Table of contents for issues of Communications of the ACM

Last update: Thu Jan 4 10:16:05 MST 2018                Valid HTML 3.2!

Volume 4, Number 4, April, 1961
Volume 5, Number 12, December, 1962
Volume 6, Number 6, June, 1963
Volume 6, Number 7, July, 1963
Volume 6, Number 8, August, 1963
Volume 6, Number 12, December, 1963
Volume 7, Number 3, March, 1964
Volume 7, Number 8, August, 1964
Volume 7, Number 12, December, 1964
Volume 8, Number 8, August, 1965
Volume 8, Number 10, October, 1965
Volume 9, Number 4, April, 1966
Volume 9, Number 5, May, 1966
Volume 10, Number 4, April, 1967
Volume 10, Number 11, November, 1967
Volume 11, Number 2, February, 1968
Volume 11, Number 3, March, 1968
Volume 11, Number 6, June, 1968
Volume 11, Number 12, December, 1968
Volume 12, Number 3, March, 1969
Volume 12, Number 5, May, 1969
Volume 12, Number 7, July, 1969
Volume 12, Number 9, September, 1969
Volume 12, Number 10, October, 1969
Volume 12, Number 11, November, 1969
Volume 13, Number 1, January, 1970
Volume 13, Number 2, February, 1970
Volume 13, Number 3, March, 1970
Volume 13, Number 4, April, 1970
Volume 13, Number 5, May, 1970
Volume 13, Number 6, June, 1970
Volume 13, Number 7, July, 1970
Volume 13, Number 8, August, 1970
Volume 13, Number 9, September, 1970
Volume 13, Number 10, October, 1970
Volume 13, Number 11, November, 1970
Volume 13, Number 12, December, 1970
Volume 14, Number 1, January, 1971
Volume 14, Number 2, February, 1971
Volume 14, Number 3, March, 1971
Volume 14, Number 4, April, 1971
Volume 14, Number 5, May, 1971
Volume 14, Number 6, June, 1971
Volume 14, Number 7, July, 1971
Volume 14, Number 8, August, 1971
Volume 14, Number 9, September, 1971
Volume 14, Number 10, October, 1971
Volume 14, Number 11, November, 1971
Volume 14, Number 12, December, 1971
Volume 15, Number 1, January, 1972
Volume 15, Number 2, February, 1972
Volume 15, Number 3, March, 1972
Volume 15, Number 4, April, 1972
Volume 15, Number 5, May, 1972
Volume 15, Number 6, June, 1972
Volume 15, Number 7, July, 1972
Volume 15, Number 8, August, 1972
Volume 15, Number 9, September, 1972
Volume 15, Number 10, October, 1972
Volume 15, Number 11, November, 1972
Volume 15, Number 12, December, 1972
Volume 15, Number 2, February, 1973
Volume 16, Number 1, January, 1973
Volume 16, Number 2, February, 1973
Volume 16, Number 3, March, 1973
Volume 16, Number 4, April, 1973
Volume 16, Number 5, May, 1973
Volume 16, Number 6, June, 1973
Volume 16, Number 7, July, 1973
Volume 16, Number 8, August, 1973
Volume 16, Number 9, September, 1973
Volume 16, Number 10, October, 1973
Volume 16, Number 11, November, 1973
Volume 16, Number 12, December, 1973
Volume 17, Number 1, January, 1974
Volume 17, Number 2, February, 1974
Volume 17, Number 3, March, 1974
Volume 17, Number 4, April, 1974
Volume 17, Number 5, May, 1974
Volume 17, Number 6, June, 1974
Volume 17, Number 7, July, 1974
Volume 17, Number 8, August, 1974
Volume 17, Number 9, 1974
Volume 17, Number 10, October, 1974
Volume 17, Number 11, November, 1974
Volume 17, Number 12, December, 1974
Volume 18, Number 1, 1975
Volume 18, Number 2, February, 1975
Volume 18, Number 3, March, 1975
Volume 18, Number 4, April, 1975
Volume 18, Number 5, May, 1975
Volume 18, Number 6, June, 1975
Volume 18, Number 7, July, 1975
Volume 18, Number 8, August, 1975
Volume 18, Number 9, September, 1975
Volume 18, Number 10, October, 1975
Volume 18, Number 11, November, 1975
Volume 18, Number 12, December, 1975
Volume 19, Number 1, January, 1976
Volume 19, Number 2, February, 1976
Volume 19, Number 3, March, 1976
Volume 19, Number 4, April, 1976
Volume 19, Number 5, May, 1976
Volume 19, Number 6, June, 1976
Volume 19, Number 7, July, 1976
Volume 19, Number 8, August, 1976
Volume 19, Number 9, September, 1976
Volume 19, Number 10, 1976
Volume 19, Number 11, November, 1976
Volume 19, Number 12, December, 1976
Volume 20, Number 1, January, 1977
Volume 20, Number 2, February, 1977
Volume 20, Number 3, March, 1977
Volume 20, Number 4, April, 1977
Volume 20, Number 5, May, 1977
Volume 20, Number 6, June, 1977
Volume 20, Number 7, July, 1977
Volume 20, Number 8, 1977
Volume 20, Number 9, September, 1977
Volume 20, Number 10, October, 1977
Volume 20, Number 11, November, 1977
Volume 20, Number 12, December, 1977
Volume 21, Number 1, 1978
Volume 21, Number 2, February, 1978
Volume 21, Number 3, March, 1978
Volume 21, Number 4, April, 1978
Volume 21, Number 5, May, 1978
Volume 21, Number 6, June, 1978
Volume 21, Number 7, July, 1978
Volume 21, Number 8, August, 1978
Volume 21, Number 9, September, 1978
Volume 21, Number 10, October, 1978
Volume 21, Number 11, November, 1978
Volume 21, Number 12, December, 1978
Volume 22, Number 1, January, 1979
Volume 22, Number 2, February, 1979
Volume 22, Number 3, March, 1979
Volume 22, Number 4, April, 1979
Volume 22, Number 5, May, 1979
Volume 22, Number 6, June, 1979
Volume 22, Number 7, July, 1979
Volume 22, Number 8, August, 1979
Volume 22, Number 9, September, 1979
Volume 22, Number 10, October, 1979
Volume 22, Number 11, November, 1979
Volume 22, Number 12, 1979
Volume 33, Number 6, June, 1990
Volume 33, Number 8, August, 1990
Volume 34, Number 11, November, 1991
Volume 6, Number 4, December, 1974
Volume 23, Number 1, January, 1976
Volume 19, 1972
Volume 6, Number 2, June, 1977
Volume 12, Number 1, January, 1982
Volume 1, Number 3, September, 1975
Volume 1, Number 9, September, 1975
Volume 2, Number 1, March, 1976
Volume 2, Number 2, June, 1976
Volume 2, Number 3, September, 1976
Volume 2, Number 4, December, 1976
Volume 3, Number 1, March, 1977
Volume 3, Number 2, June, 1977
Volume 3, Number 3, September, 1977
Volume 4, Number 1, March, 1978
Volume 4, Number 3, September, 1978
Volume 5, Number 2, June, 1979
Volume 5, Number 4, December, 1979
Volume 6, Number 3, September, 1980
Volume 7, Number 2, June, 1981
Volume 26, Number 8, August, 1983
Volume 11, Number 4, December, 1985
Volume 11, Number 2, June, 1985
Volume 28, Number 4, April, 1985
Volume 29, Number 4, April, 1986


Communications of the ACM
Volume 4, Number 4, April, 1961

                  J. R. Herndon   ACM Algorithm 49: Spherical Neumann
                                  Function . . . . . . . . . . . . . . . . 179


Communications of the ACM
Volume 5, Number 12, December, 1962

                   J. N. Merner   ACM Algorithm 149: Complete Elliptic
                                  Integral . . . . . . . . . . . . . . . . 605


Communications of the ACM
Volume 6, Number 6, June, 1963

                  T. D. Arthurs   ACM Algorithm 176: Least Squares Surface
                                  Fit  . . . . . . . . . . . . . . . . . . 313
                   O. G. Ludwig   ACM Algorithm 179: Incomplete Beta Ratio 314

Communications of the ACM
Volume 6, Number 7, July, 1963

                    A. P. Relph   ACM Algorithm 191: Hypergeometric  . . . 388--389

Communications of the ACM
Volume 6, Number 8, August, 1963

                  D. H. Thurnau   ACM Algorithm 195: BANDSOLVE . . . . . . 441

Communications of the ACM
Volume 6, Number 12, December, 1963

                     R. H. Kase   ACM Algorithm 219: Topological Ordering
                                  for Pert Networks  . . . . . . . . . . . 738--739


Communications of the ACM
Volume 7, Number 3, March, 1964

                    W. Gautschi   ACM Algorithm 222: Incomplete Beta
                                  Function Ratios  . . . . . . . . . . . . 143--144

Communications of the ACM
Volume 7, Number 8, August, 1964

                    W. Gautschi   ACM Algorithm 236: Bessel Functions of
                                  the First Kind [S17] . . . . . . . . . . 479--480

Communications of the ACM
Volume 7, Number 12, December, 1964

                   J. Boothroyd   ACM Algorithm 246: Graycode  . . . . . . 701
                    R. W. Floyd   ACM Algorithm 245: Treesort 3  . . . . . 701


Communications of the ACM
Volume 8, Number 8, August, 1965

                    W. Gautschi   ACM Algorithm 259: Legendre Functions
                                  for Arguments Larger than One  . . . . . 488--492

Communications of the ACM
Volume 8, Number 10, October, 1965

                 M. C. Pike and   
                     I. D. Hill   ACM Algorithm 266: Pseudo-Random Numbers 605--606


Communications of the ACM
Volume 9, Number 4, April, 1966

                Walter Gautschi   Algorithm 282: Derivatives of $e^x/x$,
                                  $\cos(x)/x$, and $\sin(x)/x$ . . . . . . 272--272

Communications of the ACM
Volume 9, Number 5, May, 1966

                    W. Fletcher   ACM Algorithm 284: Interchange of Two
                                  Blocks of Data . . . . . . . . . . . . . 326


Communications of the ACM
Volume 10, Number 4, April, 1967

                 I. D. Hill and   
                     M. C. Pike   ACM Algorithm 299: Chi-Squared Integral  243--244
                     J. H. Gunn   ACM Algorithm 300: Coulomb Wave
                                  Functions  . . . . . . . . . . . . . . . 244--245

Communications of the ACM
Volume 10, Number 11, November, 1967

                    K. M. Brown   ACM Algorithm 316: Solution of
                                  Simultaneous Nonlinear Equations . . . . 728--729


Communications of the ACM
Volume 11, Number 2, February, 1968

                R. J. Ord-Smith   ACM Algorithm 323: Generation of
                                  Permutations in Lexicographic Order  . . 117
                       G. Bayer   ACM Algorithm 324: Maxflow . . . . . . . 117--118

Communications of the ACM
Volume 11, Number 3, March, 1968

           Edsger Wybe Dijkstra   Go to statement considered harmful . . . 147--148

Communications of the ACM
Volume 11, Number 6, June, 1968

                 B. F. W. Witte   ACM Algorithm 332: Jacobi Polynomials    436--437
              R. C. Salazar and   
                      S. K. Sen   ACM Algorithm 333: Minit Algorithm For
                                  Linear Programming . . . . . . . . . . . 437--440

Communications of the ACM
Volume 11, Number 12, December, 1968

                    J. Grad and   
                  M. A. Brebner   ACM Algorithm 343: Eigenvalues and
                                  Eigenvectors of a Real Generator Matrix  820--826


Communications of the ACM
Volume 12, Number 3, March, 1969

                R. C. Singleton   ACM Algorithm 347: An Efficient
                                  Algorithm for Sorting with Minimal
                                  Storage  . . . . . . . . . . . . . . . . 185--187

Communications of the ACM
Volume 12, Number 5, May, 1969

         ANSI Subcommittee X3J3   Clarification of Fortran Standards ---
                                  Initial Progress . . . . . . . . . . . . 289--294

Communications of the ACM
Volume 12, Number 7, July, 1969

                    D. S. Clemm   ACM Algorithm 352: Characteristic Values
                                  and Associated Solutions of Mathieu's
                                  Differential Equation  . . . . . . . . . 399--407 (or 399--406??)

Communications of the ACM
Volume 12, Number 9, September, 1969

                       N. Wirth   On Multiprogramming, Machine Coding, and
                                  Computer Organization  . . . . . . . . . 489--498
                   I. M. Leitch   Certification of ACM Algorithm 323 [G6]:
                                  Generation of Permutations in
                                  Lexicographic Order  . . . . . . . . . . 512--512

Communications of the ACM
Volume 12, Number 10, October, 1969

                R. C. Singleton   ACM Algorithm 357: An Efficient Prime
                                  Number Generator . . . . . . . . . . . . 563--564

Communications of the ACM
Volume 12, Number 11, November, 1969

                    W. Gautschi   ACM Algorithm 363: Complex Error
                                  Function . . . . . . . . . . . . . . . . 635


Communications of the ACM
Volume 13, Number 1, January, 1970

                     T. C. Lowe   Automatic segmentation of cyclic program
                                  structures based on connectivity and
                                  processor timing . . . . . . . . . . . . 3--6
            Walter Gautschi and   
                 Bruce J. Klein   Recursive computation of certain
                                  derivatives --- A study of error
                                  propagation  . . . . . . . . . . . . . . 7--9
              A. P. Mullery and   
                 G. C. Driscoll   A processor allocation method for
                                  time-sharing . . . . . . . . . . . . . . 10--14
                  R. F. Simmons   Natural Language Question-Answering
                                  Systems: 1969  . . . . . . . . . . . . . 15--30
                    E. T. Irons   Experience with an extensible language   31--40
                  Ugo Montanari   A note on minimal length polygonal
                                  approximation to a digitized contour . . 41--47
                Harald Stehfest   ACM Algorithm 368: Numerical Inversion
                                  of Laplace Transforms  . . . . . . . . . 47--49
                 H. E. Schaffer   ACM Algorithm 369: Generator of Random
                                  Numbers Satisfying the Poisson
                                  Distribution . . . . . . . . . . . . . . 49--49
                   E. L. Butler   ACM Algorithm 370: General Random Number
                                  Generator  . . . . . . . . . . . . . . . 49--52
                 J. K. S. McKay   ACM Algorithm 371: Partitions in Natural
                                  Order  . . . . . . . . . . . . . . . . . 52--52
                   K. B. Dunham   ACM Algorithm 372: An Algorithm to
                                  Produce Complex Primes CSIEVE  . . . . . 52--54
            Walter Gautschi and   
                 Bruce J. Klein   Remark on Algorithm 282, Derivatives of
                                  $e^x / x$, $\cos(x) / x$, and $\sin(x) /
                                  x$ . . . . . . . . . . . . . . . . . . . 53--54
                 R. Griffin and   
                   K. A. Redich   Remark on ``Algorithm 347: An Efficient
                                  Algorithm for Sorting with Minimal
                                  Storage [M1], by R. C. Singleton'' . . . 54--54
                      Anonymous   Representation for calendar date for
                                  machine-to-machine data interchange  . . 55--55
                      Anonymous   Interchange rolls of perforated tape for
                                  information interchange  . . . . . . . . 56--56
                    W. H. Payne   Fortran Tausworthe pseudorandom number
                                  generator  . . . . . . . . . . . . . . . 57--57

Communications of the ACM
Volume 13, Number 2, February, 1970

             David K. Hsiao and   
                Frank D. Harary   A Formal System for Information
                                  Retrieval from Files . . . . . . . . . . 67--73
          E. von Glaserfeld and   
                   P. P. Pisani   The multistore parser for hierarchical
                                  syntactic structures . . . . . . . . . . 74--82
                    Steven Vere   Translation equations  . . . . . . . . . 83--89
                   H. L. Morgan   Spelling correction in systems programs  90--94
                     Jay Earley   An Efficient Context-Free Parsing
                                  Algorithm  . . . . . . . . . . . . . . . 94--102
                    C. E. Radke   The Use of Quadratic Residue Research    103--105
                       B. Jones   A Variation on Sorting by Address
                                  Calculation  . . . . . . . . . . . . . . 105--107
                  James R. Bell   The Quadratic Quotient Method: A Hash
                                  Code Eliminating Secondary Clustering    107--109
                 D. N. Ness and   
                R. S. Green and   
               W. A. Martin and   
                  G. A. Moulton   Computer education in a graduate school
                                  of management  . . . . . . . . . . . . . 110--114, 19
              M. F. Robbins and   
                    J. D. Beyer   An interactive computer system using
                                  graphical flowchart input  . . . . . . . 115--119
                    J. S. White   ACM Algorithm 373: Number of Doubly
                                  Restricted Partitions  . . . . . . . . . 120--120
                    J. S. White   ACM Algorithm 374: Restricted Partition
                                  Generator  . . . . . . . . . . . . . . . 120--120
                  H. Späth   ACM Algorithm 375: Fitting Data to One
                                  Exponential  . . . . . . . . . . . . . . 120--121
                  H. Späth   ACM Algorithm 376: Least Squares Fit by
                                  $f(x)=A\cos(Bx+C)$ . . . . . . . . . . . 121--122

Communications of the ACM
Volume 13, Number 3, March, 1970

             R. R. Fenichel and   
              J. Weizenbaum and   
                J. C. Yochelson   A Program to Teach Programming . . . . . 141--146
               J. R. Slagle and   
                    J. K. Dixon   Experiments with the M & N Tree-Searching
                                  Program  . . . . . . . . . . . . . . . . 147--154, 159
                  A. Batson and   
             Shy-Ming M. Ju and   
                     D. C. Wood   Measurements of Segment Size . . . . . . 155--159
                   G. A. Watson   On an Algorithm for Nonlinear Minimax
                                  Approximation  . . . . . . . . . . . . . 160--162
               D. G. Schweikert   A Comparison of Error Improvement
                                  Estimates for Adaptive Trapezoid
                                  Integration  . . . . . . . . . . . . . . 163--166
         Robert M. Schwarcz and   
             John F. Burger and   
              Robert F. Simmons   A Deductive Question Answerer for
                                  Natural Language Inference . . . . . . . 167--183
             A. F. Cardenas and   
                  W. J. Karplus   PDEL --- a Language for Partial
                                  Differential Equations . . . . . . . . . 184--191
          Michael J. Levine and   
             Stanley M. Swanson   ACM Algorithm 377: Symbolic Expansion of
                                  Algebraic Expressions  . . . . . . . . . 191--192
                   M. V. Kailas   Another method of converting from
                                  hexadecimal to decimal . . . . . . . . . 193--193
                       D. Pager   A number system for the permutations . . 193--193
              J. R. H. Dempster   Comment on a Paging Anomaly  . . . . . . 193--194
                   H. A. Maurer   A Note on the Complement of Inherently
                                  Ambiguous Context-Free Languages . . . . 194--194
                D. K. Hsiao and   
                   F. D. Harary   Corrigenda: ``A Formal System for
                                  Information Retrieval from Files'' . . . 266--266

Communications of the ACM
Volume 13, Number 4, April, 1970

             A. J. DeSalvio and   
                J. G. Purdy and   
                         J. Rau   Creation and Control of Internal Data
                                  Bases Under a Fortran Programming
                                  Environment  . . . . . . . . . . . . . . 211--215
                    H. D. Mills   Syntax-Directed Documentation for PL360  216--222
               Rudolf Bayer and   
             Christoph Witzgall   Some Complete Calculi for Matrices . . . 223--237
               P. Brinch Hansen   The Nucleus of a Multiprogramming System 238--241, 250
                  C. M. Eastman   Representations for Space Planning . . . 242--250
             J. E. Pomeranz and   
                R. L. Weil, Jr.   The cyclical majority problem  . . . . . 251--254
                   E. N. Nilson   Cubic Splines on Uniform Meshes  . . . . 255--258
                  W. Pankiewicz   ACM Algorithm 378: Discretized
                                  Newton-like Method for Solving a System
                                  of Simultaneous Nonlinear Equations  . . 259--260
                   J. N. Lyness   ACM Algorithm 379: SQUANK (Simpson
                                  Quadrature Used Adaptively-Noise Killed) 260--263
               W. F. Heess, Jr.   Comments on a paper by Wallace and Mason 264--265
                    J. L. Smith   Comment on multiprogramming under a page
                                  on demand strategy . . . . . . . . . . . 265--265
             Ronald C. de Vries   Comment on Lawler's Multilevel Boolean
                                  minimization . . . . . . . . . . . . . . 265--266
                   K. R. Knight   An Algol construction for procedures as
                                  parameters of procedures . . . . . . . . 266--266
                       N. Wirth   Corrigenda: ``On Multiprogramming,
                                  Machine Coding, and Computer
                                  Organization'' . . . . . . . . . . . . . 266--266

Communications of the ACM
Volume 13, Number 5, May, 1970

                       L. Hodes   Programming System for the On-Line
                                  Analysis of Biomedical Images  . . . . . 279--283, 286
                   G. A. Sitton   Operations on Generalized Arrays with
                                  the Genie Compiler . . . . . . . . . . . 284--286
                        S. Vere   Translation Equations (Errata) . . . . . 286--286
               W. E. Sasser and   
              D. S. Burdick and   
               D. A. Graham and   
                   T. H. Naylor   Application of Sequential Sampling to
                                  Simulation. an Example Inventory Model   287--296
                      J. Loeckx   Algorithm for the Construction of
                                  Bounded-Context Parsers  . . . . . . . . 297--307
               John C. Reynolds   GEDANKEN --- A Simple Typeless Language
                                  Based on the Principle of Completeness
                                  and the Reference Concept  . . . . . . . 308--319
         S. Crespi-Reghizzi and   
                    R. Morpurgo   A language for treating graphs . . . . . 319--323
                  S. Laflin and   
                  M. A. Brebner   ACM Algorithm 380: In-situ Transposition
                                  of a Rectangular Matrix  . . . . . . . . 324--326
                     R. E. Knop   ACM Algorithm 381: Random Vectors
                                  Uniform In Solid Angle . . . . . . . . . 326--326

Communications of the ACM
Volume 13, Number 6, June, 1970

                    H. A. Elder   On the Feasibility of Voice Input to an
                                  On-Line Computer Processing System . . . 339--346
        C. R. Muthukrishnan and   
                   V. Rajaraman   On the Conversion of Decision Tables to
                                  Computer Programs  . . . . . . . . . . . 347--351
                   J. E. Grimes   Scheduling to Reduce Conflict in
                                  Meetings . . . . . . . . . . . . . . . . 351--352
                   D. G. Frantz   A PL\slash 1 program to assist the
                                  comparative linguist . . . . . . . . . . 353--356
                  F. J. Damerau   Automatic Parsing for Content Analysis   356--360
                     Peter Linz   Accurate Floating-Point Summation  . . . 361--362
                K. E. Hillstrom   Comparison of Several Adaptive
                                  Newton--Cotes Quadrature Routines in
                                  Evaluating Definite Integrals with
                                  Peaked Integrands  . . . . . . . . . . . 362--365
                  G. W. Stewart   Incorporating Origin Shifts into the QR
                                  Algorithm for Symmetric Tridiagonal
                                  Matrices . . . . . . . . . . . . . . . . 365--367
                    P. J. Chase   ACM Algorithm 382: Combinations of ${M}$
                                  Out of ${N}$ Objects . . . . . . . . . . 368--368
                    P. J. Chase   ACM Algorithm 383: Permutations of a Set
                                  with Repetitions . . . . . . . . . . . . 368--369
                  G. W. Stewart   ACM Algorithm 384: Eigenvalues and
                                  Eigenvectors of a Real Symmetric Matrix
                                  [F2] . . . . . . . . . . . . . . . . . . 369--371
                   R. L. London   Certification of ``Algorithm 245:
                                  Treesort 3 [M1]'': Proof of Algorithms
                                  --- A New Kind of Certification  . . . . 371--374
             J. P. Chandler and   
                 W. C. Harrison   R201--SHELLSORT  . . . . . . . . . . . . 373--374
                     E. F. Codd   A Relational Model of Data for Large
                                  Shared Data Banks  . . . . . . . . . . . 377--387

