} rounds. The main contribution of this article is a
                 fast distributed algorithm for performing random walks.
                 We present a sublinear time distributed algorithm for
                 performing random walks whose time complexity is
                 sublinear in the length of the walk. Our algorithm
                 performs a random walk of length $ \ell $ in {$ \tilde
                 {O}(\sqrt {\ell } D) $} rounds ({$ \tilde {O} $} hides
                 $ \polylog n $ factors where $n$ is the number of nodes
                 in the network) with high probability on an undirected
                 network, where {$D$} is the diameter of the network.
                 For small diameter graphs, this is a significant
                 improvement over the naive {$ O(\ell) $} bound.
                 Furthermore, our algorithm is optimal within a
                 poly-logarithmic factor as there exists a matching
                 lower bound [Nanongkai et al. 2011]. We further extend
                 our algorithms to efficiently perform k independent
                 random walks in {$ \tilde {O}(\sqrt {k \ell } D + k) $}
                 rounds. We also show that our algorithm can be applied
                 to speedup the more general Metropolis--Hastings
                 sampling. Our random-walk algorithms can be used to
                 speed up distributed algorithms in applications that
                 use random walks as a subroutine. We present two main
                 applications. First, we give a fast distributed
                 algorithm for computing a random spanning tree (RST) in
                 an arbitrary (undirected unweighted) network which runs
                 in {$ \tilde {O}(\sqrt m D) $} rounds with high
                 probability ($m$ is the number of edges). Our second
                 application is a fast decentralized algorithm for
                 estimating mixing time and related parameters of the
                 underlying network. Our algorithm is fully
                 decentralized and can serve as a building block in the
                 design of topologically-aware networks.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "2",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Harrow:2013:TPS,
  author =       "Aram W. Harrow and Ashley Montanaro",
  title =        "Testing Product States, Quantum {Merlin--Arthur} Games
                 and Tensor Optimization",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "1",
  pages =        "3:1--3:43",
  month =        feb,
  year =         "2013",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2432622.2432625",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Mon Mar 4 16:03:31 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We give a test that can distinguish efficiently
                 between product states of n quantum systems and states
                 that are far from product. If applied to a state $ |
                 \psi > $ whose maximum overlap with a product state is
                 $ 1 - \epsilon $, the test passes with probability {$ 1
                 - \Theta (\epsilon) $}, regardless of $n$ or the local
                 dimensions of the individual systems. The test uses two
                 copies of $ | \psi > $. We prove correctness of this
                 test as a special case of a more general result
                 regarding stability of maximum output purity of the
                 depolarizing channel. A key application of the test is
                 to quantum Merlin--Arthur games with multiple Merlins,
                 where we obtain several structural results that had
                 been previously conjectured, including the fact that
                 efficient soundness amplification is possible and that
                 two Merlins can simulate many Merlins: QMA(k) = QMA(2)
                 for $ k \geq 2 $. Building on a previous result of
                 Aaronson et al., this implies that there is an
                 efficient quantum algorithm to verify $3$-SAT with
                 constant soundness, given two unentangled proofs of {$
                 \tilde {O}(\sqrt n) $} qubits. We also show how QMA(2)
                 with log-sized proofs is equivalent to a large number
                 of problems, some related to quantum information (such
                 as testing separability of mixed states) as well as
                 problems without any apparent connection to quantum
                 mechanics (such as computing injective tensor norms of
                 $3$-index tensors). As a consequence, we obtain many
                 hardness-of-approximation results, as well as potential
                 algorithmic applications of methods for approximating
                 QMA(2) acceptance probabilities. Finally, our test can
                 also be used to construct an efficient test for
                 determining whether a unitary operator is a tensor
                 product, which is a generalization of classical
                 linearity testing.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "3",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Batu:2013:TCD,
  author =       "Tugkan Batu and Lance Fortnow and Ronitt Rubinfeld and
                 Warren D. Smith and Patrick White",
  title =        "Testing Closeness of Discrete Distributions",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "1",
  pages =        "4:1--4:25",
  month =        feb,
  year =         "2013",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2432622.2432626",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Mon Mar 4 16:03:31 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Given samples from two distributions over an
                 $n$-element set, we wish to test whether these
                 distributions are statistically close. We present an