Communications of the ACM
Volume 13, Number 7, July, 1970

                    C. A. Grant   An interactive command generating
                                  facility . . . . . . . . . . . . . . . . 403--406
                   M. A. Wilkes   Conversational Access to a 2048-Word
                                  Machine  . . . . . . . . . . . . . . . . 407--414
                    W. M. Waite   The mobile programming system: STAGE 2   415--421
                Burton H. Bloom   Space/Time Trade-offs in Hash Coding
                                  with Allowable Errors  . . . . . . . . . 422--426
         E. G. Coffman, Jr. and   
                         J. Eve   File Structures Using Hashing Functions  427--432, 436
              Gordon H. Bradley   Algorithm and Bound for the Greatest
                                  Common Divisor of $n$ Integers . . . . . 433--436
                    W. A. Woods   Context-Sensitive Parsing  . . . . . . . 437--445
                 K. A. Paciorek   ACM Algorithm 385: Exponential Integral
                                  ${E}_i(x)$ . . . . . . . . . . . . . . . 446--447
                  G. H. Bradley   ACM Algorithm 386: Greatest Common
                                  Divisor of $n$ Integers and Multipliers  447--448
                        T. Bray   Certification of Algorithm 22,
                                  Ricatti--Bessel Functions of First and
                                  Second Kind  . . . . . . . . . . . . . . 448--448
                       E. N. Ng   Certification of Algorithm 385,
                                  Exponential Integral ${\rm Ei}(x)$ . . . 448--449
                 K. Sattley and   
                   R. Millstein   Comments on a paper by Lowe  . . . . . . 450--451
                  H. D. Baecker   A note on data base deadlocks  . . . . . 451--451
                 J. E. Pomeranz   Note on an Anomaly in Paging . . . . . . 451--451
                     B. R. Hunt   A Comment on Axiomatic Approaches to
                                  Programming  . . . . . . . . . . . . . . 452--452

Communications of the ACM
Volume 13, Number 8, August, 1970

                  N. R. Nielsen   Allocation of Computer Resources. is
                                  Pricing the Answer . . . . . . . . . . . 467--474
                    G. Nagy and   
                       N. Tuong   Normalization Techniques for Handprinted
                                  Numerals . . . . . . . . . . . . . . . . 475--481
                      A. C. Day   Full Table Quadratic Searching for
                                  Scatter Storage  . . . . . . . . . . . . 481--482
                B. S. Brawn and   
            F. G. Gustavson and   
                   E. S. Mankin   Sorting in a Paging Environment  . . . . 483--494
              J. H. Saltzer and   
                  J. W. Gintell   The instrumentation of Multics . . . . . 495--500
              J. D. Ichbiah and   
                    S. P. Morse   A technique for generating almost
                                  optimal Floyd-Evans productions for
                                  precedence grammars  . . . . . . . . . . 501--508
                    K. Fielding   ACM Algorithm 387: Function Minimization
                                  and Linear Search  . . . . . . . . . . . 509--510
             H. Hübner and   
                  H. Kremer and   
                 K. O. Linn and   
                   W. Schwering   ACM Algorithm 388: Rademacher Function   510--511
             H. Hübner and   
                  H. Kremer and   
                 K. O. Linn and   
                   W. Schwering   ACM Algorithm 389: Binary Ordered Walsh
                                  Functions  . . . . . . . . . . . . . . . 511--511
             H. Hübner and   
                  H. Kremer and   
                 K. O. Linn and   
                   W. Schwering   ACM Algorithm 390: Sequency Ordered
                                  Walsh Functions  . . . . . . . . . . . . 511--511
                       J. McKay   ACM Algorithm 391: Unitary Symmetric
                                  Polynomials  . . . . . . . . . . . . . . 512--512
                      Anonymous   Identification of States of the United
                                  States (including the District of
                                  Columbia) for information interchange    514--515

Communications of the ACM
Volume 13, Number 9, September, 1970

              W. Jack Bouknight   A Procedure for Generation of
                                  Three-Dimensional Half-Toned Computer
                                  Graphics Presentations . . . . . . . . . 527--536
                 G. Bracchi and   
                   M. Somalvico   Interactive Software System for
                                  Computer-Aided Design. an Application to
                                  Circuit Project  . . . . . . . . . . . . 537--545
                  I. Hirschsohn   AMESPLOT, a Higher Level Data Plotting
                                  Software System  . . . . . . . . . . . . 546--555
             Cleve B. Moler and   
               Louis P. Solomon   Integrating Square Roots . . . . . . . . 556--557
                   G. W. Kimble   A Variation of the Goodman-Lance Method
                                  for the Solution of Two-Point Boundary
                                  Value Problems . . . . . . . . . . . . . 557--558
                M. Wayne Wilson   Optimal Starting Approximations for
                                  Generating Square Root for Slow or No
                                  Divide . . . . . . . . . . . . . . . . . 559--560
                  L. W. Ehrlich   Complex Matrix Inversion Versus Real . . 561--562
                M. H. van Emden   Increasing the Efficiency of Quicksort   563--567
            Robert R. Smith and   
                  Dennis McCall   ACM Algorithm 392: Systems of Hyperbolic
                                  P.D.E. . . . . . . . . . . . . . . . . . 567--570
                   S. K. Abdali   ACM Algorithm 393: Special Series
                                  Summation with Arbitrary Precision . . . 570--570
                     R. B. Dial   ACM Algorithm 394: Decision Table
                                  Translation  . . . . . . . . . . . . . . 571--572
             Leslie Lamport and   
                     J. R. Bell   Comment on Bell's Quadratic Quotient
                                  Method for Hash Code Searching . . . . . 573--574
                       Z. Bavel   On the Number of Automorphisms of a
                                  Singly Generated Automaton . . . . . . . 574--575

Communications of the ACM
Volume 13, Number 10, October, 1970

                    W. A. Woods   Transition Network Grammars for Natural
                                  Language Analysis  . . . . . . . . . . . 591--606
                  J. Earley and   
                     H. Sturgis   A formalism for translator interactions  607--617
                     G. W. Hill   ACM Algorithm 395: Student's
                                  $t$-Distribution . . . . . . . . . . . . 617--619
                     G. W. Hill   ACM Algorithm 396: Student's
                                  $t$-Quantiles  . . . . . . . . . . . . . 619--620
                S. K. Chang and   
                        A. Gill   ACM Algorithm 397: An Integer
                                  Programming Problem  . . . . . . . . . . 620--621
                    R. A. Stone   ACM Algorithm 398: Tableless Date
                                  Conversion . . . . . . . . . . . . . . . 621--621
            J. J. Seppänen   ACM Algorithm 399: Spanning Tree . . . . 621--622
                  G. C. Wallick   ACM Algorithm 400: Modified Håvie
                                  Integration  . . . . . . . . . . . . . . 622--624
                        R. Peto   Remark on ``Algorithm 347: An Efficient
                                  Algorithm for Sorting with Minimal
                                  Storage [M1]'' . . . . . . . . . . . . . 624
                    L. B. Smith   The use of interactive graphics to solve
                                  numerical problems . . . . . . . . . . . 625--634

Communications of the ACM
Volume 13, Number 11, November, 1970

                  P. LaFata and   
                    J. B. Rosen   An interactive display for approximation
                                  by linear programming  . . . . . . . . . 651--659
                 Vincent Y. Lum   Multi-Attribute Retrieval with Combined
                                  Indexes  . . . . . . . . . . . . . . . . 660--665
                   C. J. Mifsud   A multiple-precision division algorithm  666--668
                  K. Conrow and   
                    R. G. Smith   NEATER2: A PL/I Source Statement
                                  Reformatter  . . . . . . . . . . . . . . 669--675
              James R. Bell and   
               Charles H. Kaman   The Linear Quotient Hash Code  . . . . . 675--677
                   C. J. Cheney   A Nonrecursive List Compacting Algorithm 677--678
                      Anonymous   Proposed American National Standard.
                                  Recorded magnetic tape for information
                                  interchange (1600 CPI, phase encoded)    679--685
                      Anonymous   Proposed American National Standard.
                                  Unrecorded magnetic tape for information
                                  interchange (9 track-200 and 800 CPI,
                                  NRZI and 1600 CPI, P.E.) . . . . . . . . 686--692
                     P. Bratley   ACM Algorithm 401: An Improved Algorithm
                                  to Produce Complex Primes  . . . . . . . 693--693
                M. H. van Emden   ACM Algorithm 402: Increasing the
                                  Efficiency of Quicksort  . . . . . . . . 693--694
                   W. J. Wilson   A generalized method for generating
                                  argument/function values . . . . . . . . 696--697
                   J. R. Ehrman   Correction to 'logical' arithmetic on
                                  computers with two's complement binary
                                  arithmetic . . . . . . . . . . . . . . . 697--698
                   A. Bernstein   Comment on the working set model for
                                  program behavior . . . . . . . . . . . . 698--699
                       J. Rokne   Condition numbers of Pei matrices  . . . 699--699

Communications of the ACM
Volume 13, Number 12, December, 1970

              M. V. Mathews and   
                    F. R. Moore   GROOVE-A program to compose, store, and
                                  edit functions of time . . . . . . . . . 715--721
               James C. Tiernan   An Efficient Search Algorithm to Find
                                  the Elementary Circuits of a Graph . . . 722--726
                C. Betourne and   
               J. Boulenger and   
                  J. Ferrie and   
                  C. Kaiser and   
               S. Krakowiak and   
                    J. Mossiere   Process management and resource sharing
                                  in the multiaccess system ESOPE  . . . . 727--733
                   H. L. Morgan   An interrupt based organization for
                                  management information systems . . . . . 734--739
                 R. J. Thompson   Improving round-off in Runge--Kutta
                                  computations with Gill's method  . . . . 739--740
                  S. C. Shapiro   The list set generator: a construct for
                                  evaluating set expressions . . . . . . . 741--744
                    N. A. Black   Optimum Merging from Mass Storage  . . . 745--749
                   K. A. Redish   Remark on Algorithm 385, Exponential
                                  Integral ${\rm Ei}(x)$ . . . . . . . . . 750--750
                  G. W. Stewart   Remark on ``Algorithm 384: Eigenvalues
                                  and Eigenvectors of a Real Symmetric
                                  Matrix [F2]''  . . . . . . . . . . . . . 750--750
                E. A. Fuchs and   
                  P. E. Jackson   Estimates of Distributions of Random
                                  Variables for Certain Computer
                                  Communications Traffic Models  . . . . . 752--757
                   C. C. Pinter   On decomposing a Boolean function and
                                  simplifying the components separately    758--758
                 W. J. Raduchel   Efficient handling of binary data  . . . 758--759
               Robert A. Wagner   Finiteness Assumptions and Intellectual
                                  Isolation of Computer Scientists . . . . 759--760


Communications of the ACM
Volume 14, Number 1, January, 1971

                    Carl Hammer   Signature Simulation and Certain
                                  Cryptographic Codes  . . . . . . . . . . 3--14
                  Allen Klinger   Pattern Width at a Given Angle . . . . . 15--20
                  Shi-Kuo Chang   The Reconstruction of Binary Patterns
                                  from Their Projections . . . . . . . . . 21--25
            Giampio Bracchi and   
               Domenico Ferrari   Language for Treating Geometric Patterns
                                  in a Two-Dimensional Space . . . . . . . 26--32
                  R. A. Broucke   Construction of Rational and Negative
                                  Powers of a Formal Series  . . . . . . . 32--35
                Richard C. Holt   Comments on Prevention of System
                                  Deadlocks  . . . . . . . . . . . . . . . 36--38
                 C. A. R. Hoare   Proof of a Program: FIND . . . . . . . . 39--45
                    L. G. Proll   Further evidence for the analysis of
                                  algorithms for the zero-one programming
                                  problem  . . . . . . . . . . . . . . . . 46--47
              M. W. Coleman and   
                   M. S. Taylor   ACM Algorithm 403: Circular Integer
                                  Partitioning [A1]  . . . . . . . . . . . 48--48
           C. W. Lucas, Jr. and   
                  C. W. Terrill   ACM Algorithm 404: Complex Gamma
                                  Function [S14] . . . . . . . . . . . . . 48--49
              Å. Kolm and   
                  T. Dahlstrand   Remark on ``Algorithm 333: Minit
                                  Algorithm For Linear Programming ([H])'' 50--50
                   K. A. Redish   Algorithms: Comment on London's
                                  Certification of Algorithm 245 . . . . . 50--51
                  S. L. Pollack   Comment on the conversion of decision
                                  tables to computer programs  . . . . . . 52--52
                  A. V. Aho and   
              P. J. Denning and   
                   J. D. Ullman   Principles of optimal page replacement   80--93

Communications of the ACM
Volume 14, Number 2, February, 1971

                 Keith Shwayder   Conversion of Limited-Entry Decision
                                  Tables to Computer Programs. a Proposed
                                  Modification to Pollack's Algorithm  . . 69--73
        Arthur J. Bernstein and   
                    J. C. Sharp   A Policy-Driven Scheduler for a
                                  Time-Sharing System  . . . . . . . . . . 74--78
              Norman R. Nielsen   An Analysis of Some Time-Sharing
                                  Techniques . . . . . . . . . . . . . . . 79--90
            James R. Slagle and   
                Carl D. Farrell   Experiments in Automatic Learning for a
                                  Multipurpose Heuristic Program . . . . . 91--99
                H. Hurwitz, Jr.   On the Probability Distribution of the
                                  Values of Binary Trees . . . . . . . . . 99--102
            James R. Slagle and   
              Richard C. T. Lee   Application of Game Tree Searching
                                  Techniques to Sequential Pattern
                                  Recognition  . . . . . . . . . . . . . . 103--110
                   J. Rokne and   
                   P. Lancaster   Complex Interval Arithmetic  . . . . . . 111--112
              Alice M. Dell and   
              Roman L. Weil and   
             Gerald L. Thompson   ACM Algorithm 405: Roots of Matrix
                                  Pencils: The Generalized Eigenvalue
                                  Problem [F2] . . . . . . . . . . . . . . 113--117

Communications of the ACM
Volume 14, Number 3, March, 1971

                A. Michael Noll   Scanned-Display Computer Graphics  . . . 143--150
                Zohar Manna and   
           Richard J. Waldinger   Toward Automatic Program Synthesis . . . 151--165
             William K. Winters   Scheduling Algorithm for a Computer
                                  Assisted Registration System . . . . . . 166--171
               John G. Williams   Storage Utilization in a Memory
                                  Hierarchy When Storage Assignment is
                                  Performed by a Hashing Algorithm . . . . 172--175
                C. William Gear   The Automatic Integration of Ordinary
                                  Differential Equations . . . . . . . . . 176--179
                  Jo Ann Howell   ACM Algorithm 406: Exact Solution of
                                  Linear Equations Using Residue
                                  Arithmetic [F4]  . . . . . . . . . . . . 180--184
                C. William Gear   ACM Algorithm 407: DIFSUB for Solution
                                  of Ordinary Differential Equations [D2]  185--190

Communications of the ACM
Volume 14, Number 4, April, 1971

                  Niklaus Wirth   Program Development by Stepwise
                                  Refinement . . . . . . . . . . . . . . . 221--227
             Vincent Y. Lum and   
              P. S. T. Yuen and   
                        M. Dodd   Key-to-Address Transform Techniques: A
                                  Fundamental Performance Study on Large
                                  Existing Formatted Files . . . . . . . . 228--239
            Allen B. Tucker and   
               Michael J. Flynn   Dynamic Microprogramming. Processor
                                  Organization and Programming . . . . . . 240--250
          Peggy Anne Talbot and   
           John W. Carr III and   
    Richard R. Coulter, Jr. and   
                  Rosa C. Hwang   Animator: An On-Line Two-dimensional
                                  Film Animation System  . . . . . . . . . 251--259
            Marvin L. Stein and   
               William D. Munro   On Complement Division . . . . . . . . . 260--264
                  J. M. McNamee   ACM Algorithm 408: A Sparse Matrix
                                  Package (Part I) . . . . . . . . . . . . 265--273
                 Elmer W. Galbi   Software and patents: a status report    274--278

Communications of the ACM
Volume 14, Number 5, May, 1971

 T. William Olle (Chairman) and   
      Codasyl Systems Committee   Introduction to ``Feature Analysis of
                                  Generalized Data Base Management
                                  Systems''  . . . . . . . . . . . . . . . 308--318
              Norman R. Nielsen   The Merit of Regional Computing Networks 319--326
             Patrick Krolak and   
                Wayne Felts and   
                  George Marble   A Man-Machine Approach Toward Solving
                                  the Traveling Salesman Problem . . . . . 327--334
                  Ugo Montanari   On the Optimal Detection of Curves in
                                  Noisy Pictures . . . . . . . . . . . . . 335--345
             Donald L. Richards   How To Keep the Addresses Short  . . . . 346--349
             Robert R. Fenichel   On Implementation of Label Variables . . 349--350
           James H. Morris, Jr.   Another Recursion Induction Principle    351--354
                     H. Schmitt   ACM Algorithm 409: Discrete Chebychev
                                  Curve Fit [E2] . . . . . . . . . . . . . 355--356
                 J. M. Chambers   ACM Algorithm 410: Partial Sorting [M1]  357--358

Communications of the ACM
Volume 14, Number 6, June, 1971

                 Kazuaki Harada   Generation of rosary permutations
                                  expressed in Hamiltonian circuits  . . . 373--379
                 James D. Foley   An approach to the optimum design of
                                  computer graphics systems  . . . . . . . 380--390
                    Saul Amarel   Computer Science: A Conceptual Framework
                                  for Curriculum Planning  . . . . . . . . 391--401
         W. E. Bosarge, Jr. and   
                  O. G. Johnson   Numerical properties of the
                                  Ritz--Trefftz algorithm for optimal
                                  control  . . . . . . . . . . . . . . . . 402--406
                 H. Tim Gladwin   A Note on Compiling Fixed Point Binary
                                  Multiplications  . . . . . . . . . . . . 407--408
                   A. G. Fraser   On the Meaning of Names in Programming
                                  Systems  . . . . . . . . . . . . . . . . 409--416
                   R. J. Walker   Binary Summation . . . . . . . . . . . . 417--417
            Marvin V. Zelkowitz   Interrupt Driven Programming . . . . . . 417--418

Communications of the ACM
Volume 14, Number 7, July, 1971

             J. L. McKenney and   
                  Fred M. Tonge   The State of Computer-Oriented Curricula
                                  in Business Schools 1970 . . . . . . . . 443--448
            Arthur J. Bernstein   A Programmer Training Project  . . . . . 449--452
            Franklin L. DeRemer   Simple LR(k) Grammars  . . . . . . . . . 453--460
          Terrence W. Pratt and   
             Daniel P. Friedman   A Language Extension for Graph
                                  Processing, and Its Formal Semantics . . 460--467
                    Keith Paton   An algorithm for the blocks and cut
                                  nodes of a graph . . . . . . . . . . . . 468--475
              David E. Ferguson   Buffer Allocation in Merge-Sorting . . . 476--478
          C. V. Ramamoorthy and   
                 M. J. Gonzalez   Subexpression ordering in the execution
                                  of arithmetic expressions  . . . . . . . 479--485
              D. G. McVitie and   
                   L. B. Wilson   The Stable Marriage Problem  . . . . . . 486--490
              D. G. McVitie and   
                   L. B. Wilson   ACM Algorithm 411: Three Procedures for
                                  the Stable Marriage Problem [H]  . . . . 491--492
             J. \vCermák   ACM Algorithm 412: Graph Plotter [J6]    492--493
            William J. Raduchel   Remark on ``Algorithm 316: Solution of
                                  Simultaneous Nonlinear Equations [C5]''  493

Communications of the ACM
Volume 14, Number 8, August, 1971

                  Robert Morris   Papers from the 2nd symposium on
                                  symbolic and algebraic manipulation  . . 509--510
               Anthony C. Hearn   Applications of symbol manipulation in
                                  theoretical physics  . . . . . . . . . . 511--516
            Andrew D. Hall, Jr.   The Altran system for rational function
                                  manipulation --- a survey  . . . . . . . 517--521
             Robert R. Fenichel   List Tracing in Systems Allowing
                                  Multiple Cell Types  . . . . . . . . . . 522--526
                     Joel Moses   Algebraic Simplification: A Guide for
                                  the Perplexed  . . . . . . . . . . . . . 527--537
            William H. Jefferys   Automatic algebraic manipulation in
                                  celestial mechanics  . . . . . . . . . . 538--541
               David Barton and   
                  John P. Fitch   General relativity and the application
                                  of algebraic manipulative systems  . . . 542--547
                     Joel Moses   Symbolic Integration: The Stormy Decade  548--560

Communications of the ACM
Volume 14, Number 9, September, 1971

               Daniel Teichroew   Education Related to the Use of
                                  Computers in Organizations . . . . . . . 573--588
             Sadahiro Isoda and   
                Eiichi Goto and   
                   Izumi Kimura   An Efficient Bit Table Technique for
                                  Dynamic Storage Allocation of $2^n$-word
                                  Blocks . . . . . . . . . . . . . . . . . 589--592
                    Keith Paton   Corrigendum: ``An algorithm for the
                                  blocks and cutnodes of a graph'' . . . . 592--592
                Eugene Wong and   
                   T. C. Chiang   Canonical Structure in Attribute Based
                                  File Organization  . . . . . . . . . . . 593--597
              David L. Phillips   A Note on Best One-Sided Approximations  598--600
                 Werner Liniger   A stopping criterion for the
                                  Newton--Raphson method in implicit
                                  multistep integration algorithms for
                                  nonlinear systems of ordinary
                                  differential equations . . . . . . . . . 600--601
                Ivan Flores and   
                  George Madpis   Average Binary Search Length for Dense
                                  Ordered Lists  . . . . . . . . . . . . . 602--603
             Robert R. Fenichel   Comment on Cheney's List-Compaction
                                  Algorithm  . . . . . . . . . . . . . . . 603--604

Communications of the ACM
Volume 14, Number 10, October, 1971

                     Jay Earley   Toward an Understanding of Data
                                  Structures . . . . . . . . . . . . . . . 617--627
         ANSI Subcommittee X3J3   Clarification of Fortran Standards ---
                                  Second Report  . . . . . . . . . . . . . 628--642
        Arthur E. Oldehoeft and   
                Samuel D. Conte   Experiments with an automated
                                  instructional system for numerical
                                  methods  . . . . . . . . . . . . . . . . 643--650
              William M. Newman   Display Procedures . . . . . . . . . . . 651--660
             Alan G. Nemeth and   
                 Paul D. Rovner   User program measurement in a
                                  time-shared environment  . . . . . . . . 661--666
             P. J. Courtois and   
                 F. Heymans and   
             David Lorge Parnas   Concurrent Control with ``Readers'' and
                                  ``Writers''  . . . . . . . . . . . . . . 667--668
               J. N. Lyness and   
                       G. Sande   ACM Algorithm 413: ENTCAF and ENTCRE:
                                  Evaluation of Normalized Taylor
                                  Coefficients of an Analytic Function
                                  (C5) . . . . . . . . . . . . . . . . . . 669--675

Communications of the ACM
Volume 14, Number 11, November, 1971

               P. Branquart and   
                    J. Lewi and   
            Michel Sintzoff and   
                    P. L. Wodon   The composition of semantics in Algol 68 697--708
                John W. Hamblen   Using computers in higher education:
                                  past recommendations, status, and needs  709--712
                Donald L. Shell   Optimizing the Polyphase Sort  . . . . . 713--719
              Itaru Aramaki and   
          Tomokazu Kawabata and   
               Kazuhiko Arimoto   Automation of Etching-Pattern Layout . . 720--730
             Michael A. Malcolm   On Accurate Floating-Point Summation . . 731--736
                G. H. Golub and   
                    L. B. Smith   ACM Algorithm 414: Chebyshev
                                  Approximation of Continuous Functions by
                                  a Chebyshev System of Functions [E2] . . 737--746

Communications of the ACM
Volume 14, Number 12, December, 1971

             Richard Gordon and   
                Gabor T. Herman   Reconstruction of Pictures from Their
                                  Projections  . . . . . . . . . . . . . . 759--768
               E. L. Amidon and   
                     G. S. Akin   Algorithmic Selection of the Best Method
                                  for Compressing Map Data Strings . . . . 769--774
                James K. Mullin   Retrieval-Update Speed Tradeoffs Using
                                  Combined Indices . . . . . . . . . . . . 775--776
            Malcolm C. Harrison   Implementation of the Substring Test by
                                  Hashing  . . . . . . . . . . . . . . . . 777--779
    W. A. (William A.) Wulf and   
              D. B. Russell and   
                A. N. Habermann   BLISS: A Language for Systems
                                  Programming  . . . . . . . . . . . . . . 780--790
                Arnold Rochfeld   New LISP Techniques for a Paging
                                  Environment  . . . . . . . . . . . . . . 791--795
           John W. Blumberg and   
               Clinton R. Foulk   A note on `a modification of Nordsieck's
                                  method using an ``off-step'' point'  . . 796--796
    Sven-Åke A. Gustafson   Rapid Computation of General
                                  Interpolation Formulas and Mechanical
                                  Quadrature Rules . . . . . . . . . . . . 797--801
  François Bourgeois and   
           Jean-Claude Lassalle   An extension of the Munkres algorithm
                                  for the assignment problem to
                                  rectangular matrices . . . . . . . . . . 802--804
  François Bourgeois and   
        John-Claude C. Lassalle   ACM Algorithm 415: Algorithm for the
                                  Assignment Problem (Rectangular
                                  Matrices) [H]  . . . . . . . . . . . . . 805--806
       Sven-Åke Gustafson   ACM Algorithm 416: Rapid Computation of
                                  Coefficients of Interpolation Formulas
                                  [E1] . . . . . . . . . . . . . . . . . . 806--807
       Sven-Åke Gustafson   ACM Algorithm 417: Rapid Computation of
                                  Weights of Interpolatory Quadrature
                                  Rules [D1] . . . . . . . . . . . . . . . 807--807


Communications of the ACM
Volume 15, Number 1, January, 1972

                 Arthur M. Lesk   Pictorial pattern recognition and the
                                  phase problem of X-ray crystallography   3--6
               Stefano Levialdi   On Shrinking Binary Picture Patterns . . 7--10
            Richard O. Duda and   
                  Peter E. Hart   Use of the Hough transformation to
                                  detect lines and curves in pictures  . . 11--15
             Edgar T. Irons and   
                Frans M. Djorup   A CRT Editing System . . . . . . . . . . 16--20
                    T. A. Dwyer   Teacher/student authored CAI using the
                                  NEWBASIC system  . . . . . . . . . . . . 21--28
                Donald L. Shell   Corrigendum: ``Optimizing the Polyphase
                                  Sort'' . . . . . . . . . . . . . . . . . 28--28
          Gordon I. McCalla and   
             Jeffrey R. Sampson   MUSE: A Model To Understand Simple
                                  English  . . . . . . . . . . . . . . . . 29--40
             Richard I. Shrager   Quadratic Programming for Nonlinear
                                  Regression . . . . . . . . . . . . . . . 41--45
              Herbert E. Salzer   Ordering +-f(+-f(+-f(\ldots+-f(x)..)))
                                  When f(x) Is Positive Monotonic  . . . . 45--46
                   Bo Einarsson   ACM Algorithm 418: Calculation of
                                  Fourier Integrals [D1] . . . . . . . . . 47--48
               I. D. G. Macleod   Certification of ``Algorithm 380:
                                  In-Situ Transposition of a Rectangular
                                  Matrix [F1]''  . . . . . . . . . . . . . 49
        Günther F. Schrack   Remark on ``Algorithm 391: Unitary
                                  Symmetric Polynomials [Z]''  . . . . . . 49

Communications of the ACM
Volume 15, Number 2, February, 1972

                    David Pager   A Proposal for a Computer-Based
                                  Interactive Scientific Community . . . . 71--75
             Charles M. Eastman   Preliminary report on a system for
                                  general space planning . . . . . . . . . 76--87
          William A. Martin and   
                     D. N. Ness   Optimizing Binary Trees Grown with a
                                  Sorting Algorithm  . . . . . . . . . . . 88--93
        Arthur E. Oldehoeft and   
            Maurice H. Halstead   Maximum computing power and cost factors
                                  in the centralization problem  . . . . . 94--96
         Michael A. Jenkins and   
                    J. F. Traub   ACM Algorithm 419: Zeros of a Complex
                                  Polynomial [C2]  . . . . . . . . . . . . 97--99
                Hugh Williamson   ACM Algorithm 420: Hidden-Line Plotting
                                  Program [J6] . . . . . . . . . . . . . . 100--103
          James Anderson Moorer   Music and Computer Composition . . . . . 104--113
                Ivan Flores and   
                  George Madpis   Corrigendum: ``Average Binary Search
                                  Length for Dense Ordered Lists'' . . . . 113--113
             Richard Gordon and   
                Gabor T. Herman   Corrigendum: ``Reconstruction of
                                  Pictures from Their Projections''  . . . 113--113

Communications of the ACM
Volume 15, Number 3, March, 1972

           Peter J. Denning and   
                  Brian Randell   Papers from the 3rd ACM symposium on
                                  operating systems principles . . . . . . 133--134
           Daniel G. Bobrow and   
         Jerry D. Burchfiel and   
           Daniel L. Murphy and   
           Raymond S. Tomlinson   TENEX, A Paged Time-Sharing System for
                                  the PDP-10 . . . . . . . . . . . . . . . 135--143
              Barbara H. Liskov   The Design of the Venus Operating System 144--149
             R. Stockton Gaines   An Operating System Based on the Concept
                                  of a Supervisory Computer  . . . . . . . 150--156
       Michael D. Schroeder and   
              Jerome H. Saltzer   A Hardware Architecture for Implementing
                                  Protection Rings . . . . . . . . . . . . 157--170
              A. Nico Habermann   Synchronization of Communicating
                                  Processes  . . . . . . . . . . . . . . . 171--176
             Toby J. Teorey and   
               Tad B. Pinkerton   A Comparative Analysis of Disk
                                  Scheduling Policies  . . . . . . . . . . 177--184
     Edward G. Coffman, Jr. and   
                T. A. Ryan, Jr.   A study of storage partitioning using a
                                  mathematical model of locality . . . . . 185--190
           Peter J. Denning and   
             Stuart C. Schwartz   Properties of the Working Set Model  . . 191--198

Communications of the ACM
Volume 15, Number 4, April, 1972

          Richard W. Conway and   
         William L. Maxwell and   
               Howard L. Morgan   On the Implementation of Security
                                  Measures in Information Systems  . . . . 211--220
                David C. Walden   A system for interprocess communication
                                  in a resource sharing computer network   221--230
               N. M. Herbst and   
                     P. M. Will   An experimental laboratory for pattern
                                  recognition and signal processing  . . . 231--244
              Yutaka Matsushita   Hidden Lines Elimination for a Rotating
                                  Object . . . . . . . . . . . . . . . . . 245--252
               Stephen M. Chase   An implemented graph algorithm for
                                  winning Shannon Switching Games  . . . . 253--256
             Ellis Horowitz and   
           Howard L. Morgan and   
                   Alan C. Shaw   Computers and Society: A Proposed Course
                                  for Computer Scientists  . . . . . . . . 257--261
                   Hirondo Kuki   Complex Gamma Function with Error
                                  Control [S14]  . . . . . . . . . . . . . 262--267
                 Cleve B. Moler   Matrix Computations with Fortran and
                                  Paging . . . . . . . . . . . . . . . . . 268--270
                   Hirondo Kuki   ACM Algorithm 421: Complex Gamma
                                  Function with Error Control [S14]  . . . 271--272
            V. Kevin M. Whitney   ACM Algorithm 422: Minimal Spanning Tree
                                  [H]  . . . . . . . . . . . . . . . . . . 273--274
                 Cleve B. Moler   ACM Algorithm 423: Linear Equation
                                  Solver [F4]  . . . . . . . . . . . . . . 274--274
                David C. Walden   A Note on Cheney's Nonrecursive
                                  List-Compacting Algorithm  . . . . . . . 275--275
                       T. C. Hu   A Comment on the Double-Chained Tree . . 276--276

Communications of the ACM
Volume 15, Number 5, May, 1972

                James K. Mullin   An Improved Indexed-Sequential Access
                                  Method Using Hashed Overflow . . . . . . 301--307
              A. Bensoussan and   
              C. T. Clingen and   
                Robert C. Daley   The Multics Virtual Memory: Concepts and
                                  Design . . . . . . . . . . . . . . . . . 308--318
            Ronald D. Christman   MUX, a Simple Approach to On-Line
                                  Computing  . . . . . . . . . . . . . . . 319--329
             David Lorge Parnas   A technique for software module
                                  specification with examples  . . . . . . 330--336
            W. Morven Gentleman   Implementing Clenshaw--Curtis
                                  quadrature. I. Methodology and
                                  experience . . . . . . . . . . . . . . . 337--342
            W. Morven Gentleman   Implementing Clenshaw--Curtis
                                  quadrature. II. Computing the cosine
                                  transformation . . . . . . . . . . . . . 343--346
               D. Greenspan and   
                     D. Schultz   Fast finite-difference solution of
                                  biharmonic problems  . . . . . . . . . . 347--350
              Charles B. Dunham   Minimax nonlinear approximation by
                                  approximation on subsets . . . . . . . . 351--351
                 Richard Harter   The Optimality of Winograd's Formula . . 352--352
            W. Morven Gentleman   ACM Algorithm 424: Clenshaw--Curtis
                                  Quadrature [D1]  . . . . . . . . . . . . 353--355
               Rex L. Hurst and   
                 Robert E. Knop   ACM Algorithm 425: Generation of Random
                                  Correlated Normal Variables [G5] . . . . 355--357
                  Coenraad Bron   ACM Algorithm 426: Merge Sort Algorithm
                                  [M1] . . . . . . . . . . . . . . . . . . 357--358
                     Peter Linz   ACM Algorithm 427: Fourier Cosine
                                  Integral [D1]  . . . . . . . . . . . . . 358--360
                     J. M. Yohe   ACM Algorithm 428: Hu-Tucker Minimum
                                  Redundancy Alphabetic Coding Method [Z]  360--362
           Robert L. Ashenhurst   A report of the ACM curriculum committee
                                  on computer education for management.
                                  Curriculum recommendations for graduate
                                  professional programs in information
                                  systems  . . . . . . . . . . . . . . . . 363--398

Communications of the ACM
Volume 15, Number 6, June, 1972

                  J. Blatny and   
                S. R. Clark and   
                   T. A. Rourke   On the optimization of performance of
                                  time-sharing systems by simulation . . . 411--420
               Thomas R. Spacek   A proposal to establish a pseudo virtual
                                  memory via writable overlays . . . . . . 421--426
             Philip Gilbert and   
                 W. J. Chandler   Interference between Communicating
                                  Parallel Processes . . . . . . . . . . . 427--437
                James F. Gimpel   Blocks --- A New Data type for SNOBOL4   438--447
                David F. Martin   A Boolean matrix method for the
                                  computation of linear precedence
                                  functions  . . . . . . . . . . . . . . . 448--454
             Robert T. O'Reagan   Computer Assigned Codes from Verbal
                                  Responses  . . . . . . . . . . . . . . . 455--459
                     Ken Iguchi   A starting method for solving nonlinear
                                  Volterra integral equations of the
                                  second kind  . . . . . . . . . . . . . . 460--461
                       Ira Pohl   A Sorting Problem and Its Complexity . . 462--464
              K. S. Kölbig   Certification of ``Algorithm 363:
                                  Complex error function'' . . . . . . . . 465--466
               Herbert Niessner   Remark on ``Algorithm 343: Eigenvalues
                                  and eigenvectors of a real general
                                  matrix'' . . . . . . . . . . . . . . . . 466--466
                    L. G. Proll   Remark on ``ACM Algorithm 370: General
                                  random number generator [G5]'' . . . . . 467--468
        Günther F. Schrack   Remark on ``Algorithm 381: Random
                                  vectors uniform in solid angle'' . . . . 468--468
              Arthur H. J. Sale   Remark on ``Algorithm 393: Special
                                  series summation with arbitrary
                                  precision''  . . . . . . . . . . . . . . 468--469
                   Bo Einarsson   Remark on ``Algorithm 418: Calculation
                                  of Fourier integrals'' . . . . . . . . . 469--469
         Stephen C. Johnson and   
             Brian W. Kernighan   Remark on ``Algorithm 397: An integer
                                  programming problem''  . . . . . . . . . 469--469
                 Abraham Kandel   Computer Science --- A Vicious Circle    470--471
              Elliot B. Koffman   Individualizing instruction in a
                                  generative CAI tutor . . . . . . . . . . 472--473
              E. N. Houstis and   
             W. F. Mitchell and   
                     J. R. Rice   ACM Algorithm 438: Product Type
                                  Two-point Gauss--Legendre--Simpson's
                                  Integration  . . . . . . . . . . . . . . 1071

Communications of the ACM
Volume 15, Number 7, July, 1972

                     Lee Revens   The first twenty-five years: ACM
                                  1947--1962 . . . . . . . . . . . . . . . 485--490
                  Eric A. Weiss   Publications in Computing: An Informal
                                  Review . . . . . . . . . . . . . . . . . 491--497
                Anthony Ralston   The Next Two Years (ACM President's
                                  Letter)  . . . . . . . . . . . . . . . . 499--500
               Andrei P. Ershov   Aesthetics and the Human Factor in
                                  Programming  . . . . . . . . . . . . . . 501--505
               G. G. Probst and   
           Robert S. Oelman and   
                   Sam Wyly and   
            C. Lester Hogan and   
                 F. T. Cary and   
                Gordon Bell and   
              Donald P. Kircher   As the Industry Sees It  . . . . . . . . 506--517
               Michael A. Arbib   Toward an Automata Theory of Brains  . . 521--527
                Zohar Manna and   
                 Jean Vuillemin   Fix Point Approach to the Theory of
                                  Computation  . . . . . . . . . . . . . . 528--536
                    J. F. Traub   Numerical Mathematics and Computer
                                  Science  . . . . . . . . . . . . . . . . 537--541
            David F. Shanno and   
                  Roman L. Weil   Management science: a view from
                                  nonlinear programming  . . . . . . . . . 542--549
                     Joel Moses   Toward a General Theory of Special
                                  Functions  . . . . . . . . . . . . . . . 550--554
               Caxton C. Foster   A View of Computer Architecture  . . . . 557--565
                   A. G. Fraser   On the interface between computers and
                                  data communications systems  . . . . . . 566--573
              Per Brinch Hansen   Structured Multiprogramming  . . . . . . 574--578
               William C. Lynch   Operating System Performance . . . . . . 579--585
           Stephen R. Kimbleton   The role of computer system models in
                                  performance evaluation . . . . . . . . . 586--590
                     Saul Rosen   Programming Systems and Languages
                                  (1965--1975) . . . . . . . . . . . . . . 591--600
                 Jean E. Sammet   Programming Languages: History and
                                  Future . . . . . . . . . . . . . . . . . 601--610
               Lloyd D. Fosdick   The Production of Better Mathematical
                                  Software . . . . . . . . . . . . . . . . 611--617
               Daniel G. Bobrow   Requirements for Advanced Programming
                                  Systems for List Processing  . . . . . . 618--627
             Charles W. Bachman   The Evolution of Storage Structures  . . 628--634
                   John R. Rice   On the Present and Future of Scientific
                                  Computation  . . . . . . . . . . . . . . 637--639
             Robert I. Benjamin   A generational perspective of
                                  information system development . . . . . 640--643
           Sally Yeates Sedelow   Language Analysis in the Humanities  . . 644--647
                   Karl L. Zinn   Computers in the instructional process:
                                  directions for research and development  648--651
              Gerald M. Sturman   Computers and Urban Society  . . . . . . 652--657
                  Gerard Salton   Dynamic Document Processing  . . . . . . 658--668
                Donald E. Knuth   Ancient Babylonian algorithms  . . . . . 671--677
         Friedrich L. Bauer and   
                H. Wössner   The ``Plankalkül'' of Konrad Zuse: a
                                  forerunner of today's programming
                                  languages  . . . . . . . . . . . . . . . 678--685
             Richard E. Sprague   A Western View of Computer History . . . 686--692
                   Franz L. Alt   Archaeology of computers ---
                                  reminiscences, 1945--1947  . . . . . . . 693--694
              Allan Borodin and   
                  C. C. Gotlieb   Computers and Employment . . . . . . . . 695--702

Communications of the ACM
Volume 15, Number 8, August, 1972

                John G. Herriot   In Memory of George E. Forsythe  . . . . 719--720
                Donald E. Knuth   George Forsythe and the development of
                                  Computer Science . . . . . . . . . . . . 721--726
                    David Crowe   Generating Parsers for Affix Grammars    728--734
           Robert E. Helbig and   
             Patrick K. Orr and   
             Robert R. Roediger   Political Redistricting by Computer  . . 735--741
             Arthur J. Benjamin   Extensible Editor for a Small Machine
                                  with Disk Storage  . . . . . . . . . . . 742--747
            Robert F. Rosin and   
             Gideon Frieder and   
       Richard H. Eckhouse, Jr.   Environment for Research in
                                  Microprogramming and Emulation . . . . . 748--760
                 P. H. Oden and   
              Gerald S. Shedler   A Model of Memory Contention in a Paging
                                  Machine  . . . . . . . . . . . . . . . . 761--771
            H. J. Bernstein and   
                  H. T. Gladwin   Compiling fixed-point multiplications    772--772
             W. L. van der Poel   Comment on the composition of semantics
                                  in Algol 68  . . . . . . . . . . . . . . 772--772
           Herbert J. Bernstein   Compiling Fixed-Point Multiplications    772
           James H. Morris, Jr.   A Bonus from van Wijngaarden's Device    773--773
                 Peter R. Jones   Comment on Average Binary Search Length  774--774
             Ronald C. Read and   
                      K. Harada   A Note on the Generation of Rosary
                                  Permutations. With a Response by K.
                                  Harada . . . . . . . . . . . . . . . . . 775--775
                      W. Squire   ACM Algorithm 429: Localization of the
                                  Roots of a Polynomial [C2] . . . . . . . 776--777
    Paul Walton Purdom, Jr. and   
                Edward F. Moore   ACM Algorithm 430: Immediate
                                  Predominators in a Directed Graph [H]    777--778

Communications of the ACM
Volume 15, Number 9, September, 1972

             Karl N. Levitt and   
               William H. Kautz   Cellular Arrays for the Solution of
                                  Graph Problems . . . . . . . . . . . . . 789--801
                 Sakti P. Ghosh   File Organization --- The Consecutive
                                  Retrieval Property . . . . . . . . . . . 802--808
                  Moshe Mor and   
                      T. Lamdan   A New Approach to Automatic Scanning of
                                  Contour Maps . . . . . . . . . . . . . . 809--812
                Paul L. Richman   Automatic Error Analysis for Determining
                                  Precision  . . . . . . . . . . . . . . . 813--817
          Arunachalam Ravindran   ACM Algorithm 431: A Computer Routine
                                  for Quadratic and Linear Programming
                                  Problems [H] . . . . . . . . . . . . . . 818--820
         Richard H. Bartels and   
                  G. W. Stewart   ACM Algorithm 432: Solution of the
                                  Matrix Equation \boldmath $AX+XB=C$ [F4] 820--826
              Edward S. Deutsch   Thinning Algorithms on Rectangular,
                                  Hexagonal, and Triangular Arrays . . . . 827--837
                  James Gregory   A Comparison of Floating Point Summation
                                  Methods  . . . . . . . . . . . . . . . . 838--838
                Hatem M. Khalil   The Eigenproblem of Block Tridiagonal
                                  Matrices . . . . . . . . . . . . . . . . 839--839
         David Lorge Parnas and   
          A. Nico Habermann and   
                     R. C. Holt   Comment on Deadlock Prevention Method    840--841
         Richard Rubinstein and   
                 Julian Feldman   A controller for a Braille terminal  . . 841--842
                      K. C. Tan   On Foster's Information Storage and
                                  Retrieval Using AVL Trees  . . . . . . . 843--843

Communications of the ACM
Volume 15, Number 10, October, 1972

             Edsger W. Dijkstra   The Humble Programmer  . . . . . . . . . 859--866
                James B. Morris   Demand Paging Through Utilization of
                                  Working Sets on the Maniac II  . . . . . 867--872
          Joachim H. Ahrens and   
                  Ulrich Dieter   Computer Methods for Sampling from the
                                  Exponential and Normal Distributions . . 873--882
              Richard J. Hanson   Integral Equations of Immunology . . . . 883--890
          Robert F. Simmons and   
                Jonathan Slocum   Generating English Discourse from
                                  Semantic Networks  . . . . . . . . . . . 891--905
                     Gert Dathe   Conversion of Decision Tables by Rule
                                  Mask Method without Rule Mask  . . . . . 906--909
               W. D. Frazer and   
                     C. K. Wong   Sorting by Natural Selection . . . . . . 910--913
                   A. P. Ershov   Corrigendum: ``Aesthetics and the Human
                                  Factor in Programming''  . . . . . . . . 913--913
                  Hiroshi Akima   ACM Algorithm 433: Interpolation and
                                  Smooth Curve Fitting Based on Local
                                  Procedures [E2]  . . . . . . . . . . . . 914--918
           J. Douglas Robertson   Remark on ``Algorithm 398: Tableless
                                  Date Conversion''  . . . . . . . . . . . 918