                 algorithm which uses sublinear in $n$, specifically, {$
                 O(n^{2 / 3} \epsilon^{ - 8 / 3} \log n) $}, independent
                 samples from each distribution, runs in time linear in
                 the sample size, makes no assumptions about the
                 structure of the distributions, and distinguishes the
                 cases when the distance between the distributions is
                 small (less than $ \epsilon^{4 / 3} n^{ - 1 / 3} / 32,
                 \epsilon n^{-1 / 2} / 4 $) or large (more than $
                 \epsilon $) in $ \ell_1 $ distance. This result can be
                 compared to the lower bound of $ \Omega (n^{2 / 3}
                 \epsilon^{ - 2 / 3}) $ for this problem given by
                 Valiant [2008]. Our algorithm has applications to the
                 problem of testing whether a given Markov process is
                 rapidly mixing. We present sublinear algorithms for
                 several variants of this problem as well.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "4",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Vianu:2013:IAFa,
  author =       "Victor Vianu",
  title =        "Invited Article Foreword",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "1",
  pages =        "5:1--5:1",
  month =        feb,
  year =         "2013",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2432622.2432627",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Mon Mar 4 16:03:31 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "5",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Byrka:2013:STA,
  author =       "Jaroslaw Byrka and Fabrizio Grandoni and Thomas
                 Rothvoss and Laura Sanit{\`a}",
  title =        "{Steiner} Tree Approximation via Iterative Randomized
                 Rounding",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "1",
  pages =        "6:1--6:33",
  month =        feb,
  year =         "2013",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2432622.2432628",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Mon Mar 4 16:03:31 MST 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The Steiner tree problem is one of the most
                 fundamental NP -hard problems: given a weighted
                 undirected graph and a subset of terminal nodes, find a
                 minimum-cost tree spanning the terminals. In a sequence
                 of papers, the approximation ratio for this problem was
                 improved from 2 to 1.55 [Robins and Zelikovsky 2005].
                 All these algorithms are purely combinatorial. A
                 long-standing open problem is whether there is an LP
                 relaxation of Steiner tree with integrality gap smaller
                 than 2 [Rajagopalan and Vazirani 1999]. In this article
                 we present an LP-based approximation algorithm for
                 Steiner tree with an improved approximation factor. Our
                 algorithm is based on a, seemingly novel, iterative
                 randomized rounding technique. We consider an LP
                 relaxation of the problem, which is based on the notion
                 of directed components. We sample one component with
                 probability proportional to the value of the associated
                 variable in a fractional solution: the sampled
                 component is contracted and the LP is updated
                 consequently. We iterate this process until all
                 terminals are connected. Our algorithm delivers a
                 solution of cost at most $ \ln (4) + \epsilon < 1.39 $
                 times the cost of an optimal Steiner tree. The
                 algorithm can be derandomized using the method of
                 limited independence. As a by-product of our analysis,
                 we show that the integrality gap of our LP is at most
                 1.55, hence answering the mentioned open question.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "6",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Angelopoulos:2013:PLU,
  author =       "Spyros Angelopoulos and Pascal Schweitzer",
  title =        "Paging and list update under bijective analysis",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "2",
  pages =        "7:1--7:18",
  month =        apr,
  year =         "2013",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Fri May 24 16:19:11 MDT 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "It has long been known that for the paging problem in
                 its standard form, competitive analysis cannot
                 adequately distinguish algorithms based on their
                 performance: there exists a vast class of algorithms
                 that achieve the same competitive ratio, ranging from
                 extremely naive and inefficient strategies (such as
                 Flush-When-Full), to strategies of excellent
                 performance in practice (such as Least-Recently-Used
                 and some of its variants). A similar situation arises
                 in the list update problem: in particular, under the
                 cost formulation studied by Mart{\'\i}nez and Roura
                 [2000] and Munro [2000] every list update algorithm
                 has, asymptotically, the same competitive ratio.
                 Several refinements of competitive analysis, as well as
                 alternative performance measures have been introduced
                 in the literature, with varying degrees of success in
                 narrowing this disconnect between theoretical analysis
                 and empirical evaluation. In this article, we study
                 these two fundamental online problems under the
                 framework of bijective analysis [Angelopoulos et al.