Communications of the ACM
Volume 15, Number 11, November, 1972

                    Phyllis Fox   Comparative Study of Computer Programs
                                  for Integrating Differential Equations   941--948
             Michael A. Malcolm   Algorithms to Reveal Properties of
                                  Floating-Point Arithmetic  . . . . . . . 949--951
             Merrell L. Patrick   A Highly Parallel Algorithm for
                                  Approximating All Zeros of a Polynomial
                                  with Only Real Zeros . . . . . . . . . . 952--955
               Henry F. Ledgard   Model for Type Checking --- with an
                                  Application to Algol 60  . . . . . . . . 956--966
             Peter B. Henderson   Derived Semantics for Some Programming
                                  Language Constructs  . . . . . . . . . . 967--973
                    M. Verhelst   The Conversion of Limited-Entry Decision
                                  Tables to Optimal and Near-Optimal
                                  Flowcharts: Two New Algorithms . . . . . 974--980
                  H. D. Baecker   Garbage Collection for Virtual Memory
                                  Computer Systems . . . . . . . . . . . . 981--986
            John S. Ramberg and   
             Bruce W. Schmeiser   Approximate Method for Generating
                                  Symmetric Random Variables . . . . . . . 987--990
                 David L. March   ACM Algorithm 434: Exact Probabilities
                                  for ${R\times{C}}$ Contingency Tables
                                  [G2] . . . . . . . . . . . . . . . . . . 991--992
                Wayne Fullerton   ACM Algorithm 435: Modified Incomplete
                                  Gamma Function [S14] . . . . . . . . . . 993--995
             Vincent Y. Lum and   
                  P. S. T. Yuen   Additional results on key-to-address
                                  transform techniques: a fundamental
                                  performance study on large existing
                                  formatted files  . . . . . . . . . . . . 996--997
                  Steve Kennedy   A Note on Optimal Doubly-Chained Trees   997--998
        Murray A. Eisenberg and   
             Michael R. McGuire   Further comments on Dijkstra's
                                  concurrent programming control problem   999--999
             Stephen W. Smoliar   Comments on Moorer's Music and computer
                                  composition  . . . . . . . . . . . . . . 1000--1001

Communications of the ACM
Volume 15, Number 12, December, 1972

        J. Richard Phillips and   
                    H. C. Adams   Dynamic Partitioning for Array Languages 1023--1032
               Rudolf Bayer and   
                    C. Witzgall   Index Ranges for Matrix Calculi  . . . . 1033--1039
                 Jay Earley and   
                Paul Caizergues   Method for Incrementally Compiling
                                  Languages with Nested Statement
                                  Structure  . . . . . . . . . . . . . . . 1040--1044
                Fabrizio Luccio   Weighted Increment Linear Search for
                                  Scatter Tables . . . . . . . . . . . . . 1045--1047
             Donald R. Barr and   
                Norman L. Sezak   A Comparison of Multivariate Normal
                                  Generators . . . . . . . . . . . . . . . 1048--1049
                 John Moore and   
              Prentiss Robinson   New Method for the Solution of the
                                  Cauchy Problem for Parabolic Equations   1050--1052
             David Lorge Parnas   On the Criteria To Be Used in
                                  Decomposing Systems into Modules . . . . 1053--1058
                    P. J. Brown   Levels of Language for Portable Software 1059--1062
            Stephen Sherman and   
         Forest Baskett III and   
                James C. Browne   Trace-Driven Modeling and Analysis of
                                  CPU Scheduling in a Multiprogramming
                                  System . . . . . . . . . . . . . . . . . 1063--1069
               W. Robert Boland   ACM Algorithm 436: Product Type
                                  Trapezoidal Integration  . . . . . . . . 1070--1070
               W. Robert Boland   ACM Algorithm 437: Product Type
                                  Simpson's Integration [D1] . . . . . . . 1070--1071
               W. Robert Boland   ACM Algorithm 438: Product Type
                                  Two-Point Gauss--Legendre--Simpson's
                                  Integration [D1] . . . . . . . . . . . . 1071
              Walter L. Sullins   Certification of ``Algorithm 266:
                                  Pseudo-Random Numbers [G5]'' . . . . . . 1072--1073
               W. Robert Boland   ACM Algorithm 439: Product Type
                                  Three-point Gauss--Legendre--Simpson's
                                  Integration [D1] . . . . . . . . . . . . 1072
                  P. Hallet and   
                        E. Mund   Certification of ``Algorithm 379:
                                  Squank'' . . . . . . . . . . . . . . . . 1073
                Ernst Schuegraf   Remark on ``Algorithm 176: Least Squares
                                  Surface Fit''  . . . . . . . . . . . . . 1073
              Michael J. Frisch   Remark on ``Algorithms 352, 385, 392:
                                  Remarks on Characteristic Values and
                                  Associated Solutions of Mathieu's
                                  Differential Equation, Exponential
                                  Integral, and Systems of Hyperbolic
                                  P.D.E.'' . . . . . . . . . . . . . . . . 1074
              D. R. T. Marshall   Remark on ``Algorithm 394: Decision
                                  Table Translation''  . . . . . . . . . . 1074
                Ernst Schuegraf   Remark on ``Algorithm 195: BANDSOLVE''   1074
           Richard M. Heiberger   Remark on ``Algorithm 405: Roots of
                                  Matrix Pencils'' . . . . . . . . . . . . 1075

Communications of the ACM
Volume 15, Number 2, February, 1973

           Peter J. Denning and   
             Stuart C. Schwartz   Corrigendum: ``Properties of the
                                  working-set model''  . . . . . . . . . . 191--198


Communications of the ACM
Volume 16, Number 1, January, 1973

              Gerald S. Shedler   A Queuing Model of a Multiprogrammed
                                  Computer with a Two-Level Storage System 3--10
                    Carter Bays   The Reallocation of Hash-Coded Tables    11--14
           James H. Morris, Jr.   Protection in Programming Languages  . . 15--21
             Yoichi Muraoka and   
                  David J. Kuck   On the Time Required for a Sequence of
                                  Matrix Products  . . . . . . . . . . . . 22--26
                E. B. James and   
             Derek P. Partridge   Adaptive Correction of Program
                                  Statements . . . . . . . . . . . . . . . 27--37
                Paul L. Richman   Variable-Precision Exponentiation  . . . 38--40
                 C. R. Crawford   Reduction of a Band-Symmetric
                                  Generalized Eigenvalue Problem . . . . . 41--44
           Sumner E. Blount and   
                     Louis Fein   The practical aspect of computer science
                                  education --- discussion . . . . . . . . 45--46
                    Carter Bays   A note on when to chain overflow items
                                  within a direct-access table . . . . . . 46--47
               M. Stella Atkins   Mutual recursion in Algol 60 using
                                  restricted compilers . . . . . . . . . . 47--48
                 L. J. Gallaher   ACM Algorithm 440: A Multidimensional
                                  Monte Carlo Quadrature with Adaptive
                                  Stratified Sampling [D1] . . . . . . . . 49--50
                 Robert E. Knop   ACM Algorithm 441: Random Deviates from
                                  the Dipole Distribution [G5] . . . . . . 51--51
                 G. W. Hill and   
                    A. W. Davis   ACM Algorithm 442: Normal Deviate [S14]  51--52

Communications of the ACM
Volume 16, Number 2, February, 1973

                  R. D. Merrill   Representation of Contours and Regions
                                  for Efficient Computer Search  . . . . . 69--82
    Stefano Crespi-Reghizzi and   
        Michel A. Melkanoff and   
                     L. Lichten   The Use of Grammatical Inference for
                                  Designing Programming Languages  . . . . 83--90
                James F. Gimpel   A Theory of Discrete Patterns and Their
                                  Implementation in SNOBOL4  . . . . . . . 91--100
                       J. Rokne   Automatic Errorbounds for Simple Zeros
                                  of Analytic Functions  . . . . . . . . . 101--104
               Richard P. Brent   Reducing the Retrieval Time of Scatter
                                  Storage Techniques . . . . . . . . . . . 105--109
           Robert M. Graham and   
      Gerald J. Clancy, Jr. and   
               David B. DeVaney   A Software Design and Evaluation System  110--116
               Robert M. Balzer   An Overview of the ISPL Computer System
                                  Design . . . . . . . . . . . . . . . . . 117--122
            Fred N. Fritsch and   
               R. E. Shafer and   
                  W. P. Crowley   ACM Algorithm 443: Solution of the
                                  Transcendental Equation $w e^w = x$ [C5] 123--124

Communications of the ACM
Volume 16, Number 3, March, 1973

         Richard H. Austing and   
                Gerald L. Engel   A Computer Science Course Program for
                                  Small Colleges . . . . . . . . . . . . . 139--147
               Robert A. Wagner   Common Phrases and Minimum-Space Text
                                  Storage  . . . . . . . . . . . . . . . . 148--152
                Y. Feinroth and   
            E. Franceschini and   
                   M. Goldstein   Telecommunications Using a Front-End
                                  Minicomputer . . . . . . . . . . . . . . 153--160
                Charles D. Pack   The Effects of Multiplexing on a
                                  Computer-Communications System . . . . . 161--168
          Richard W. Conway and   
               Thomas R. Wilcox   Design and Implementation of a
                                  Diagnostic Compiler for PL/I . . . . . . 169--179
              Herbert E. Salzer   Gray code and the $\pm$ sequence when
                                  $\pm f(\pm f(\pm f(\cdots \pm f(x)
                                  \cdots)))$ is ordered  . . . . . . . . . 180--180
              Abraham Bookstein   On Harrison's Substring Testing
                                  Technique  . . . . . . . . . . . . . . . 180--181
               William H. Payne   Graduate Education: The Ph.D. Glut . . . 181--182
               Robert A. Wagner   ACM Algorithm 444: An Algorithm for
                                  Extracting Phrases in a Space-Optimal
                                  Fashion [Z]  . . . . . . . . . . . . . . 183--185
                  Shi-Kuo Chang   ACM Algorithm 445: Binary Pattern
                                  Reconstruction from Projections [Z]  . . 185--186
                       John Lau   Remark on ``Algorithm 445: Binary
                                  Pattern Reconstruction from Projections
                                  [Z]''  . . . . . . . . . . . . . . . . . 186--186

Communications of the ACM
Volume 16, Number 4, April, 1973

            Anthony Hassitt and   
          J. W. Lageschulte and   
                Leonard E. Lyon   Implementation of a High Level Language
                                  Machine  . . . . . . . . . . . . . . . . 199--212
               John G. Williams   Asymmetric Memory Hierarchies  . . . . . 213--222
                    H. Kuki and   
                     W. J. Cody   A Statistical Study of the Accuracy of
                                  Floating Point Number Systems  . . . . . 223--230
         Walter A. Burkhard and   
               Robert M. Keller   Some Approaches to Best-Match File
                                  Searching  . . . . . . . . . . . . . . . 230--236
       James P. Strong, III and   
               Azriel Rosenfeld   A Region Coloring Technique for Scene
                                  Analysis . . . . . . . . . . . . . . . . 237--246
      Juan Rodriguez-Rosell and   
              Jean-Pierre Dupuy   The design, implementation, and
                                  evaluation of a working set dispatcher   247--253
                     R. Broucke   ACM Algorithm 446: Ten Subroutines for
                                  the Manipulation of Chebyshev Series
                                  [C1] . . . . . . . . . . . . . . . . . . 254--256
           Larry C. Ragland and   
                 Donald I. Good   Certification of ``Algorithm 386:
                                  Greatest Common Divisor of $n$ Integers
                                  and Multipliers''  . . . . . . . . . . . 257--257

Communications of the ACM
Volume 16, Number 5, May, 1973

                    David Pager   On the Problem of Communicating Complex
                                  Information  . . . . . . . . . . . . . . 275--281
                   David W. Low   Programming by Questionnaire: an
                                  Effective Way to Use Decision Tables . . 282--286
           Peter J. H. King and   
               Roger G. Johnson   Some Comments on the Use of Ambiguous
                                  Decision Tables and Their Conversion to
                                  Computer Programs  . . . . . . . . . . . 287--290
                   John Salasin   Hierarchical Storage in Information
                                  Retrieval  . . . . . . . . . . . . . . . 291--295
           Derek G. Corneil and   
              C. C. Gotlieb and   
                      Y. M. Lee   Minimal Event-Node Network of Project
                                  Precedence Relations . . . . . . . . . . 296--298
              Andrew Mercer and   
               Azriel Rosenfeld   An Array Grammar Programming System  . . 299--305
             Edward M. Reingold   A Nonrecursive List Moving Algorithm . . 305--307
                         H. Vos   Remark on ``Algorithm 300: Coulomb Wave
                                  Functions''  . . . . . . . . . . . . . . 308--309
                       G. Bayer   Maxflow  . . . . . . . . . . . . . . . . 309--309
                       G. Bayer   Remark on ``Algorithm 324: Maxflow'' . . 309
                B. Holmgren and   
             D. Obradovi\'c and   
                  Å. Kolm   Remark on ``Algorithm 333: Minit
                                  Algorithm for Linear Programming'' . . . 310--310
                 D. Obradovi\'c   Remark on ``Algorithm 333: Minit
                                  Algorithm for Linear Programming'' . . . 310--310
                  Jo Ann Howell   Remark on ``Algorithm 406: Exact
                                  Solution of Linear Equations Using
                                  Residue Arithmetic'' . . . . . . . . . . 311--311
              Arthur H. J. Sale   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package'' . . . . . . . . . . . . 311--311
              Robert E. Wheeler   Remark on ``Algorithm 402: Increasing
                                  the Efficiency of Quicksort''  . . . . . 311--311
                      M. K. Roy   Reflection-free permutations, rosary
                                  permutations and adjacent transposition
                                  algorithms . . . . . . . . . . . . . . . 312--312
                Mohit Kumar Roy   Reflection-Free Permutations, Rosary
                                  Permutations, and Adjacent Transposition
                                  Algorithms . . . . . . . . . . . . . . . 312--313
              Clyde H. McMorrow   Concerning music and computer
                                  composition in computational linguistics 313--313
           Richard L. Wexelblat   Another Comment on Computer Music  . . . 313--314
               Robert G. Estell   A comment on the practical aspects of
                                  computer science education . . . . . . . 314--315
               Roger Fajman and   
                   John Borgelt   WYLBUR, An Interactive Text Editing and
                                  Remote Job Entry System  . . . . . . . . 314--322
              Dennis J. Frailey   A Practical Approach to Managing
                                  Resources and Avoiding Deadlocks . . . . 323--329

Communications of the ACM
Volume 16, Number 6, June, 1973

              Richard G. Hamlet   Efficient multiprogramming resource
                                  allocation and accounting  . . . . . . . 337--342
               Erol Gelenbe and   
         J. C. A. Boekhorst and   
               J. L. W. Kessels   Minimizing Wasted Space in Partitioned
                                  Segmentation . . . . . . . . . . . . . . 343--349
                 J. Carver Hill   Synchronizing processors with
                                  memory-content-generated interrupts  . . 350--351
            Harold S. Stone and   
               Samuel H. Fuller   On the Near-Optimality of the
                                  Shortest-Latency-Time-First Drum
                                  Scheduling Discipline  . . . . . . . . . 352--353
           Peter F. Stockhausen   Adapting optimal code generation for
                                  arithmetic expressions to the
                                  instruction sets available on
                                  present-day computers  . . . . . . . . . 353--354
                 Robert F. Ling   A Computer Generated Aid for Cluster
                                  Analysis . . . . . . . . . . . . . . . . 355--361
                Ben Shneiderman   Optimum Data Base Reorganization Points  362--365
                   Horst Strunz   The development of decision tables via
                                  parsing of complex decision situations   366--369
                  James R. Bell   Threaded Code  . . . . . . . . . . . . . 370--372
           John E. Hopcroft and   
            Robert Endre Tarjan   ACM Algorithm 447: Efficient Algorithms
                                  for Graph Manipulation [H] . . . . . . . 372--378
                Terry Beyer and   
                D. F. Swinehart   ACM Algorithm 448: Number of
                                  Multiply-Restricted Partitions [A1]  . . 379--379
                J. Ferguson and   
                   P. A. Staley   Least Squares Piecewise Cubic Curve
                                  Fitting  . . . . . . . . . . . . . . . . 380--382
                  W. D. Hoskins   Cubic spline solutions to fourth-order
                                  boundary value problems  . . . . . . . . 382--385
               Franz L. Alt and   
               Judith Yuni Kirk   Computer Photocomposition of Technical
                                  Text . . . . . . . . . . . . . . . . . . 386--391

Communications of the ACM
Volume 16, Number 7, July, 1973

               Richard L. Nolan   Managing the Computer Resource: A Stage
                                  Hypothesis . . . . . . . . . . . . . . . 399--405
                    J. C. Huang   A Note on Information Organization and
                                  Storage  . . . . . . . . . . . . . . . . 406--410
      Edward W. Kozdrowicki and   
               Dennis W. Cooper   COKO III: the Cooper-Koz Chess Program   411--427
            John H. Howard, Jr.   Mixed Solutions for the Deadlock Problem 427--430
                   Erol Gelenbe   Distribution of a Program in Primary and
                                  Fast Buffer Storage  . . . . . . . . . . 431--434
                Robert F. Rosin   Teaching ``About Programming'' . . . . . 435--438
         F. Warren McFarlan and   
               Richard L. Nolan   Curriculum Recommendations for Graduate
                                  Professional Programs in Information
                                  Systems: Recommended Addendum on
                                  Information Systems Administration . . . 439--441
                 Abraham Kandel   Computer Science --- Seminars for
                                  Undergraduates . . . . . . . . . . . . . 442--442
            Gregor von Bochmann   Multiple Exits from a Loop Without the
                                  GOTO . . . . . . . . . . . . . . . . . . 443--444
             Patrick A. V. Hall   Equivalence Between AND/OR Graphs and
                                  Context-Free Grammars  . . . . . . . . . 444--445
                Frantisek Fiala   ACM Algorithm 449: Solution of Linear
                                  Programming Problems in $0$-$1$
                                  Variables [H1] . . . . . . . . . . . . . 445--447
             Brian W. Kernighan   Remark on ``Algorithm 422: Minimal
                                  Spanning Tree''  . . . . . . . . . . . . 448--448
           I. D. G. Macleod and   
                  A. M. Collins   Remark on ``Algorithm 420: Hidden-Line
                                  Plotting Program'' . . . . . . . . . . . 448--448
                Paul J. Nikolai   Certification of ``Algorithm 407: DIFSUB
                                  for Solution of Ordinary Differential
                                  Equations''  . . . . . . . . . . . . . . 448--448

Communications of the ACM
Volume 16, Number 8, August, 1973

               Michael H. Smith   A Learning Program Which Plays
                                  Partnership Dominoes . . . . . . . . . . 462--467
                B. J. MacLennan   Fen --- an Axiomatic Basis for Program
                                  Semantics  . . . . . . . . . . . . . . . 468--474
                  David Misunas   Petri Nets and Speed Independent Design  474--481
              Marek Machura and   
                 Andrzej Mulawa   ACM Algorithm 450: Rosenbrock Function
                                  Minimization [E4]  . . . . . . . . . . . 482--483
           Richard B. Goldstein   ACM Algorithm 451: Chi-Square Quantiles
                                  [G1] . . . . . . . . . . . . . . . . . . 483--485
                  C. N. Liu and   
                     D. T. Tang   ACM Algorithm 452: Enumerating
                                  Combinations of $m$ Out of $n$ Objects
                                  [G6] . . . . . . . . . . . . . . . . . . 485--485
                Robert Piessens   ACM Algorithm 453: Gaussian Quadrature
                                  Formulas for Bromwich's Integral [D1]    486--487
         Joel A. Richardson and   
                  J. L. Kuester   ACM Algorithm 454: The Complex Method
                                  for Constrained Optimization [E4]  . . . 487--489
              G. Andrejkova and   
                       J. Vinar   Remark and Certification on ``Algorithm
                                  404: Complex Gamma Function''  . . . . . 489--489
           Richard M. De Morgan   Remark on ``Algorithm 357: An Efficient
                                  Prime Number Generator [A1]''  . . . . . 489--489
             Richard P. Watkins   Remark on ``Algorithm 412: Graph
                                  Plotter''  . . . . . . . . . . . . . . . 489--490
                    J. G. Byrne   Hu-Tucker minimum redundancy alphabetic
                                  coding method  . . . . . . . . . . . . . 490--490
                     A. J. Good   Clenshaw--Curtis quadrature  . . . . . . 490--490
             Edward J. Williams   Remark on ``Algorithm 429: Localization
                                  of the Roots of a Polynomial'' . . . . . 490--490
                    J. G. Byrne   Remark on ``Algorithm 428: Hu-Tucker
                                  Minimum Redundancy Alphabetic Coding
                                  Method'' . . . . . . . . . . . . . . . . 490
                 Albert J. Good   Remark on ``Algorithm 424:
                                  Clenshaw--Curtis Quadrature''  . . . . . 490
                Zohar Manna and   
               Stephen Ness and   
                 Jean Vuillemin   Inductive Methods for Proving Properties
                                  of Programs  . . . . . . . . . . . . . . 491--502
             W. W. Peterson and   
               Tadao Kasami and   
                  Nobuki Tokura   On the Capabilities of While, Repeat,
                                  and Exit Statements  . . . . . . . . . . 503--512
               Caxton C. Foster   A Generalization of AVL Trees  . . . . . 513--517

Communications of the ACM
Volume 16, Number 9, September, 1973

               Jeffrey P. Buzen   Computational Algorithms for Closed
                                  Queueing Networks with Exponential
                                  Servers  . . . . . . . . . . . . . . . . 527--531
               S. Ganapathy and   
                   V. Rajaraman   Information Theory Applied to the
                                  Conversion of Decision Tables to
                                  Computer Programs  . . . . . . . . . . . 532--539
            Alfonso F. Cardenas   Evaluation and Selection of File
                                  Organization --- A Model and System  . . 540--548
               Richard G. Casey   Design of Tree Structures for Efficient
                                  Querying . . . . . . . . . . . . . . . . 549--556
          Juan Rodriguez-Rosell   Empirical Working Set Behavior . . . . . 556--560
          Geoffrey W. Gates and   
             David A. Poplawski   A Simple Technique for Structured
                                  Variable Lookup  . . . . . . . . . . . . 561--565
            Marvin V. Zelkowitz   Reversible Execution . . . . . . . . . . 566--566
         Robert E. Barnhill and   
               David T. Pilcher   Sard kernels for certain bivariate
                                  cubatures  . . . . . . . . . . . . . . . 567--570
               D. B. Hunter and   
              Julia M. Williams   ACM Algorithm 455: Analysis of Skew
                                  Representations of the Symmetric Group   571--572
                 Zden\vek Fencl   ACM Algorithm 456: Routing Problem . . . 572--574
                  Coen Bron and   
                  Joep Kerbosch   ACM Algorithm 457: Finding All Cliques
                                  of an Undirected Graph . . . . . . . . . 575--577
                Mohit Kumar Roy   Remark on ``Algorithm 323: Generation of
                                  Permutations in Lexicographic Order
                                  [G6]'' . . . . . . . . . . . . . . . . . 577--578
                 E. E. Lawrence   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package'' . . . . . . . . . . . . 578--578
                Hugh Williamson   Remark on ``Algorithm 420: Hidden-Line
                                  Plotting Program'' . . . . . . . . . . . 578--579
             H. B. Driessen and   
                E. W. LeM. Hunt   Remark on ``Algorithm 429: Localization
                                  of the Roots of a Polynomial'' . . . . . 579--579

Communications of the ACM
Volume 16, Number 10, October, 1973

              John S. McGeachie   Multiple Terminals Under User Program
                                  Control in a Time-Sharing Environment    587--590
           Daniel G. Bobrow and   
                   Ben Wegbreit   A Model and Stack Implementation of
                                  Multiple Environments  . . . . . . . . . 591--603
                 Vincent Y. Lum   General Performance Analysis of
                                  Key-to-Address Transformation Methods
                                  Using an Abstract File Concept . . . . . 603--612
              Butler W. Lampson   A Note on the Confinement Problem  . . . 613--615
           Daniel S. Hirschberg   A Class of Dynamic Memory Allocation
                                  Algorithms . . . . . . . . . . . . . . . 615--618
               Barton G. Prieve   Using Page Residency to Select the
                                  Working Set Parameter  . . . . . . . . . 619--620
            Robert E. Millstein   Control Structures in Illiac IV Fortran  621--627
          Charles J. Mifsud and   
              Michael J. Bohlen   Addendum to a Multiple-Precision
                                  Division Algorithm . . . . . . . . . . . 628
               P. D. Robers and   
                   S. S. Robers   ACM Algorithm 458: Discrete Linear
                                  ${L}_1$ Approximation by Interval Linear
                                  Programming [E2] . . . . . . . . . . . . 629--631
                Maciej M. Syslo   ACM Algorithm 459: The Elementary
                                  Circuits of a Graph [H]  . . . . . . . . 632--633
             Paul E. Saylor and   
             James D. Sebastian   ACM Algorithm 460: Calculation of
                                  Optimum Parameters for Alternating
                                  Direction Implicit Procedures [D3] . . . 633--635
        Forbes J. Burkowski and   
                  W. D. Hoskins   ACM Algorithm 461: Cubic Spline
                                  Solutions to a Class of Functional
                                  Differential Equations [D2]  . . . . . . 635--637
             Thomas G. Donnelly   ACM Algorithm 462: Bivariate Normal
                                  Distribution [S15] . . . . . . . . . . . 638--638
                   C. R. Lewart   ACM Algorithm 463: Algorithms SCALE1,
                                  SCALE2, and SCALE3 for Determination of
                                  Scales on Computer Generated Plots [J6]  639--640

Communications of the ACM
Volume 16, Number 11, November, 1973

             Charles W. Bachman   The Programmer as Navigator  . . . . . . 653--658
                Robert S. Fabry   Dynamic Verification of Operating System
                                  Decisions  . . . . . . . . . . . . . . . 659--668
         M. Dennis Mickunas and   
            Victor B. Schneider   A Parser-Generating System for
                                  Constructing Compressed Compilers  . . . 669--676
          B. W. Jordan, Jr. and   
                  R. C. Barrett   Scan Conversion Algorithm with Reduced
                                  Storage Requirements . . . . . . . . . . 676--682
            James R. Slagle and   
                Lewis M. Norton   Experiments with an Automatic
                                  Theorem-Prover Having Partial Ordering
                                  Inference Rules  . . . . . . . . . . . . 682--688
           Christian H. Reinsch   ACM Algorithm 464: Eigenvalues of a
                                  Real, Symmetric, Tridiagonal Matrix [F2] 689--689
                     G. W. Hill   ACM Algorithm 465: Student's $t$
                                  Frequency [S14]  . . . . . . . . . . . . 690--690
                 Gideon Ehrlich   ACM Algorithm 466: Four Combinatorial
                                  Algorithms [G6]  . . . . . . . . . . . . 690--691
                 Norman Brenner   ACM Algorithm 467: Matrix Transposition
                                  in Place [F1]  . . . . . . . . . . . . . 692--694
             T. N. L. Patterson   ACM Algorithm 468: Algorithm for
                                  Automatic Numerical Integration Over a
                                  Finite Interval [D1] . . . . . . . . . . 694--699
                     C. Lam and   
                       J. McKay   ACM Algorithm 469: Arithmetic Overa
                                  Finite Field [A1]  . . . . . . . . . . . 699--699
           Peter J. Denning and   
                G. Scott Graham   A Note on Subexpression Ordering in the
                                  Evaluation of Arithmetic Expressions . . 700--702
          Jerome A. Feldman and   
               James R. Low and   
                    R. P. Brent   Comment on Brent's scatter storage
                                  algorithm (and author's reply) . . . . . 703--703
                Eberhard Wegner   Tree-Structured Programs . . . . . . . . 704--705
              Herbert E. Salzer   A recurrence scheme for converting from
                                  one orthogonal expansion into another    705--707
                  Frank Stenger   An algorithm for the approximate
                                  solution of Wiener--Hopf integral
                                  equations  . . . . . . . . . . . . . . . 708--710
               Louis W. Ehrlich   Solving the Biharmonic Equation in a
                                  Square: a Direct Versus a Semidirect
                                  Method . . . . . . . . . . . . . . . . . 711--714

Communications of the ACM
Volume 16, Number 12, December, 1973

               J. Daniel Couger   Curriculum Recommendations for
                                  Undergraduate Programs in Information
                                  Systems  . . . . . . . . . . . . . . . . 727--749
            Edgar H. Sibley and   
               Robert W. Taylor   A Data Definition and Mapping Language   750--759
                  Milan Kubicek   ACM Algorithm 470: Linear Systems with
                                  Almost Tridiagonal Matrix [F4] . . . . . 760--761
                Walter Gautschi   ACM Algorithm 471: Exponential Integrals
                                  [S13]  . . . . . . . . . . . . . . . . . 761--763
            John G. Herriot and   
           Christian H. Reinsch   ACM Algorithm 472: Procedures for
                                  Natural Spline Interpolation [E1]  . . . 763--768


Communications of the ACM
Volume 17, Number 1, January, 1974

                    Gordon Lyon   Syntax-directed least-errors analysis
                                  for context-free languages: a practical
                                  approach . . . . . . . . . . . . . . . . 3--14
         Michael A. Malcolm and   
                    John Palmer   A fast method for solving a class of
                                  tridiagonal linear systems . . . . . . . 14--17
                  Hiroshi Akima   A method of bivariate interpolation and
                                  smooth surface fitting based on local
                                  procedures . . . . . . . . . . . . . . . 18--20
            Norman E. Gibbs and   
          William G. Poole, Jr.   Tridiagonalization by Permutations . . . 20--24
                Robert Piessens   ACM Algorithm 473: Computation of
                                  Legendre Series Coefficients [C6]  . . . 25--25
                  Hiroshi Akima   ACM Algorithm 474: Bivariate
                                  Interpolation and Smooth Surface Fitting
                                  Based on Local Procedures [E2] . . . . . 26--31
         Ivan E. Sutherland and   
                Gary W. Hodgman   Reentrant Polygon Clipping . . . . . . . 32--42
           Peter J. H. King and   
               Roger G. Johnson   Comments on the algorithms of Verhelst
                                  for the conversion of limited-entry
                                  decision tables to flowcharts (and
                                  author's reply)  . . . . . . . . . . . . 43--45
                  Gary D. Knott   A Numbering System for Combinations  . . 45--46
            Henry C. Lucas, Jr.   A CRT Report Generating System . . . . . 47--48

Communications of the ACM
Volume 17, Number 2, February, 1974

      James B. Rothnie, Jr. and   
                   Tomas Lozano   Attribute Based File Organization in a
                                  Paged Memory Environment . . . . . . . . 63--69
          B. W. Jordan, Jr. and   
                  R. C. Barrett   A Cell Organized Raster Display for Line
                                  Drawings . . . . . . . . . . . . . . . . 70--77
            John S. Ramberg and   
             Bruce W. Schmeiser   An Approximate Method for Generating
                                  Asymmetric Random Variables  . . . . . . 78--82
                 Leslie Lamport   The Parallel Execution of DO Loops . . . 83--93
               Henry F. Ledgard   Production Systems: or can we do better
                                  than BNF?  . . . . . . . . . . . . . . . 94--102
                   Ben Wegbreit   The Synthesis of Loop Predicates . . . . 102--112

Communications of the ACM
Volume 17, Number 3, March, 1974

             K. Sreenivasan and   
                 A. J. Kleinman   On the Construction of a Representative
                                  Synthetic Workload . . . . . . . . . . . 127--133
               E. Balkovich and   
                    W. Chiu and   
               Leon Presser and   
                        R. Wood   Dynamic Memory Repacking . . . . . . . . 133--138
              Howard Lee Morgan   Optimal Space Allocation on Disk Storage
                                  Devices  . . . . . . . . . . . . . . . . 139--142
                  Rudolf Loeser   Some Performance Tests of ``Quicksort''
                                  and Descendants  . . . . . . . . . . . . 143--152
                  Thomas Wright   ACM Algorithm 475: Visible Surface
                                  Plotting Program [J6]  . . . . . . . . . 152--155
            Nancy E. Bosten and   
                 E. L. Battiste   Remark on ``Algorithm 179: Incomplete
                                  Beta Ratio'' . . . . . . . . . . . . . . 156--157
              R. C. Barrett and   
              B. W. Jordan, Jr.   Scan Conversion Algorithms for a Cell
                                  Organized Raster Display . . . . . . . . 157--163
          Arunachalam Ravindran   Remark on ``Algorithm 431: A Computer
                                  Routine for Quadratic and Linear
                                  Programming Problems'' . . . . . . . . . 157
               David H. Withers   Remark on ``Algorithm 419: Zeros of a
                                  Complex Polynomial'' . . . . . . . . . . 157
              A. Frank Ackerman   Quadratic Search for Hash Tables of Size
                                  $p^n$  . . . . . . . . . . . . . . . . . 164--164
             Stephen W. Smoliar   Emotional Content Considered Dangerous   164--165
                Harold S. Stone   A note on a combinatorial problem of
                                  Burnett and Coffman  . . . . . . . . . . 165--166
                  Fred T. Krogh   Efficient Implementation of a Variable
                                  Projection Algorithm for Nonlinear Least
                                  Squares Problems . . . . . . . . . . . . 167--169

Communications of the ACM
Volume 17, Number 4, April, 1974

              Jerome H. Saltzer   A Simple Linear Model of Demand Paging
                                  Performance  . . . . . . . . . . . . . . 181--186
           Mark A. Franklin and   
                    R. K. Gupta   Computation of Page Fault Probability
                                  from Program Transition Diagram  . . . . 186--191
                  John W. Boyse   Execution Characteristics of Programs in
                                  a Page-On-Demand System  . . . . . . . . 192--196
               Graham Smith and   
                  Ian M. Sefton   On Lions' Counter Example for Gotlieb's
                                  Method for the Construction of School
                                  Timetables . . . . . . . . . . . . . . . 196--197
                 Gary Lindstrom   Copying List Structures Using Bounded
                                  Workspace  . . . . . . . . . . . . . . . 198--202
                    Shimon Even   Parallelism in Tape-Sorting  . . . . . . 202--204
        Henry C. Lucas, Jr. and   
        David B. Montgomery and   
           Jean Claude Larreche   A study of computer use in a graduate
                                  school of business . . . . . . . . . . . 205--206
              Peter Freeman and   
         Michael A. Malcolm and   
               William H. Payne   Graduate Education: The Ph.D. Glut:
                                  Response and Rebuttal  . . . . . . . . . 206--207
        Theodor D. Sterling and   
             Seymour V. Pollack   Ideal teaching machines --- a solution
                                  to the pedagogic language problem  . . . 207--208
               Paul W. Abrahams   Some Remarks on Lookup of Structured
                                  Variables  . . . . . . . . . . . . . . . 209--210
              Grover C. Simmons   Addendum to M. L. Patrick Paper  . . . . 209
                     A. Balfour   An alternative approach to mutual
                                  recursion in Algol 60 using restricted
                                  compilers  . . . . . . . . . . . . . . . 210--210
               R. C. T. Lee and   
                C. L. Chang and   
           Richard J. Waldinger   An Improved Program-Synthesizing
                                  Algorithm and its Correctness  . . . . . 211--217
                    A. K. Cline   Scalar- and Planar-Valued Curve Fitting
                                  Using Splines Under Tension. I . . . . . 218--220
                    A. K. Cline   ACM Algorithm 476: Six Subprograms for
                                  Curve Fitting Using Splines Under
                                  Tension [E2] . . . . . . . . . . . . . . 220--223
                 Gideon Ehrlich   ACM Algorithm 477: Generator of
                                  Set-Partitions to Exactly $R$ Subsets
                                  [G7] . . . . . . . . . . . . . . . . . . 224--225
                   Bo Einarsson   Remark on ``Algorithm 443: Solution of
                                  the Transcendental Equation
                                  $w\exp(w)=x$'' . . . . . . . . . . . . . 225--225

Communications of the ACM
Volume 17, Number 5, May, 1974

                      Mary Shaw   Reduction of Compilation Costs Through
                                  Language Contraction . . . . . . . . . . 245--250
                   Ben Wegbreit   The Treatment of Data Types in EL1 . . . 251--264
               Robert A. Wagner   Order-$n$ Correction for Regular
                                  Languages  . . . . . . . . . . . . . . . 265--268
                  Nai Kuan Tsao   On the Distributions of Significant
                                  Digits and Roundoff Errors . . . . . . . 269--271
       Marvin C. Wunderlich and   
                J. L. Selfridge   Design for a Number Theory Package with
                                  an Optimized Trial Division Routine  . . 272--276
        W. Morven Gentleman and   
              Scott B. Marovich   More on Algorithms that Reveal
                                  Properties of Floating Point Arithmetic
                                  Units  . . . . . . . . . . . . . . . . . 276--277
                 D. E. Gold and   
                  David J. Kuck   A Model for Masking Rotational Latency
                                  by Dynamic Disk Allocation . . . . . . . 278--288

Communications of the ACM
Volume 17, Number 6, June, 1974

              Jacques Cohen and   
                 Carl Zuckerman   Two Languages for Estimating Program
                                  Efficiency . . . . . . . . . . . . . . . 301--308
       Lawrence J. Henschen and   
           Ross A. Overbeek and   
                      Larry Wos   A Theorem-Proving Language for
                                  Experimentation  . . . . . . . . . . . . 308--314
                James F. Gimpel   The Minimization of
                                  Spatially-Multiplexed Character Sets . . 315--318
               I. Barrodale and   
               F. D. K. Roberts   ACM Algorithm 478: Solution of an
                                  Overdetermined System of Equations in
                                  the $L_1$ Norm [F4]  . . . . . . . . . . 319--320
                     R. L. Page   ACM Algorithm 479: A Minimal Spanning
                                  Tree Clustering Method [Z] . . . . . . . 321--323
                     B. Gaither   Hidden-line plotting program . . . . . . 324--324
                Robert Piessens   Remark on ``Algorithm 418: Calculation
                                  of Fourier Integrals'' . . . . . . . . . 324--324
                Robert Piessens   Remark on ``Algorithm 400: Modified
                                  Haåvie Integration''  . . . . . . . . . . 324--324
                 T. M. R. Ellis   Remark on ``Algorithm 420: Hidden-Line
                                  Plotting Program'' . . . . . . . . . . . 324--325
                 Blaine Gaither   Remark on ``Algorithm 420: Hidden-Line
                                  Plotting Program'' . . . . . . . . . . . 324
                     R. L. Page   Remark on ``Algorithm 425: Generation of
                                  Random Correlated Normal Variables'' . . 325--325
                  D. M. Boulton   Remark on ``Algorithm 434: Exact
                                  Probabilities for $R \times C$
                                  Contingency Tables'' . . . . . . . . . . 326--326
               William D. Slysz   An Evaluation of Statistical Software in
                                  the Social Sciences  . . . . . . . . . . 326--332
                 John Adams and   
                      John Gary   Compact Representation of Contour Plots
                                  for Phone Line Transmission  . . . . . . 333--336
            William A. Wulf and   
             Ellis S. Cohen and   
          William M. Corwin and   
             Anita K. Jones and   
                  Roy Levin and   
                 C. Pierson and   
                Fred J. Pollack   HYDRA: The Kernel of a Multiprocessor
                                  Operating System . . . . . . . . . . . . 337--345
              Ian J. Barton and   
           Susan E. Creasey and   
           Michael F. Lynch and   
               Michael J. Snell   An Information-Theoretic Approach to
                                  Text Searching in Direct Access Systems  345--350
                 Edward Minieka   On Computing Sets of Shortest Paths in a
                                  Graph  . . . . . . . . . . . . . . . . . 351--353

Communications of the ACM
Volume 17, Number 7, July, 1974

          Dennis M. Ritchie and   
                   Ken Thompson   The UNIX Time-Sharing System . . . . . . 365--375
               Samuel H. Fuller   Minimal-Total-Processing Time Drum and
                                  Disk Scheduling Disciplines  . . . . . . 376--381
              John L. Bruno and   
     Edward G. Coffman, Jr. and   
                     Ravi Sethi   Scheduling Independent Tasks To Reduce
                                  Mean Finishing Time  . . . . . . . . . . 382--387
              Jerome H. Saltzer   Protection and the Control of
                                  Information Sharing in Multics . . . . . 388--402
                Robert S. Fabry   Capability-Based Addressing  . . . . . . 403--412
            Gerald J. Popek and   
             Robert P. Goldberg   Formal Requirements for Virtualizable
                                  Third Generation Architectures . . . . . 412--421

Communications of the ACM
Volume 17, Number 8, August, 1974

                     Bruce Hahn   A New Technique for Compression and
                                  Storage of Data  . . . . . . . . . . . . 434--436
          Arthur Evans, Jr. and   
         William Kantrowitz and   
                    Edwin Weiss   A User Authentication Scheme Not
                                  Requiring Secrecy in the Computer  . . . 437--442
                George B. Purdy   A High Security Log-in Procedure . . . . 442--445
       Theodore D. Friedman and   
               Lance J. Hoffman   Execution Time Requirements for
                                  Encipherment Programs  . . . . . . . . . 445--449
              G. A. Neufeld and   
                    John Tartar   Graph Coloring Conditions for the
                                  Existence of Solutions to the Timetable
                                  Problem  . . . . . . . . . . . . . . . . 450--453
                 Leslie Lamport   A New Solution of Dijkstra's Concurrent
                                  Programming Problem  . . . . . . . . . . 453--455
               John C. Cavouras   On the Conversion of Programs to
                                  Decision Tables: Method and Objectives   456--462
                  Tom Lyche and   
             Larry L. Schumaker   ACM Algorithm 480: Procedures for
                                  computing Smoothing and Interpolating
                                  Natural Splines [E1] . . . . . . . . . . 463--467
              Keith C. Crandall   ACM Algorithm 481: Arrow to Precedence
                                  Network Transformation [H] . . . . . . . 467--469
                 John McKay and   
                     E. Regener   ACM Algorithm 482: Transitivity Sets
                                  [G7] . . . . . . . . . . . . . . . . . . 470--470
               Adhemar Bultheel   Remark on ``Algorithm 450: Rosenbrock
                                  Function Minimization''  . . . . . . . . 470
                   A. H. Stroud   Gauss Harmonic Interpolation Formulas    471--475
               Kenneth D. Shere   Remark on ``Algorithm 454: The Complex
                                  Method for Constrained Optimization''    471
       Rolf O. E. Lagerlöf   Interpolation with Rounded Ramp
                                  Functions  . . . . . . . . . . . . . . . 476--479
                Forman S. Acton   Recurrence Relations for the Fresnel
                                  Integral
                                  $\int_0^\infty[\exp(-ct)dt/(t)^{1/2}(1+t^2)]$ and Similar Integrals  480--481

Communications of the ACM
Volume 17, Number 9, 1974

            Daniel D. McCracken   A Problem-List of Issues Concerning
                                  Computers and Public Policy --- A Report
                                  of the ACM Commitee on Computers and
                                  Public Policy  . . . . . . . . . . . . . 495--503
                  I. M. Willers   A New Integration Algorithm for Ordinary
                                  Differential Equations Based on
                                  Continued Fraction Approximations  . . . 504--508
                  Oliver Aberth   A Precise Numerical Analysis Program . . 509--513
                 To-yat. Cheung   Interactive Graphic Display for Region
                                  Partitioning by Linear Programming . . . 513--516
               Mario Schkolnick   The Equivalence of Reducing Transition
                                  Languages and Deterministic Languages    517--519
              Steven L. Watkins   ACM Algorithm 483: Masked
                                  Three-Dimensional Plot Program with
                                  Rotations [J6] . . . . . . . . . . . . . 520--523
               Keith H. Burrell   ACM Algorithm 484: Evaluation of the
                                  Modified Bessel Functions ${K}_0(z)$ and
                                  ${K}_1(z)$ for Complex Arguments [S17]   524--526
           Harold D. Eidson and   
             Larry L. Schumaker   ACM Algorithm 485: Computation of
                                  $g$-Splines via a Factorization Method
                                  [E2] . . . . . . . . . . . . . . . . . . 526--530
                  John W. Young   A First Order Approximation to the
                                  Optimal Checkpoint Interval  . . . . . . 530--531
                 Keith Shwayder   Extending the Information Theory
                                  Approach to Converting Limited-Entry
                                  Decision Tables to Computer Programs . . 532--537

Communications of the ACM
Volume 17, Number 10, October, 1974

                 C. A. R. Hoare   Monitors: An Operating System
                                  Structuring Concept  . . . . . . . . . . 549--557
            Kenneth K. Shen and   
              James L. Peterson   A Weighted Buddy Method for Dynamic
                                  Storage Allocation . . . . . . . . . . . 558--562
            Donald R. Slutz and   
              Irving L. Traiger   A note on the calculation of average
                                  working set size . . . . . . . . . . . . 563--565
            Ben Shneiderman and   
              Peter Scheuermann   Structured Data Structures . . . . . . . 566--574
              R. H. Canaday and   
             R. D. Harrison and   
               Evan L. Ivie and   
                J. L. Ryder and   
                     L. A. Wehr   A Back-end Computer for Data Base
                                  Management . . . . . . . . . . . . . . . 575--582
                 A. Charnes and   
                W. M. Raike and   
                J. D. Stutz and   
                  A. S. Walters   On Generation of Test Problems for
                                  Linear Programming Codes . . . . . . . . 583--586
              Francoise Veillon   ACM Algorithm 486: Numerical Inversion
                                  of Laplace Transform . . . . . . . . . . 587--589
                 Henk Koppelaar   Certification and Remark on ``Algorithm
                                  191: Hypergeometric''  . . . . . . . . . 589--590
                    L. G. Proll   Remark on ``Algorithm 431: A Computer
                                  Routine for Quadratic and Linear
                                  Programming Problems'' . . . . . . . . . 590--590
                Jiri Klemes and   
                Jaroslav Klemsa   Remark on ``Algorithm 450: Rosenbrock
                                  Function Minimization''  . . . . . . . . 590--591
                  Fred T. Krogh   Errata: ``Efficient Implementation of a
                                  Variable Projection Algorithm for
                                  Nonlinear Least Squares''  . . . . . . . 591--591
            Bruce Gilchrist and   
               Richard E. Weber   Enumerating Full-Time Programmers  . . . 592--593