                 2007, 2008]. This is an intuitive technique that is
                 based on pairwise comparison of the costs incurred by
                 two algorithms on sets of request sequences of the same
                 size. Coupled with a well-established model of locality
                 of reference due to Albers et al. [2005], we show that
                 Least-Recently-Used and Move-to-Front are the unique
                 optimal algorithms for paging and list update,
                 respectively. Prior to this work, only measures based
                 on average-cost analysis have separated LRU and MTF
                 from all other algorithms. Given that bijective
                 analysis is a fairly stringent measure (and also
                 subsumes average-cost analysis), we prove that in a
                 strong sense LRU and MTF stand out as the best
                 (deterministic) algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "7",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Balcan:2013:CUA,
  author =       "Maria-Florina Balcan and Avrim Blum and Anupam Gupta",
  title =        "Clustering under approximation stability",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "2",
  pages =        "8:1--8:34",
  month =        apr,
  year =         "2013",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Fri May 24 16:19:11 MDT 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "A common approach to clustering data is to view data
                 objects as points in a metric space, and then to
                 optimize a natural distance-based objective such as the
                 $k$-median, $k$-means, or min-sum score. For
                 applications such as clustering proteins by function or
                 clustering images by subject, the implicit hope in
                 taking this approach is that the optimal solution for
                 the chosen objective will closely match the desired
                 ``target'' clustering (e.g., a correct clustering of
                 proteins by function or of images by who is in them).
                 However, most distance-based objectives, including
                 those mentioned here, are NP-hard to optimize. So, this
                 assumption by itself is not sufficient, assuming P $
                 \neq $ NP, to achieve clusterings of low-error via
                 polynomial time algorithms. In this article, we show
                 that we can bypass this barrier if we slightly extend
                 this assumption to ask that for some small constant
                 $c$, not only the optimal solution, but also all
                 $c$-approximations to the optimal solution, differ from
                 the target on at most some $ \epsilon $ fraction of
                 points --- we call this $ (c, \epsilon)
                 $-approximation-stability. We show that under this
                 condition, it is possible to efficiently obtain
                 low-error clusterings even if the property holds only
                 for values $c$ for which the objective is known to be
                 NP-hard to approximate. Specifically, for any constant
                 $ c > 1 $, $ (c, \epsilon) $ approximation-stability of
                 $k$-median or $k$-means objectives can be used to
                 efficiently produce a clustering of error {$
                 O(\epsilon) $} with respect to the target clustering,
                 as can stability of the min-sum objective if the target
                 clusters are sufficiently large. Thus, we can perform
                 nearly as well in terms of agreement with the target
                 clustering as if we could approximate these objectives
                 to this NP-hard value.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "8",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Levin:2013:FI,
  author =       "Leonid A. Levin",
  title =        "Forbidden information",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "2",
  pages =        "9:1--9:9",
  month =        apr,
  year =         "2013",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Fri May 24 16:19:11 MDT 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "G{\"o}del Incompleteness Theorem leaves open a way
                 around it, vaguely perceived for a long time but not
                 clearly identified. (Thus, G{\"o}del believed informal
                 arguments can answer any math question.) Closing this
                 loophole does not seem obvious and involves Kolmogorov
                 complexity. (This is unrelated to, well studied before,
                 complexity quantifications of the usual G{\"o}del
                 effects.) I consider extensions {$U$} of the universal
                 partial recursive predicate (or, say, Peano
                 Arithmetic). I prove that any {$U$} either leaves an
                 $n$-bit input (statement) unresolved or contains nearly
                 all information about the $n$-bit prefix of any r.e.
                 real $ \rho $ (which is $n$ bits for some $ \rho $). I
                 argue that creating significant information about a
                 specific math sequence is impossible regardless of the
                 methods used. Similar problems and answers apply to
                 other unsolvability results for tasks allowing multiple
                 solutions, for example, nonrecursive tilings.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "9",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Kolmogorov:2013:CCV,
  author =       "Vladimir Kolmogorov and Stanislav Zivn{\'y}",
  title =        "The complexity of conservative valued {CSPs}",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "2",
  pages =        "10:1--10:38",
  month =        apr,
  year =         "2013",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Fri May 24 16:19:11 MDT 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study the complexity of valued constraint
                 satisfaction problems (VCSPs) parametrized by a
                 constraint language, a fixed set of cost functions over
                 a finite domain. An instance of the problem is
                 specified by a sum of cost functions from the language
                 and the goal is to minimize the sum. Under the unique
                 games conjecture, the approximability of finite-valued
                 VCSPs is well understood, see Raghavendra [2008].
                 However, there is no characterization of finite-valued
                 VCSPs, let alone general-valued VCSPs, that can be
                 solved exactly in polynomial time, thus giving insights
                 from a combinatorial optimization perspective. We
                 consider the case of languages containing all possible
                 unary cost functions. In the case of languages
                 consisting of only $ \{ 0, \infty \} $- valued cost
                 functions (i.e., relations), such languages have been
                 called conservative and studied by Bulatov [2003, 2011]
                 and recently by Barto [2011]. Since we study valued
                 languages, we call a language conservative if it
                 contains all finite - valued unary cost functions. The
                 computational complexity of conservative valued
                 languages has been studied by Cohen et al. [2006] for
                 languages over Boolean domains, by Deineko et al.