Communications of the ACM
Volume 17, Number 11, November, 1974

            Theodor D. Sterling   Guidelines for Humanizing Computerized
                                  Information Systems, A Report from
                                  Stanley House  . . . . . . . . . . . . . 609--613
               Domenico Ferrari   Improving Locality by Critical Working
                                  Sets . . . . . . . . . . . . . . . . . . 614--620
            Perry Lowell Miller   A Locally-Organized Parser for Spoken
                                  Input  . . . . . . . . . . . . . . . . . 621--630
                  Gary M. Rader   Method for Composing Simple Traditional
                                  Music by Computer  . . . . . . . . . . . 631--638
            R. A. Freiburghouse   Register Allocation Via Usage Counts . . 638--642
             Edsger W. Dijkstra   Self-stabilizing Systems in Spite of
                                  Distributed Control  . . . . . . . . . . 643--644
                J. A. Brown and   
                 Bernard Werner   An On-Site Data Management System
                                  Application in Field Archaeology . . . . 644--646
                David R. Hanson   A simple technique for representing
                                  strings in Fortran IV  . . . . . . . . . 646--647
           C. J. Van Rijsbergen   The Best-Match Problem in Document
                                  Retrieval  . . . . . . . . . . . . . . . 648--649
                    R. V. Evans   Multiple exits from a loop using neither
                                  GO TO nor labels . . . . . . . . . . . . 650--650

Communications of the ACM
Volume 17, Number 12, December, 1974

                Donald E. Knuth   Computer Programming as an Art . . . . . 667--673
              Laurance I. Press   Arguments for a Moratorium on the
                                  Construction of a Community Information
                                  Utility  . . . . . . . . . . . . . . . . 674--678
                 Jon C. Strauss   An analytic model of the Hasp execution
                                  task monitor . . . . . . . . . . . . . . 679--685
             Thomas L. Adam and   
             K. Mani Chandy and   
                  J. R. Dickson   A Comparison of List Schedules for
                                  Parallel Processing Systems  . . . . . . 685--690
                  N. D. Wallace   Computer Generation of Gamma Random
                                  Variates with Non-Integral Shape
                                  Parameters . . . . . . . . . . . . . . . 691--695
                 A. Salazar and   
                  R. V. Oakford   A Graph Formulation of a School
                                  Scheduling Algorithm . . . . . . . . . . 696--698
            Sherwood C. Chu and   
                   Mones Berman   An Exponential Method for the Solution
                                  of Systems of Ordinary Differential
                                  Equations  . . . . . . . . . . . . . . . 699--702
                  John Pomeranz   ACM Algorithm 487: Exact Cumulative
                                  Distribution of the Kolmogorov--Smirnov
                                  Statistic for Small Samples  . . . . . . 703--704
               Richard P. Brent   ACM Algorithm 488: A Gaussian
                                  pseudo-random number generator [G5]  . . 704--706
                        C. Bron   Remark on ``Algorithm 426: Merge Sort
                                  Algorithm''  . . . . . . . . . . . . . . 706
                 T. M. R. Ellis   Remark on ``Algorithm 420: Hidden-Line
                                  Plotting Program'' . . . . . . . . . . . 706
                  Gerhard Tesch   Remark on ``Algorithm 456: Routing
                                  Problem''  . . . . . . . . . . . . . . . 706
             C. William Skinner   Heuristic Approach to Inductive
                                  Inference in Fact Retrieval Systems  . . 707--712


Communications of the ACM
Volume 18, Number 1, 1975

            Ralph A. Willoughby   Special Issue Honoring Alston S.
                                  Householder --- Editor's Foreword  . . . 3
                 Aaron Finerman   Professionalism in the Computing Field   4--9
             Friedrich L. Bauer   Positivity and Norms . . . . . . . . . . 9--13
                      John Todd   The Lemniscate Constants . . . . . . . . 14--19
                  G. Peters and   
          James Hardy Wilkinson   On the Stability of Gauss--Jordan
                                  Elimination with Pivoting  . . . . . . . 20--24
               Garrett Birkhoff   Two Hadamard Numbers for Matrices  . . . 25--29
               A. van der Sluis   Perturbations of Eigenvalues of
                                  Non-Normal Matrices  . . . . . . . . . . 30--36
              Marvin Marcus and   
               Herbert Robinson   Elementary Divisors of Tensor Products   36--39
             Magnus R. Hestenes   Pseudoinverses and Conjugate Gradients   40--43
                Harlan D. Mills   The New Math of Computer Programming . . 43--48
              Tien Chi Chen and   
                   Irving T. Ho   Storage-Efficient Representation of
                                  Decimal Data . . . . . . . . . . . . . . 49--52
                 Werner Liniger   Connections Between Accuracy and
                                  Stability Properties of Linear Multistep
                                  Formulas . . . . . . . . . . . . . . . . 53--56
              Richard J. Hanson   Stably Updating Mean and Standard
                                  Deviation of Data  . . . . . . . . . . . 57--58

Communications of the ACM
Volume 18, Number 2, February, 1975

              G. J. Burnett and   
         Edward G. Coffman, Jr.   Analysis of Interleaved Memory Systems
                                  Using Blockage Buffers . . . . . . . . . 91--95
                Neil M. Goldman   Sentence Paraphrasing from a Conceptual
                                  Base . . . . . . . . . . . . . . . . . . 96--106
     Gordon J. van der Brug and   
                    Jack Minker   State-Space, Problem-Reduction, and
                                  Theorem Proving --- Some Relationships   107--115
                  Ove Skovgaard   Remark on ``Algorithm 332: Jacobi
                                  Polynomials''  . . . . . . . . . . . . . 116--117
              William J. Knight   Certification of ``Algorithm 451:
                                  Chi-Square Quantiles'' . . . . . . . . . 116
                  T. W. Hancock   Remark on ``Algorithm 434: Exact
                                  Probabilities for $R \times C$
                                  Contingency Tables'' . . . . . . . . . . 117--119
                 H. S. Magnuski   Remark on ``Algorithm 479: A Minimal
                                  Spanning Tree Clustering Method''  . . . 119
                Maciej M. Syslo   Remark on ``Algorithm 459: The
                                  Elementary Circuits of a Graph'' . . . . 119
              Carolyn Kimme and   
               Dana Ballard and   
                  Jack Sklansky   Finding Circles by an Array of
                                  Accumulators . . . . . . . . . . . . . . 120--122
                  John McCarthy   ACM Forum: Proposed Criterion for a
                                  Cipher to be Probable-Word-Proof . . . . 131--132

Communications of the ACM
Volume 18, Number 3, March, 1975

             H. C. Johnston and   
                 C. A. R. Hoare   Matrix Reduction --- an Efficient Method
                                  (school timetables)  . . . . . . . . . . 141--150
         Brian W. Kernighan and   
              Lorinda L. Cherry   A System for Typesetting Mathematics . . 151--156
           Duncan H. Lawrie and   
                  T. Layman and   
                    D. Baer and   
                   J. M. Randal   GLYPNIR --- A programming language for
                                  Illiac IV  . . . . . . . . . . . . . . . 157--164
            Robert W. Floyd and   
               Ronald L. Rivest   Expected Time Bounds for Selection . . . 165--172
            Robert W. Floyd and   
               Ronald L. Rivest   ACM Algorithm 489: The Algorithm SELECT
                                  --- for Finding the $i$th Smallest of
                                  $n$ Elements [M1]  . . . . . . . . . . . 173--173
             Jerry D. Whitt and   
           A. Gale Sullenberger   The Algorithm Sequential Access Method:
                                  An Alternative to Index Sequential . . . 174--176
              Richard Alan Karp   A Reply to Gentleman and Marovich  . . . 174
              A. M. Erisman and   
                   W. F. Tinney   On Computing Certain Elements of the
                                  Inverse of a Sparse Matrix . . . . . . . 177--179
                 L. F. Shampine   Discrete Least Squares Polynomial Fits   179--180
               A. van der Sluis   Corrigendum: ``Perturbations of
                                  eigenvalues of non-normal matrices'' . . 180
             David Lorge Parnas   On a Solution to the Cigarette Smoker's
                                  Problem (Without Conditional Statements) 181--183

Communications of the ACM
Volume 18, Number 4, April, 1975

           Jack A. Chambers and   
                   Ray V. Poore   Computer Networks in Higher Education:
                                  Socio-Economic-Political Factors . . . . 193--199
             E. S. Ginsberg and   
             Dorothy Zaborowski   ACM Algorithm 490: The Dilogarithm
                                  Function of a Real Argument [S22]  . . . 200--202
                 K. K. Shen and   
                 J. L. Peterson   Corrigendum: ``A Weighted Buddy Method
                                  for Dynamic Storage Allocation'' . . . . 202--202
          Lawrence W. Frederick   Remark on ``Algorithm 475'': Visible
                                  Surface Plotting Program [J6]  . . . . . 202
                   Graham Smith   On Maintenance of the Opportunity List
                                  for Class-Teacher Timetable Problems . . 203--208
                    I. C. Braid   The Synthesis of Solids Bounded by Many
                                  Faces  . . . . . . . . . . . . . . . . . 209--216
              Vladimir Batagelj   Quadratic Hash Method When the Table
                                  Size is not a Prime Number . . . . . . . 216--217
           Henry S. Warren, Jr.   A Modification of Warshall's Algorithm
                                  for the Transitive Closure of Binary
                                  Relations  . . . . . . . . . . . . . . . 218--220
                 James A. Hinds   Algorithm for Locating Adjacent Storage
                                  Blocks in the Buddy System . . . . . . . 221--222
            Jean G. Vaucher and   
                   Pierre Duval   A Comparison of Simulation Event List
                                  Algorithms . . . . . . . . . . . . . . . 223--230
         Robert R. Korfhage and   
                David W. Matula   On Salazar and Oakford . . . . . . . . . 240--240
           Michael R. Garey and   
               David S. Johnson   On Salazar and Oakford . . . . . . . . . 240--241

Communications of the ACM
Volume 18, Number 5, May, 1975

                David A. Fisher   Copying Cyclic List Structures in Linear
                                  Time Using Bounded Workspace . . . . . . 251--252
            Alfonso F. Cardenas   Analysis and Performance of Inverted
                                  Data Base Structures . . . . . . . . . . 253--263
                   Yorick Wilks   An intelligent analyzer and understander
                                  of English . . . . . . . . . . . . . . . 264--274
                Norman E. Gibbs   ACM Algorithm 491: Basic Cycle
                                  Generation [H] . . . . . . . . . . . . . 275--276
            Robert Piessens and   
                  Irene Mertens   Remark and Certification on ``Algorithm
                                  446: Ten Subroutines for the
                                  Manipulation of Chebyshev Series'' . . . 276--276
                 R. G. Mashburn   Remark on ``Algorithm 475: Visible
                                  Surface Plotting Program'' . . . . . . . 276--277
                    C. J. Doran   Remark on ``Algorithm 475: Visible
                                  Surface Plotting Program'' . . . . . . . 277
            Fred N. Fritsch and   
              Alan C. Hindmarsh   Remark on ``Algorithm 478: Solution of
                                  an Overdetermined System of Equations in
                                  the $L_1$ Norm'' . . . . . . . . . . . . 277
                D. J. Evans and   
            Michael Hatzopoulos   A note on the LU factorization of a
                                  symmetric matrix . . . . . . . . . . . . 278--279
                      B. L. Fox   More on $k$th Shortest Paths . . . . . . 279--279
           Anthony I. Wasserman   A Problem-List of Public Policy Issues
                                  Concerning Computers and Health Care . . 279--280
                Harlan D. Mills   Corrigendum: ``The New Math of Computer
                                  Programming''  . . . . . . . . . . . . . 280--280
             Steven L. Horowitz   Syntactic Algorithm for Peak Detection
                                  in Waveforms with Applications to
                                  Cardiography . . . . . . . . . . . . . . 281--285
         Charles E. Pfefferkorn   Heuristic Problem Solving Design System
                                  for Equipment or Furniture Layouts . . . 286--297
         Robert R. Korfhage and   
                David W. Matula   More on the Salazar and Oakford Paper    303--303

Communications of the ACM
Volume 18, Number 6, June, 1975

                Norman E. Gibbs   ACM Algorithm 492: Generation of All the
                                  Cycles of a Graph from a Set of Basic
                                  Cycles [H] . . . . . . . . . . . . . . . 310--310
                Bui Tuong Phong   Illumination for Computer Generated
                                  Pictures . . . . . . . . . . . . . . . . 311--317
             Vincent Y. Lum and   
           Michael E. Senko and   
                 C. P. Wang and   
                        H. Ling   A Cost Oriented Algorithm for Data Set
                                  Allocation in Storage Hierarchies  . . . 318--322
             Alan F. Babich and   
                John Grason and   
             David Lorge Parnas   Significant Event Simulation . . . . . . 323--329
             Robert B. K. Dewar   Indirect Threaded Code . . . . . . . . . 330--331
               Ben Cranston and   
                    Rick Thomas   Simplified Recombination Scheme for the
                                  Fibonacci Buddy System . . . . . . . . . 331--332
              Alfred V. Aho and   
           Margaret J. Corasick   Efficient String Matching: an Aid to
                                  Bibliographic Search . . . . . . . . . . 333--340
           Daniel S. Hirschberg   A Linear Space Algorithm for Computing
                                  Maximal Common Subsequences  . . . . . . 341--343
                  Stephen Soule   Addition in an Arbitrary Base Without
                                  Radix Conversion . . . . . . . . . . . . 344--346
               L. H. Harper and   
                T. H. Payne and   
             John E. Savage and   
                      E. Straus   Sorting $X + Y$  . . . . . . . . . . . . 347--349
                  F. Paul Wyman   Improved Event-Scanning Mechanisms for
                                  Discrete Event Simulation  . . . . . . . 350--353
            Donald E. Knuth and   
           Charles T. Zahn, Jr.   Ill-Chosen Use of ``Event''  . . . . . . 360--360

Communications of the ACM
Volume 18, Number 7, July, 1975

                 P. J. Courtois   Decomposability, Instabilities, and
                                  Saturation in Multiprogramming Systems   371--377
           Sòren Lauesen   A Large Semaphore Based Operating System 377--389
                Naomi Sager and   
                 Ralph Grishman   Restriction Language for Computer
                                  Grammars of Natural Language . . . . . . 390--400
         David Lorge Parnas and   
            Daniel P. Siewiorek   Use of the Concept of Transparency in
                                  the Design of Hierarchically Structured
                                  Systems  . . . . . . . . . . . . . . . . 401--408
            Herbert Freeman and   
                   Ruth Shapira   Determining the Minimum-Area Encasing
                                  Rectangle for an Arbitrary Closed Curve  409--413
               Daniel G. Bobrow   A Note on Hash Linking . . . . . . . . . 413--415
           Richard E. Weber and   
                Bruce Gilchrist   Discrimination in the employment of
                                  women in the computer industry . . . . . 416--418

Communications of the ACM
Volume 18, Number 8, August, 1975

                  John E. Shore   On the External Storage Fragmentation
                                  Produced by First-Fit and Best-Fit
                                  Allocation Strategies  . . . . . . . . . 433--440
              Alfred V. Aho and   
         Stephen C. Johnson and   
              Jeffrey D. Ullman   Deterministic Parsing of Ambiguous
                                  Grammars . . . . . . . . . . . . . . . . 441--452
             Edsger W. Dijkstra   Guarded Commands, Nondeterminacy and
                                  Formal Derivation of Programs  . . . . . 453--457
                  Ira W. Cotton   Remark on stably updating mean and
                                  standard deviation of data . . . . . . . 458--458
          Stuart C. Shapiro and   
              Stanley C. Kwasny   Interactive Consulting via Natural
                                  Language . . . . . . . . . . . . . . . . 459--462
                      John Todd   Corrigendum: ``The Lemniscate
                                  Constants''  . . . . . . . . . . . . . . 462--462
              J. G. Vaucher and   
                       P. Duval   Corrigendum: ``A comparison of
                                  simulation event list algorithms'' . . . 462--462
                 Alan Jay Smith   Comments on a paper by T. C. Chen and I.
                                  T. Ho  . . . . . . . . . . . . . . . . . 463--463
                    A. J. Smith   Comments on a paper by T. C. Chen and I.
                                  T. Ho  . . . . . . . . . . . . . . . . . 463--463
                 Sakti P. Ghosh   Consecutive Storage of Relevant Records
                                  with Redundancy  . . . . . . . . . . . . 464--471
                 Leslie Lamport   Multiple Byte Processing with Full-Word
                                  Instructions . . . . . . . . . . . . . . 471--475
                 Keith Shwayder   Combining Decision Rules in a Decision
                                  Table  . . . . . . . . . . . . . . . . . 476--480

Communications of the ACM
Volume 18, Number 9, September, 1975

             Guy L. Steele, Jr.   Multiprocessing Compactifying Garbage
                                  Collection . . . . . . . . . . . . . . . 495--508
              Jon Louis Bentley   Multidimensional Binary Search Trees
                                  Used for Associative Searching . . . . . 509--517
               R. Mark Claudson   Digital Simulation of River Plankton
                                  Population Dynamics  . . . . . . . . . . 517--523
           William F. Piepmeier   Optimal Balancing of I/O Requests to
                                  Disks  . . . . . . . . . . . . . . . . . 524--527
                   Ben Wegbreit   Mechanical Program Analysis  . . . . . . 528--539

Communications of the ACM
Volume 18, Number 10, October, 1975

                  Rob Gerritsen   A Preliminary System for the Design of
                                  DBTG Data Structures . . . . . . . . . . 551--557
                 Nan C. Shu and   
           Barron C. Housel and   
                 Vincent Y. Lum   CONVERT: A High Level Translation
                                  Definition Language for Data Conversion  557--567
                T. Sterling and   
                     V. Lum and   
                     N. Shu and   
                      B. Housel   \em CONVERT: A High Level Translation
                                  Definition Language for Data Conversion  557--567
           John Miles Smith and   
          Philip Yen-Tang Chang   Optimizing the Performance of a
                                  Relational Algebra Data Base Interface   568--579
         Morton M. Astrahan and   
           Donald D. Chamberlin   Implementation of a Structured English
                                  Query Language . . . . . . . . . . . . . 580--588
                  Fanica Gavril   Merging with Parallel Processors . . . . 588--591
              Martin Reiser and   
                   H. Kobayashi   Horner's Rule for the Evaluation of
                                  General Closed Queueing Networks . . . . 592--593

Communications of the ACM
Volume 18, Number 11, November, 1975

              Gerard Salton and   
                    A. Wong and   
                     C. S. Yang   A Vector Space Model for Automatic
                                  Indexing . . . . . . . . . . . . . . . . 613--620
           Raymond F. Boyce and   
       Donald D. Chamberlin and   
          W. Frank King III and   
              Michael M. Hammer   Specifying Queries as Relational
                                  Expressions: The SQUARE Data Sublanguage 621--628
           Henry F. Ledgard and   
               Michael Marcotty   A Genealogy of Control Structures  . . . 629--639
            Susan L. Graham and   
               Steven P. Rhodes   Practical Syntactic Error Recovery . . . 639--650
            James R. Bitner and   
             Edward M. Reingold   Backtrack Programming Techniques . . . . 651--656
            Lawrence T. Kou and   
                     C. K. Wong   A Note on the Set Basis Problem Related
                                  to the Compaction of Character Sets  . . 656--657

Communications of the ACM
Volume 18, Number 12, December, 1975

                     Peter Naur   Programming Languages, Natural
                                  Languages, and Mathematics . . . . . . . 676--683
             John B. Goodenough   Exception Handling: Issues and a
                                  Proposed Notation  . . . . . . . . . . . 683--696
             Mehdi Jazayeri and   
           William F. Ogden and   
              William C. Rounds   The Intrinsically Exponential Complexity
                                  of the Circularity Problem for Attribute
                                  Grammars . . . . . . . . . . . . . . . . 697--706
         Harry B. Hunt, III and   
        Thomas G. Szymanski and   
              Jeffrey D. Ullman   On the Complexity of LR(k) Testing . . . 707--716
            Susan L. Graham and   
                 Mark N. Wegman   A Fast and Usually Linear Algorithm for
                                  Global Flow Analysis (Abstract)  . . . . 716--716
              Richard J. Lipton   Reduction: A Method of Proving
                                  Properties of Parallel Programs  . . . . 717--721
              Jacob T. Schwartz   Automatic Data Structure Choice in a
                                  Language of Very High Level  . . . . . . 722--728


Communications of the ACM
Volume 19, Number 1, January, 1976

          Leonard Kleinrock and   
          William E. Naylor and   
               Holger Opderbeck   A Study of Line Overhead in the ARPANET  3--13
                Neil C. Wilhelm   An Anomaly in Disk Scheduling: A
                                  Comparison of FCFS and SSTF Seek
                                  Scheduling Using an Empirical Model for
                                  Disk Accesses  . . . . . . . . . . . . . 13--17
                Carson E. Agnew   On Quadratic Adaptive Routing Algorithms 18--22
          Philip L. Karlton and   
           Samuel H. Fuller and   
              R. E. Scroggs and   
                  E. B. Kaehler   Performance of Height-Balanced Trees . . 23--28
                J. J. Florentin   Information Reference Coding . . . . . . 29--33
         Charles R. Litecky and   
                Gordon B. Davis   Study of Errors, Error-Proneness, and
                                  Error Diagnosis in Cobol . . . . . . . . 33--37

Communications of the ACM
Volume 19, Number 2, February, 1976

            Gregor von Bochmann   Semantic Evaluation from Left to Right   55--62
               Ronald L. Rivest   On Self-Organizing Sequential Search
                                  Heuristics . . . . . . . . . . . . . . . 63--67
                     F. M. Ives   Permutation Enumeration: Four New
                                  Permutation Algorithms . . . . . . . . . 68--72
               Alberto Martelli   Application of Heuristic Search Methods
                                  to Edge and Contour Detection  . . . . . 73--83
               Kenneth F. Siler   A Stochastic Evaluation Model for
                                  Database Organization in Data Retrieval
                                  Systems  . . . . . . . . . . . . . . . . 84--95
                   Ronald Fagin   A Counterintuitive Example of Computer
                                  Paging . . . . . . . . . . . . . . . . . 96--97
                 Ehud Artzy and   
             James A. Hinds and   
                  Harry J. Saal   A Fast Division Technique for Constant
                                  Divisors . . . . . . . . . . . . . . . . 98--101
                Donald E. Knuth   Errata: ``Ancient Babylonian
                                  algorithms'' . . . . . . . . . . . . . . 

Communications of the ACM
Volume 19, Number 3, March, 1976

               Allen Newell and   
               Herbert A. Simon   Computer Science as Empirical Inquiry:
                                  Symbols and Search . . . . . . . . . . . 113--126
              Jair M. Babad and   
               Mario M. Modiano   Joining Policies in a Multipriority
                                  Multiclass Batch Computer System . . . . 127--136
           Frances E. Allen and   
                     John Cocke   A Program Data Flow Analysis Procedure   137--147
              Naftaly H. Minsky   Intentional Resolution of Privacy
                                  Protection in Database Systems . . . . . 148--159

Communications of the ACM
Volume 19, Number 4, April, 1976

                Oliver R. Smoot   Development of an international system
                                  for legal protection of computer
                                  programs . . . . . . . . . . . . . . . . 171--174
               Bennet P. Lientz   A Comparative Evaluation of Versions of
                                  BASIC  . . . . . . . . . . . . . . . . . 175--181
                     J. Raymond   LG: A Language for Analytic Geometry . . 182--187
                   Ronald Fagin   Corrigendum: ``A Counterintuitive
                                  Example of Computer Paging'' . . . . . . 187
                Shmuel Katz and   
                    Zohar Manna   Logical Analysis of Programs . . . . . . 188--206

Communications of the ACM
Volume 19, Number 5, May, 1976

             Dorothy E. Denning   A Lattice Model of Secure Information
                                  Flow . . . . . . . . . . . . . . . . . . 236--243
             Jonathan K. Millen   Security Kernel Validation in Practice   243--250
          Butler W. Lampson and   
              Howard E. Sturgis   Reflections on an Operating System
                                  Design . . . . . . . . . . . . . . . . . 251--265
          A. Nico Habermann and   
              Lawrence Flon and   
               Lee W. Cooprider   Modularization and Hierarchy in a Family
                                  of Operating Systems . . . . . . . . . . 266--272
                 John H. Howard   Proving Monitors . . . . . . . . . . . . 273--279
            Susan S. Owicki and   
                    David Gries   Verifying Properties of Parallel
                                  Programs: An Axiomatic Approach  . . . . 279--285
           A. Wayne Madison and   
                 Alan P. Batson   Characteristics of Program Localities    285--294
           Barton G. Prieve and   
                Robert S. Fabry   VMIN --- an Optimal Variable-Space Page
                                  Replacement Algorithm  . . . . . . . . . 295--297
              Wesley W. Chu and   
               Holger Opderbeck   Analysis of the PFF Replacement
                                  Algorithm via a Semi-Markov Model  . . . 298--304

Communications of the ACM
Volume 19, Number 6, June, 1976

           Orrin E. Taulbee and   
                Samuel D. Conte   Production and employment of Ph.D.'s in
                                  computer science . . . . . . . . . . . . 311--313
        Dennis G. Severance and   
               Ricardo A. Duhne   A Practitioner's Guide To Addressing
                                  Algorithms . . . . . . . . . . . . . . . 314--326
             Forest Baskett and   
                 Alan Jay Smith   Interference in Multiprocessor Computer
                                  Systems with Interleaved Memory  . . . . 327--334
             Gideon Frieder and   
                  Harry J. Saal   Process for the Determination of
                                  Addresses in Variable Length Addressing  335--338
                  David S. Wise   Referencing Lists by an Edge . . . . . . 338--342
          Helmut Schumacher and   
              Kenneth C. Sevcik   The Synthetic Approach to Decision Table
                                  Conversion . . . . . . . . . . . . . . . 343--351
               Douglas W. Clark   An Efficient List Moving Algorithm Using
                                  constant Workspace . . . . . . . . . . . 352--354
             Guy L. Steele, Jr.   Corrigendum: ``Multiprocessing
                                  Compactifying Garbage Collection'' . . . 354--354
                  Gary D. Knott   A Numbering System for Permutations of
                                  Combinations . . . . . . . . . . . . . . 355--356

Communications of the ACM
Volume 19, Number 7, July, 1976

            Samuel D. Conte and   
            Maurice H. Halstead   Technology of Computer Center
                                  Management: a Proposed Course for
                                  Graduate Professional Programs in
                                  Computer Science or in Information
                                  Systems  . . . . . . . . . . . . . . . . 369--370
               Robert M. Keller   Formal Verification of Parallel Programs 371--384
                  James C. King   Symbolic Execution and Program Testing   385--394
         Robert M. Metcalfe and   
                 David R. Boggs   Ethernet: Distributed Packet Switching
                                  for Local Computer Networks  . . . . . . 395--404
            Cheng-Wen Cheng and   
                    Jonas Rabin   Synthesis of Decision Rules  . . . . . . 404--406
              George S. Fishman   Sampling from the Gamma-distribution on
                                  a computer . . . . . . . . . . . . . . . 407--409
                      Kurt Maly   Compressed Tries . . . . . . . . . . . . 409--415
                  Warren Burton   A Buddy System Variation for Disk
                                  Storage Allocation . . . . . . . . . . . 416--417
               Gaston H. Gonnet   Heaps Applied to Event Driven Mechanisms 417--418

Communications of the ACM
Volume 19, Number 8, August, 1976

                John J. Donovan   Tools and Philosophy for Software
                                  Education  . . . . . . . . . . . . . . . 430--436
              Robert D. Tennent   The Denotational Semantics of
                                  Programming Languages  . . . . . . . . . 437--453
                 James H. Clark   Designing Surfaces in 3-D  . . . . . . . 454--460
        Michael A. Harrison and   
            Walter L. Ruzzo and   
              Jeffrey D. Ullman   Protection in Operating Systems  . . . . 461--471
           Daniel S. Hirschberg   An Insertion Technique for One-Sided
                                  Height-Balanced Trees  . . . . . . . . . 471--473

Communications of the ACM
Volume 19, Number 9, September, 1976

               Philip L. Wadler   Analysis of an Algorithm for Real Time
                                  Garbage Collection . . . . . . . . . . . 491--500
                    Chee K. Yap   New Upper Bounds for Selection . . . . . 501--508
                Michael C. Loui   Weighted Derivation Trees  . . . . . . . 509--513
              Kenneth G. Walter   Recursion Analysis for Compiler
                                  Optimization . . . . . . . . . . . . . . 514--516
            James R. Bitner and   
             Gideon Ehrlich and   
             Edward M. Reingold   Efficient Generation of the Binary
                                  Reflected Gray Code and Its Applications 517--521
           L. Peter Deutsch and   
               Daniel G. Bobrow   An Efficient, Incremental, Automatic
                                  Garbage Collector  . . . . . . . . . . . 522--526
                   Ben Wegbreit   Faster Retrieval from Context Trees  . . 526--529
              Wesley W. Chu and   
               Holger Opderbeck   Corrigendum: ``Analysis of the PFF
                                  replacement algorithm via a semi-Markov
                                  model''  . . . . . . . . . . . . . . . . 

Communications of the ACM
Volume 19, Number 10, 1976

                   Udo W. Pooch   Papers from SIGGRAPH 76 --- Introduction 541
             James F. Blinn and   
               Martin E. Newell   Texture and Reflection in Computer
                                  Generated Images . . . . . . . . . . . . 542--547
                 James H. Clark   Hierarchical Geometric Models for
                                  Visible Surface Algorithms . . . . . . . 547--554
                Joshua Z. Levin   A Parametric Algorithm for Drawing
                                  Pictures of Solid Objects Composed of
                                  Quadric Surfaces . . . . . . . . . . . . 555--563
                 N. Burtnyk and   
                        M. Wein   Interactive Skeleton Techniques for
                                  Enhancing Motion Dynamics in Key Frame
                                  Animation  . . . . . . . . . . . . . . . 564--569
                 James W. Frane   The BMD and BMDP Series of Statistical
                                  Computer Programs  . . . . . . . . . . . 570--576
              C. Duong-Kien and   
  Hans-Jürgen Hoffmann and   
                        D. Muth   An improvement to Martin's algorithm for
                                  computation of linear precedence
                                  functions  . . . . . . . . . . . . . . . 576--577
 Richard G. Montanelli, Jr. and   
               Sandra A. Mamrak   Status of Women and Minorities in
                                  Academic Computer Science  . . . . . . . 578--581

Communications of the ACM
Volume 19, Number 11, November, 1976

                Douglas T. Ross   Homilies for humble standards (computer
                                  applications)  . . . . . . . . . . . . . 595--600
           Henry F. Ledgard and   
                William C. Cave   Cobol Under Control  . . . . . . . . . . 601--608
           Thomas R. Wilcox and   
              Alan M. Davis and   
             Michael H. Tindall   Design and Implementation of a Table
                                  Driven, Interactive Diagnostic
                                  Programming System . . . . . . . . . . . 609--616
                    Frank Rubin   Experiments in Text File Compression . . 617--623
          Kapali P. Eswaran and   
                Jim N. Gray and   
           Raymond A. Lorie and   
              Irving L. Traiger   The notions of consistency and predicate
                                  locks in a database system . . . . . . . 624--633
                K. Maruyama and   
                    S. E. Smith   Optimal Reorganization of Distributed
                                  Space Disk Files . . . . . . . . . . . . 634--642
              Richard G. Hamlet   High-Level Binding with Low-Level
                                  Linkers  . . . . . . . . . . . . . . . . 642--644

Communications of the ACM
Volume 19, Number 12, December, 1976

                 Jean E. Sammet   Roster of Programming Languages for
                                  1974--75 . . . . . . . . . . . . . . . . 655--669
                 Bruce W. Arden   The Computer Science and Engineering
                                  Research Study (COSERS)  . . . . . . . . 670--673
      Jay F. Nunamaker, Jr. and   
     Benn R. Konsynski, Jr. and   
                  Thomas Ho and   
                    Carl Singer   Computer-Aided Analysis and Design of
                                  Information Systems  . . . . . . . . . . 674--687
            George Stockman and   
            Laveen N. Kanal and   
                     M. C. Kyle   Structural Pattern Recognition of
                                  Carotid Pulse Waves Using a General
                                  Waveform Parsing System  . . . . . . . . 688--695


Communications of the ACM
Volume 20, Number 1, January, 1977

               Allen van Gelder   Structured programming in COBOL: an
                                  approach for application programmers . . 2--12
         Richard H. Austing and   
            Bruce H. Barnes and   
                Gerald L. Engel   A Survey of the Literature in Computer
                                  Science Education Since Curriculum '68   13--21
                  Jair M. Babad   A Record and File Partitioning Model . . 22--30
          Albert L. Zobrist and   
      Frederick R. Carlson, Jr.   Detection of Combined Occurrences  . . . 31--35
             Alan P. Batson and   
             Robert E. Brundage   Segment Sizes and Lifetimes in Algol 60
                                  Programs . . . . . . . . . . . . . . . . 36--44
                    David Gries   On Believing Programs to be Correct  . . 49--50

Communications of the ACM
Volume 20, Number 2, February, 1977

               Mervin E. Muller   An Approach to Multidimensional Data
                                  Array Processing by Computer . . . . . . 63--77
           Douglas W. Clark and   
               C. Cordell Green   An Empirical Study of List Structure in
                                  Lisp . . . . . . . . . . . . . . . . . . 78--87
        Franco P. Preparata and   
                     S. J. Hong   Convex Hulls of Finite Sets of Points in
                                  Two and Three Dimensions . . . . . . . . 87--93
          Malcolm C. Easton and   
                  B. T. Bennett   Transient-Free Working-Set Statistics    93--99
                 Jack Bresenham   A Linear Algorithm for Incremental
                                  Digital Display of Circular Arcs . . . . 100--106
        Thoddi C. T. Kotiah and   
             David I. Steinberg   Occurrences of Cycling and Other
                                  Phenomena Arising in a Class of Linear
                                  Programming Models . . . . . . . . . . . 107--112
                  Gary D. Knott   A Numbering System for Binary Trees  . . 113--115

Communications of the ACM
Volume 20, Number 3, March, 1977

                 Philip Clapson   Improving the Access Time for Random
                                  Access Files . . . . . . . . . . . . . . 127--135
              Clement T. Yu and   
                  Gerard Salton   Effective Information Retrieval Using
                                  Term Accuracy  . . . . . . . . . . . . . 135--142
              Åmund Lunde   Empirical Evaluation of Some Features of
                                  Instruction Set Processor Architectures  143--153
                R. M. Brown and   
            James C. Browne and   
                 K. Mani Chandy   Memory Management and Response Time  . . 153--165
                  Warren Burton   Representation of Many-Sided Polygons
                                  and Polygonal Lines for Rapid Processing 166--171
          Harry B. Hunt III and   
        Thomas G. Szymanski and   
              Jeffrey D. Ullman   Operations on Sparse Relations . . . . . 171--176
               Richard L. Nolan   Effects of Chargeout on User/Manager
                                  Attitudes  . . . . . . . . . . . . . . . 177--185
            Israel Borovits and   
                Phillip Ein-Dor   Cost/utilization: A measure of system
                                  performance  . . . . . . . . . . . . . . 185--191
                    Carter Bays   A Comparison of Next-fit, First-fit, and
                                  Best-fit . . . . . . . . . . . . . . . . 191--192
               Eberhard Bertsch   The Storage Requirement in Precedence
                                  Parsing  . . . . . . . . . . . . . . . . 192--194

Communications of the ACM
Volume 20, Number 4, April, 1977

       James H. Morris, Jr. and   
                   Ben Wegbreit   Subgoal Induction  . . . . . . . . . . . 209--222
         Steven L. Tanimoto and   
            Theodosios Pavlidis   Editing of Picture Segmentations Using
                                  Local Analysis of Graphs . . . . . . . . 223--229
            Nicholas V. Findler   Studies in Machine Cognition Using the
                                  Game of Poker  . . . . . . . . . . . . . 230--245
                K. Maruyama and   
                    S. E. Smith   Analysis of Design Alternatives for
                                  Virtual Memory Indexes . . . . . . . . . 245--254
        Henry C. Lucas, Jr. and   
                Jimmy A. Sutton   The Stage Hypothesis and the S-Curve:
                                  Some Contradictory Evidence  . . . . . . 254--259
                    S. Bing Yao   Approximating the Number of Accesses in
                                  Database Organizations . . . . . . . . . 260--261
          Clifford R. Hollander   Remark on Uniform Insertion in
                                  Structured Data Structures . . . . . . . 261--262
             S. K. Bandypadhyay   Comment on Weighted Increment Linear
                                  Search for Scatter Tables  . . . . . . . 262--263
             C. D. Thompson and   
                     H. T. Kung   Sorting on a Mesh-Connected Parallel
                                  Computer . . . . . . . . . . . . . . . . 263--271
          Lawrence Robinson and   
                 Karl N. Levitt   Proof Techniques for Hierarchically
                                  Structured Programs  . . . . . . . . . . 271--283

Communications of the ACM
Volume 20, Number 5, May, 1977

            Richard C. Holt and   
           David B. Wortman and   
          David T. Bardnard and   
                 James R. Cordy   SP/k: A System for Teaching Computer
                                  Programming  . . . . . . . . . . . . . . 301--309
              George S. Fishman   Achieving Specific Accuracy in
                                  Simulation Output Analysis . . . . . . . 310--315
           Howard L. Morgan and   
                   K. Dan Levin   Optimal Program and Data Locations in
                                  Computer Networks  . . . . . . . . . . . 315--322
             Jean-Loup Baer and   
                      B. Schwab   A Comparison of Tree-Balancing
                                  Algorithms . . . . . . . . . . . . . . . 322--330
           Neil J. Stillman and   
                 P. Bruce Berra   A Comparison of Hardware and Software
                                  Associative Memories in the Context of
                                  Computer Graphics  . . . . . . . . . . . 331--339
              Marvin B. Shapiro   Choice of Reference Points in Best-Match
                                  File Searching . . . . . . . . . . . . . 339--343
              Michael Z. Hanani   An Optimal Evaluation of Boolean
                                  Expressions in an Online Query System    344--347
                      Y. Milman   An Approach to Optimal Design of Storage
                                  Parameters in Databases  . . . . . . . . 347--350
              James W. Hunt and   
            Thomas G. Szymanski   A Fast Algorithm for Computing Longest
                                  Common Subsequences  . . . . . . . . . . 350--353

Communications of the ACM
Volume 20, Number 6, June, 1977

           Orrin E. Taulbee and   
                Samuel D. Conte   Production and Employment of Ph.D.'s in
                                  Computer Science --- 1976  . . . . . . . 370--372
            Ben Shneiderman and   
           Richard E. Mayer and   
                  Don McKay and   
                   Peter Heller   Experimental Investigations of the
                                  Utility of Detailed Flowcharts in
                                  Programming  . . . . . . . . . . . . . . 373--381
           Henry F. Ledgard and   
               Robert W. Taylor   Two Views of Data Abstraction ---
                                  Introduction to the Special Section  . . 382--384
      Moshé M. Zloof and   
               S. Peter de Jong   The System for Business Automation
                                  (SBA): Programming Language  . . . . . . 385--396
                 John V. Guttag   Abstract Data Types and the Development
                                  of Data Structures . . . . . . . . . . . 396--404
           John Miles Smith and   
              Diane C. P. Smith   Database Abstractions: Aggregation . . . 405--413
                David Gries and   
               Narain H. Gehani   Some Ideas on Data Types in High-Level
                                  Languages  . . . . . . . . . . . . . . . 414--420
          James L. Peterson and   
             Theodore A. Norman   Buddy Systems  . . . . . . . . . . . . . 421--431
                   J. M. Robson   A Bounded Storage Algorithm for Copying
                                  Cyclic Structures  . . . . . . . . . . . 431--433
                Richard S. Bird   Notes on Recursion Elimination . . . . . 434--439
           Henry S. Warren, Jr.   Functions Realizable with Word-Parallel
                                  Logical and Two's-Complement Addition
                                  Instructions . . . . . . . . . . . . . . 439--441

Communications of the ACM
Volume 20, Number 7, July, 1977

               Sandra A. Mamrak   Dynamic Response Time Prediction for
                                  Computer Networks  . . . . . . . . . . . 461--468
         Manfred Ruschitzka and   
                Robert S. Fabry   A Unifying Approach to Scheduling  . . . 469--477
          William D. Tajibnapis   A Correctness Proof of a Topology
                                  Information Maintenance Protocol for a
                                  Distributed Computer Network . . . . . . 477--485
             Paul G. Heckel and   
              Butler W. Lampson   A Terminal-Oriented Communication System 486--494
    Ben Ross Schneider, Jr. and   
                  Reid M. Watts   SITAR: an Interactive Text Processing
                                  System for Small Computers . . . . . . . 495--499
             Joep L. W. Kessels   Alternative to Event Queues for
                                  Synchronization in Monitors  . . . . . . 500--503
         Dorothy E. Denning and   
               Peter J. Denning   Certification of Programs for Secure
                                  Information Flow . . . . . . . . . . . . 504--513
               Jeffrey M. Barth   Shifting Garbage Collection Overhead to
                                  Compile Time . . . . . . . . . . . . . . 513--518
         Edward A. Ashcroft and   
               William W. Wadge   Lucid, a Nonprocedural Language with
                                  Iteration  . . . . . . . . . . . . . . . 519--526
              J. Nevil Brownlee   An Algol-based implementation of SNOBOL
                                  4 patterns . . . . . . . . . . . . . . . 527--529

Communications of the ACM
Volume 20, Number 8, 1977

               James J. Horning   Selected Papers from the ACM Conference
                                  on Language Design for Reliable Software
                                  --- Introduction . . . . . . . . . . . . 539
         Charles M. Geschke and   
       James H. Morris, Jr. and   
         Edwin H. Satterthwaite   Early Experience with Mesa . . . . . . . 540--553
                  Mary Shaw and   
            William A. Wulf and   
                Ralph L. London   Abstraction and Verification in Alphard:
                                  Defining and Specifying Iteration and
                                  Generators . . . . . . . . . . . . . . . 553--564
             Barbara Liskov and   
                Alan Snyder and   
        Russell R. Atkinson and   
                Craig Schaffert   Abstraction Mechanisms in CLU  . . . . . 564--576
                  Niklaus Wirth   Toward a Discipline of Real-Time
                                  Programming  . . . . . . . . . . . . . . 577--583
                 John D. Gannon   An Experimental Evaluation of Data Type
                                  Conventions  . . . . . . . . . . . . . . 584--595
          William R. Franta and   
                      Kurt Maly   An Efficient Data Structure for the
                                  Simulation Event Set . . . . . . . . . . 596--602
           Orrin E. Taulbee and   
                Samuel D. Conte   Corrigendum: Production and Employment
                                  of Ph.D.'s in Computer Science --- 1976  602
               Eugene L. Lawler   Comment on computing the $k$ shortest
                                  paths in a graph . . . . . . . . . . . . 603--604
                 Nissim Francez   Another advantage of keyword notation
                                  for parameter communication with
                                  subprograms  . . . . . . . . . . . . . . 604--605

Communications of the ACM
Volume 20, Number 9, September, 1977

               Michael O. Rabin   Complexity of Computations . . . . . . . 625--633
                  Dana S. Scott   Logic and Programming Languages  . . . . 634--641
             Richard H. Austing   The GRE Advanced Test in Computer
                                  Science  . . . . . . . . . . . . . . . . 642--645
            Robert W. Scheifler   An Analysis of Inline Substitution for a
                                  Structured Programming Language  . . . . 647--654
               David K. Gifford   Hardware Estimation of a Process'
                                  Primary Memory Requirements  . . . . . . 655--663
               Harry G. Mairson   Some New Upper Bounds on the Generation
                                  of Prime Numbers . . . . . . . . . . . . 664--669
            Edward M. McCreight   Pagination of B*-Trees with
                                  Variable-Length Records  . . . . . . . . 670--674

Communications of the ACM
Volume 20, Number 10, October, 1977

                   H. Fuchs and   
               Zvi M. Kedem and   
              Samuel P. Uselton   Optimal Surface Reconstruction from
                                  Planar Contours  . . . . . . . . . . . . 693--702
          Sheng-Chuan C. Wu and   
               John F. Abel and   
            Donald P. Greenberg   An Interactive Computer Graphics
                                  Approach to Surface Representation . . . 703--712
                 Barry K. Rosen   High-Level Data Flow Analysis  . . . . . 712--724
           Carlo Montangero and   
            Giuliano Pacini and   
                  Franco Turini   Two-Level Control Structure for
                                  Nondeterministic Programming . . . . . . 725--730
                Wilf R. LaLonde   Regular Right Part Grammars and Their
                                  Parsers  . . . . . . . . . . . . . . . . 731--741
           Raymond R. Devillers   Game Interpretation of the Deadlock
                                  Avoidance Problem  . . . . . . . . . . . 741--745
                   Evan L. Ivie   Programmer's Workbench --- a Machine for
                                  Software Development . . . . . . . . . . 746--753
                 Alan Jay Smith   Multiprocessor Memory Organization and
                                  Memory Interference  . . . . . . . . . . 754--761
    Ben Ross Schneider, Jr. and   
                  Reid M. Watts   Corrigendum: SITAR: An Interactive Text
                                  Processing System for Small Computers    761
            Robert S. Boyer and   
              J. Strother Moore   A Fast String Searching Algorithm  . . . 762--772