                 [2008] for $ \{ 0, 1 \} $ valued languages (a.k.a
                 Max-CSP), and by Takhanov [2010a] for $ \{ 0, \infty \}
                 $-valued languages containing all finite-valued unary
                 cost functions (a.k.a. Min-Cost-Hom).\par

                 We prove a Schaefer-like dichotomy theorem for
                 conservative valued languages: if all cost functions in
                 the language satisfy a certain condition (specified by
                 a complementary combination of {\em STP and MJN
                 multimorphisms\/}), then any instance can be solved in
                 polynomial time (via a new algorithm developed in this
                 article), otherwise the language is NP-hard. This is
                 the first complete complexity classification of {\em
                 general-valued constraint languages\/} over non-Boolean
                 domains. It is a common phenomenon that complexity
                 classifications of problems over non-Boolean domains
                 are significantly harder than the Boolean cases. The
                 polynomial-time algorithm we present for the tractable
                 cases is a generalization of the submodular
                 minimization problem and a result of Cohen et al.
                 [2008].\par

                 Our results generalize previous results by Takhanov
                 [2010a] and (a subset of results) by Cohen et al.
                 [2006] and Deineko et al. [2008]. Moreover, our results
                 do not rely on any computer-assisted search as in
                 Deineko et al. [2008], and provide a powerful tool for
                 proving hardness of finite-valued and general-valued
                 languages.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "10",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Georgiou:2013:AG,
  author =       "Chryssis Georgiou and Seth Gilbert and Rachid
                 Guerraoui and Dariusz R. Kowalski",
  title =        "Asynchronous gossip",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "2",
  pages =        "11:1--11:42",
  month =        apr,
  year =         "2013",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Fri May 24 16:19:11 MDT 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study the complexity of gossip in an asynchronous,
                 message-passing fault-prone distributed system. We show
                 that an adaptive adversary can significantly hamper the
                 spreading of a rumor, while an oblivious adversary
                 cannot. The algorithmic techniques proposed in this
                 article can be used for improving the message
                 complexity of distributed algorithms that rely on an
                 all-to-all message exchange paradigm and are designed
                 for an asynchronous environment. As an example, we show
                 how to improve the message complexity of asynchronous
                 randomized consensus.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "11",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Blum:2013:LTA,
  author =       "Avrim Blum and Katrina Ligett and Aaron Roth",
  title =        "A learning theory approach to noninteractive database
                 privacy",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "2",
  pages =        "12:1--12:25",
  month =        apr,
  year =         "2013",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Fri May 24 16:19:11 MDT 2013",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In this article, we demonstrate that, ignoring
                 computational constraints, it is possible to release
                 synthetic databases that are useful for accurately
                 answering large classes of queries while preserving
                 differential privacy. Specifically, we give a mechanism
                 that privately releases synthetic data useful for
                 answering a class of queries over a discrete domain
                 with error that grows as a function of the size of the
                 smallest net approximately representing the answers to
                 that class of queries. We show that this in particular
                 implies a mechanism for counting queries that gives
                 error guarantees that grow only with the VC-dimension
                 of the class of queries, which itself grows at most
                 logarithmically with the size of the query class. We
                 also show that it is not possible to release even
                 simple classes of queries (such as intervals and their
                 generalizations) over continuous domains with
                 worst-case utility guarantees while preserving
                 differential privacy. In response to this, we consider
                 a relaxation of the utility guarantee and give a
                 privacy preserving polynomial time algorithm that for
                 any halfspace query will provide an answer that is
                 accurate for some small perturbation of the query. This
                 algorithm does not release synthetic data, but instead
                 another data structure capable of representing an
                 answer for each query. We also give an efficient
                 algorithm for releasing synthetic data for the class of
                 interval queries and axis-aligned rectangles of
                 constant dimension over discrete domains.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Assoc. Comput. Mach.",
  articleno =    "12",
  fjournal =     "Journal of the ACM",
  journal-URL =  "https://dl.acm.org/loi/jacm",
}

@Article{Seshadhri:2013:DAS,
  author =       "C. Seshadhri and Ali Pinar and Tamara G. Kolda",
  title =        "An in-depth analysis of stochastic {Kronecker}
                 graphs",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "2",
  pages =        "13:1--13:32",
  month =        apr,
  year =         "2013",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Fri May 24 16:19:11 MDT 2013",
  bibsource =    "http://portal.acm.org/;