Communications of the ACM
Volume 20, Number 11, November, 1977

                 John A. N. Lee   Considerations for future programming
                                  language standards activities  . . . . . 788--794
             Rollins Turner and   
            William D. Strecker   Use of the LRU Stack Depth Distribution
                                  for Simulation of Paging Behavior  . . . 795--798
               Franklin C. Crow   The Aliasing Problem in
                                  Computer-Generated Shaded Images . . . . 799--805
                 Leslie Lamport   Concurrent Reading and Writing . . . . . 806--811
                  John E. Shore   Anomalous Behavior of the Fifty-Percent
                                  Rule in Dynamic Memory Allocation  . . . 812--820
             G. C. Stockman and   
              Ashok K. Agrawala   Equivalence of Hough curve detection to
                                  template matching  . . . . . . . . . . . 820--822
                  Niklaus Wirth   What can we do about the unnecessary
                                  diversity of notation for syntactic
                                  definitions? . . . . . . . . . . . . . . 822--823
                      M. K. Roy   A note on reflection-free permutation
                                  enumeration  . . . . . . . . . . . . . . 823--823
                Mohit Kumar Roy   A Note On Refection-Free Permutation
                                  Enumeration  . . . . . . . . . . . . . . 823
                Zohar Manna and   
                     Adi Shamir   The Optimal Approach to Recursive
                                  Programs . . . . . . . . . . . . . . . . 824--831
             Michael Hammer and   
              W. Gerry Howe and   
         Vincent J. Kruskal and   
               Irving Wladawsky   Very High Level Programming Language for
                                  Data Processing Applications . . . . . . 832--840
                Renzo Sprugnoli   Perfect Hashing Functions: A Single
                                  Probe Retrieving Method for Static Sets  841--850
                 John Cocke and   
                    Ken Kennedy   An Algorithm for Reduction of Operator
                                  Strength . . . . . . . . . . . . . . . . 850--856
                Richard S. Bird   Improving Programs by the Introduction
                                  of Recursion . . . . . . . . . . . . . . 856--863
              Norman R. Nielsen   Dynamic Memory Allocation in Computer
                                  Simulation . . . . . . . . . . . . . . . 864--873
         Michael W. Blasgen and   
           Richard G. Casey and   
              Kapali P. Eswaran   An Encoding Method for Multifield
                                  Sorting and Indexing . . . . . . . . . . 874--878
              Enrique Grapa and   
              Geneva G. Belford   Some Theorems to Aid in Solving the File
                                  Allocation Problem . . . . . . . . . . . 878--882

Communications of the ACM
Volume 20, Number 12, December, 1977

                A. A. Lopez and   
             Robert Raymond and   
                 Robert Tardiff   A survey of computer science offerings
                                  in small liberal arts colleges . . . . . 902--906
             Joep L. W. Kessels   A Conceptual Framework for a
                                  Nonprocedural Programming Language . . . 906--913
             J. Lawrence Carter   A Case Study of a New Code Generation
                                  Technique for Compilers  . . . . . . . . 914--920
                    David Gries   An Exercise in Proving Parallel Programs
                                  Correct  . . . . . . . . . . . . . . . . 921--930
                    Irene Greif   A Language for Formal Problem
                                  Specification  . . . . . . . . . . . . . 931--935
         Marshall D. Abrams and   
                 Siegfried Treu   A Methodology for Interactive Computer
                                  Service Measurement  . . . . . . . . . . 936--944
          James N. Danziger and   
              William H. Dutton   Computers as an innovation in American
                                  local governments  . . . . . . . . . . . 945--956


Communications of the ACM
Volume 21, Number 1, 1978

                Gordon Bell and   
           Samuel H. Fuller and   
            Daniel P. Siewiorek   Forword to the Special Issue on Computer
                                  Architecture . . . . . . . . . . . . . . 3
             Simon H. Lavington   The Manchester Mark I and Atlas: a
                                  historical perspective . . . . . . . . . 4--12
               R. N. Ibbett and   
                    P. C. Capon   The Development of the MU5 Computer
                                  System . . . . . . . . . . . . . . . . . 13--24
            B. R. Borgerson and   
               M. L. Hanson and   
                  P. A. Hartley   Evolution of the Sperry Univac 1100
                                  Series: a History, Analysis, and
                                  Projection . . . . . . . . . . . . . . . 25--43
             C. Gordon Bell and   
                   A. Kotok and   
         Thomas N. Hastings and   
                        R. Hill   The Evolution of the DECsystem 10  . . . 44--63
             Richard M. Russell   The Cray-1 Computer System . . . . . . . 63--72
            Richard P. Case and   
                  Andris Padegs   Architecture of the IBM System/370 . . . 73--96

Communications of the ACM
Volume 21, Number 2, February, 1978

           Sandra A. Mamrak and   
     Richard G. Montanelli, Jr.   Computer Science Faculties: The Current
                                  Status of Minorities and Woman . . . . . 115--119
           Ronald L. Rivest and   
                 Adi Shamir and   
             Leonard M. Adleman   A Method for Obtaining Digital
                                  Signatures and Public-Key Cryptosystems  120--126
          Marc A. Auslander and   
              H. Raymond Strong   Systematic Recursion Removal . . . . . . 127--134
            Lawrence T. Kou and   
        Larry J. Stockmeyer and   
                     C. K. Wong   Covering Edges by Cliques with Regard to
                                  Keyword Conflicts and Intersection
                                  Graphs . . . . . . . . . . . . . . . . . 135--139
                Gerald Held and   
            Michael Stonebraker   B-trees Re-examined  . . . . . . . . . . 139--143
             William J. Stewart   A Comparison of Numerical Techniques in
                                  Markov Modeling  . . . . . . . . . . . . 144--152
            Gabor T. Herman and   
                Arnold Lent and   
                  Peter H. Lutz   Relaxation Methods for Image
                                  Reconstruction . . . . . . . . . . . . . 152--158
                Zohar Manna and   
           Richard J. Waldinger   Is `Sometime' Sometimes Better Than
                                  `Always'? (Intermittent Assertions in
                                  Proving Program Correctness) . . . . . . 159--172
         Bruce J. Schachter and   
               Azriel Rosenfeld   Some New Methods of Detecting Step Edges
                                  in Digital Pictures  . . . . . . . . . . 172--176

Communications of the ACM
Volume 21, Number 3, March, 1978

            Henry C. Lucas, Jr.   Use of an Interactive Information
                                  Storage and Retrieval System in Medical
                                  Research . . . . . . . . . . . . . . . . 197--205
          William H. Dutton and   
             Kenneth L. Kraemer   Management Utilization of Computers in
                                  American Local Governments . . . . . . . 206--218
             Ronald E. Anderson   Value Orientation of Computer Science
                                  Students . . . . . . . . . . . . . . . . 219--225
                S. Rao Kosaraju   Insertions and Deletions in One-Sided
                                  Height-Balanced Trees  . . . . . . . . . 226--227
         Richard A. DeMillo and   
       Stanley C. Eisenstat and   
              Richard J. Lipton   Preserving Average Proximity in Arrays   228--231
           Mark A. Franklin and   
            G. Scott Graham and   
                    R. K. Gupta   Anomalies with Variable Partition Paging
                                  Algorithms . . . . . . . . . . . . . . . 232--236
            Andrew S. Tanenbaum   Implications of Structured Programming
                                  for Machine Architecture . . . . . . . . 237--246
               Michael O. Rabin   Corrigendum: ``Complexity of
                                  computations'' . . . . . . . . . . . . . 

Communications of the ACM
Volume 21, Number 4, April, 1978

                W. H. Payne and   
                 K. L. McMillen   Orderly Enumeration of Nonsingular
                                  Binary Matrices Applied to Text
                                  Encryption . . . . . . . . . . . . . . . 259--263
                    Paul Heckel   A Technique for Isolating Differences
                                  Between Files  . . . . . . . . . . . . . 264--268
                        Art Lew   Optimal Conversion of Extended-Entry
                                  Decision Tables with General Cost
                                  Criteria . . . . . . . . . . . . . . . . 269--279
            Henry G. Baker, Jr.   List Processing in Real Time on a Serial
                                  Computer . . . . . . . . . . . . . . . . 280--294
                Ralph C. Merkle   Secure Communications Over Insecure
                                  Channels . . . . . . . . . . . . . . . . 294--299
            Thomas G. Szymanski   Assembling Code for machines with
                                  Span-Dependent Instructions  . . . . . . 300--308
                 Jean Vuillemin   A Data Structure for Manipulating
                                  Priority Queues  . . . . . . . . . . . . 309--315
                Shimon Even and   
                  Michael Rodeh   Economical Encoding of Commas Between
                                  Strings  . . . . . . . . . . . . . . . . 315--317
                 R. C. H. Cheng   Generating beta variates with
                                  nonintegral shape parameters . . . . . . 317--322

Communications of the ACM
Volume 21, Number 5, May, 1978

               Douglas W. Clark   A Fast Algorithm for Copying List
                                  Structures . . . . . . . . . . . . . . . 351--357
             Anita K. Jones and   
              Barbara H. Liskov   A Language Extension for Expressing
                                  Constraints on Data Access . . . . . . . 358--367
              Matthew M. Geller   Test Data as an Aid in Proving Program
                                  Correctness  . . . . . . . . . . . . . . 368--375
                   James R. Low   Automatic Data Structure Selection: an
                                  Example and Overview . . . . . . . . . . 376--385
               Michael Karr and   
           David B. Loveman III   Incorporation of Units into Programming
                                  Languages  . . . . . . . . . . . . . . . 385--391
            David R. Hanson and   
              Ralph E. Griswold   The SL5 Procedure Mechanism  . . . . . . 392--400
       Frederick Hayes-Roth and   
              John P. McDermott   An Interference Matching Technique for
                                  Inducing Abstractions  . . . . . . . . . 401--410
             J. M. Fleisher and   
                    R. R. Meyer   New Sufficient Optimality Conditions for
                                  Integer Programming and Their
                                  Application  . . . . . . . . . . . . . . 411--418
           Pandu R. Tadikamalla   Computer Generation of Gamma Random
                                  Variables  . . . . . . . . . . . . . . . 419--422
               Richard L. Sites   Optimal Shift Strategy for a
                                  Block-Transfer CCD Memory  . . . . . . . 423--425

Communications of the ACM
Volume 21, Number 6, June, 1978

           Stuart H. Zweben and   
                 M. A. McDonald   An Optimal Method for Deletion in
                                  One-Sided Height-Balanced Trees  . . . . 441--445
          James R. Driscoll and   
                 Y. Edmund Lien   A Selective Traversal Algorithm for
                                  Binary Search Trees  . . . . . . . . . . 445--447
              Jacques Cohen and   
                 Martin S. Roth   Analyses of Deterministic Parsing
                                  Algorithms . . . . . . . . . . . . . . . 448--458
         M. Dennis Mickunas and   
                  John A. Modry   Automatic Error Recovery for LR Parsers  459--465
           Bennet P. Lientz and   
          E. Burton Swanson and   
                 G. E. Tompkins   Characteristics of Application Software
                                  Maintenance  . . . . . . . . . . . . . . 466--471
                  Earl Chrysler   Some Basic Determinants of Computer
                                  Programming Productivity . . . . . . . . 472--483
                      Rob Kling   Automated Welfare Client-Tracking and
                                  Service Integration: the Political
                                  Economy of Computing . . . . . . . . . . 484--493
               Erol Gelenbe and   
                  D. Derochette   Performance of Rollback Recovery Systems
                                  Under Intermittent Failures  . . . . . . 493--499
                 Toby J. Teorey   General Equations for Idealized CPU-I/O
                                  Overlap Configurations . . . . . . . . . 500--507

Communications of the ACM
Volume 21, Number 7, July, 1978

                 David L. Waltz   An English Language Query Answering
                                  System for a Large Relational Data Base  526--539
         Michael L. Fredman and   
                 Bruce W. Weide   On the complexity of computing the
                                  measure of $\bigcup[a_i,b_i]$  . . . . . 540--544
                Francis Y. Chin   An ${O}(n)$ Algorithm for Determining a
                                  Near-Optimal Computation Order of Matrix
                                  Chain Products . . . . . . . . . . . . . 544--549
              Yehoshua Perl and   
                  Alon Itai and   
                      Haim Avni   Interpolation Search --- A Log Log N
                                  Search . . . . . . . . . . . . . . . . . 550--553
       Constantine Halatsis and   
             George Philokyprou   Pseudochaining in Hash Tables  . . . . . 554--557
                 Leslie Lamport   Time, Clocks, and the Ordering of Events
                                  in a Distributed System  . . . . . . . . 558--565
        Henry Givens Baker, Jr.   Shallow Binding in Lisp 1.5  . . . . . . 565--569
                    Hanan Samet   Proving the Correctness of Heuristically
                                  Optimized Code . . . . . . . . . . . . . 570--582
              Robert E. Shostak   An Algorithm for Reasoning About
                                  Equality . . . . . . . . . . . . . . . . 583--585
            Rahul Chattergy and   
                   Udo W. Pooch   Analysis of the Availability of Computer
                                  Systems Using Computer-Aided Algebra . . 586--591
                Lawrence Snyder   B-Trees Re-examined  . . . . . . . . . . 594--594
                Lawrence Snyder   On B-trees Re-examined . . . . . . . . . 594

Communications of the ACM
Volume 21, Number 8, August, 1978

                    John Backus   Can Programming Be Liberated From the
                                  von Neumann Style? A Functional Style
                                  and its Algebra of Programs  . . . . . . 613--641
                      Rob Kling   Value conflicts and social choice in
                                  electronic funds transfer system
                                  developments . . . . . . . . . . . . . . 642--657
           Daniel S. Hirschberg   Fast Parallel Sorting Algorithms . . . . 657--661
             F. Lockwood Morris   A Time- and Space-Efficient Garbage
                                  Compaction Algorithm . . . . . . . . . . 662--665
                 C. A. R. Hoare   Communicating Sequential Processes . . . 666--677
           Richard S. Brice and   
                James C. Browne   Feedback Coupled Resource Allocation
                                  Policies in the
                                  Multiprogramming-Multiprocessor Computer
                                  System . . . . . . . . . . . . . . . . . 678--686
          Peter Scheuermann and   
              C. Robert Carlson   Self-Assessment Procedure V: a
                                  self-assessment procedure dealing with
                                  database systems . . . . . . . . . . . . 687--693

Communications of the ACM
Volume 21, Number 9, September, 1978

               R. A. Harris and   
                     J. D. Zund   An algorithm using symbolic techniques
                                  for the Bel-Petrov classification of
                                  gravitational fields . . . . . . . . . . 715--717
           Herbert D. Schwetman   Hybrid Simulation Models of Computer
                                  Systems  . . . . . . . . . . . . . . . . 718--723
               Jeffrey M. Barth   A Practical Interprocedural Data Flow
                                  Analysis Algorithm . . . . . . . . . . . 724--736
            Gerald J. Popek and   
                David A. Farber   Model for Verification of Data Security
                                  in Operating Systems . . . . . . . . . . 737--749
           Peter J. Denning and   
                Donald R. Slutz   Generalized Working Sets for Segment
                                  Reference Strings  . . . . . . . . . . . 750--759
              Glenford J. Myers   A Controlled Experiment in Program
                                  Testing and Code
                                  Walkthroughs/Inspections . . . . . . . . 760--768
             Thomas Ottmann and   
            Hans-Werner Six and   
                    Derick Wood   Right Brother Trees  . . . . . . . . . . 769--776
                Ernst G. Ulrich   Event Manipulation for Discrete
                                  Simulations Requiring Large Numbers of
                                  Events . . . . . . . . . . . . . . . . . 777--785
                      Kurt Maly   A Note on Virtual Memory Indexes . . . . 786--787
                Stephen A. Ward   Real Time Plotting of Approximate
                                  Contour Maps . . . . . . . . . . . . . . 788--790
             Aaron M. Tenenbaum   Simulations of Dynamic Sequential Search
                                  Algorithms . . . . . . . . . . . . . . . 790--791

Communications of the ACM
Volume 21, Number 10, October, 1978

                  Walt Brainerd   Fortran 77 . . . . . . . . . . . . . . . 806--820
          Donald F. Towsley and   
             K. Mani Chandy and   
                James C. Browne   Models for Parallel Processing Within
                                  Programs: Application to CPU:I/O and
                                  I/O:I/O Overlap  . . . . . . . . . . . . 821--831
                Ben Shneiderman   Jump Searching: A Fast Sequential Search
                                  Technique  . . . . . . . . . . . . . . . 831--834
              Shi-Kuo Chang and   
                   Yin-Wah Wong   Optimal Histogram Matching by Monotone
                                  Gray Level Transformation  . . . . . . . 835--840
                  Robert Morris   Counting Large Numbers of Events in
                                  Small Registers  . . . . . . . . . . . . 840--842
              Colin L. McMaster   An Analysis of Algorithms for the Dutch
                                  National Flag Problem  . . . . . . . . . 842--846
               Robert Sedgewick   Implementing Quicksort Programs  . . . . 847--857
                    Gordon Lyon   Packed Scatter Tables  . . . . . . . . . 857--865
          Malcolm C. Easton and   
                   Ronald Fagin   Cold-Start Vs. Warm-Start Miss Ratios    866--872
          William R. Franta and   
                      Kurt Maly   A comparison of heaps and the TL
                                  structure for the simulation event set   873--875

Communications of the ACM
Volume 21, Number 11, November, 1978

                Norman R. Lyons   Systems Design Education: A Gaming
                                  Approach . . . . . . . . . . . . . . . . 889--895
                  J. W. Wendorf   A Simply Extended and Modified Batch
                                  Environment Graphical System (Sembegs)   897--904
                   B. Kumar and   
             Edward S. Davidson   Performance Evaluation of Highly
                                  Concurrent Computers by Deterministic
                                  Simulation . . . . . . . . . . . . . . . 904--913
        Berthold K. P. Horn and   
               Brett L. Bachman   Using Synthetic Images to Register Real
                                  Images with Surface Models . . . . . . . 914--924
           Pandu R. Tadikamalla   Computer Generation of Gamma Random
                                  Variables --- II . . . . . . . . . . . . 925--928
                G. David Ripley   A Simple Recovery-Only Procedure For
                                  Simple Precedence Parsers  . . . . . . . 928--930
         Daniel P. Friedman and   
                  David S. Wise   A Note on Conditional Expressions  . . . 931--933
              Per Brinch Hansen   Distributed Processes: A Concurrent
                                  Programming Concept  . . . . . . . . . . 934--941
            Fabrizio Luccio and   
                    Linda Pagli   Power Trees  . . . . . . . . . . . . . . 941--947
                    B. A. Sheil   Median Split Trees: A Fast Lookup
                                  Technique for Frequently Occurring Keys  947--958
                 C. A. R. Hoare   Corrigendum: ``Communicating Sequential
                                  Processes''  . . . . . . . . . . . . . . 958--958
              Eugene C. Freuder   Synthesizing Constraint Expressions  . . 958--966
         Edsger W. Dijkstra and   
             Leslie Lamport and   
            Alain J. Martin and   
             C. S. Scholten and   
              E. F. M. Steffens   On-the-Fly Garbage Collection: An
                                  Exercise in Cooperation  . . . . . . . . 966--975

Communications of the ACM
Volume 21, Number 12, December, 1978

           Roger M. Needham and   
           Michael D. Schroeder   Using Encryption for Authentication in
                                  Large Networks of Computers  . . . . . . 993--999
                David Gries and   
                  Jayadev Misra   A Linear Sieve Algorithm for Finding
                                  Prime Numbers  . . . . . . . . . . . . . 999--1003
          James L. Peterson and   
            James R. Bitner and   
                 John H. Howard   The Selection of Optimal Tab Settings    1004--1007
          James C. Wetherbe and   
                 V. Thomas Dock   Strategic Planning Methodology for the
                                  Computing Effort in Higher Education: an
                                  Empirical Evaluation . . . . . . . . . . 1008--1015
                M. Ibramsha and   
                   V. Rajaraman   Detection of Logical Errors in Decision
                                  Table Programs . . . . . . . . . . . . . 1016--1025
           Alberto Martelli and   
                  Ugo Montanari   Optimizing Decision Trees Through
                                  Heuristically Guided Search  . . . . . . 1025--1039
             Yogen K. Dalal and   
             Robert M. Metcalfe   Reverse Path Forwarding of Broadcast
                                  Packets  . . . . . . . . . . . . . . . . 1040--1048
             John V. Guttag and   
             Ellis Horowitz and   
                David R. Musser   Abstract Data Types and Software
                                  Validation . . . . . . . . . . . . . . . 1048--1064
             Jay M. Spitzen and   
             Karl N. Levitt and   
              Lawrence Robinson   An Example of Hierarchical Design and
                                  Proof  . . . . . . . . . . . . . . . . . 1064--1075
                    David Gries   Corrigendum: ``An exercise in proving
                                  parallel programs correct''  . . . . . . 


Communications of the ACM
Volume 22, Number 1, January, 1979

                  John W. Boyse   Interference Detection Among Solids and
                                  Surfaces . . . . . . . . . . . . . . . . 3--9
                 Kent W. Colton   The impact and use of computer
                                  technology by the police . . . . . . . . 10--20
     Gian Carlo Bongiovanni and   
                Fabrizio Luccio   Permutation of Data Blocks in a Bubble
                                  Memory . . . . . . . . . . . . . . . . . 21--25
           Charles H. Sauer and   
                 K. Mani Chandy   The Impact of Distributions and
                                  Disciplines on Multiple Processor
                                  Systems  . . . . . . . . . . . . . . . . 25--34
Jean-Pierre P. Banâtre and   
       Jean-Paul P. Routeau and   
                    L. Trilling   An Event-Driven Compiling Technique  . . 34--42
               Jacques J. Arsac   Syntactic Source to Source Transforms
                                  and Program Manipulation . . . . . . . . 43--54

Communications of the ACM
Volume 22, Number 2, February, 1979

           Orrin E. Taulbee and   
                Samuel D. Conte   Production and employment of Ph.D.s in
                                  computer science --- 1977 and 1978 . . . 75--76
             Richard E. Fairley   Employment characteristics of doctoral
                                  level computer scientists  . . . . . . . 77--78
                 W. E. Gull and   
             Michael A. Jenkins   Recursive data structures in APL . . . . 79--96
            É. Morel and   
                    C. Renvoise   Global Optimization by Suppression of
                                  Partial Redundancies . . . . . . . . . . 96--103
             M. R. Anderson and   
                 M. G. Anderson   Comments on Perfect Hashing Functions: A
                                  Single Probe Retrieving Method for
                                  Static Sets  . . . . . . . . . . . . . . 104--105
          David R. Cheriton and   
         Michael A. Malcolm and   
          Lawrence S. Melen and   
                  Gary R. Sager   Thoth, a Portable Real-Time Operating
                                  System . . . . . . . . . . . . . . . . . 105--115
              David P. Reed and   
            Rajendra K. Kanodia   Synchronization with Eventcounts and
                                  Sequencers . . . . . . . . . . . . . . . 115--123
             Haim Mendelson and   
          Joseph S. Pliskin and   
                   Uri Yechiali   Optimal Storage Allocation for Serial
                                  Files  . . . . . . . . . . . . . . . . . 124--130

Communications of the ACM
Volume 22, Number 3, March, 1979

         Richard H. Austing and   
            Bruce H. Barnes and   
          Della T. Bonnette and   
            Gerald L. Engel and   
                  Gordon Stokes   Curriculum '78: Recommendations for the
                                  Undergraduate Program in Computer
                                  Science --- A Report of the ACM
                                  Curriculum Committee on Computer Science 147--166
            Albert D. Edgar and   
                  Samuel C. Lee   FOCUS Microcomputer Number System  . . . 166--177
                James R. Slagle   Experiments with Some Algorithms that
                                  Find Central Solutions for Pattern
                                  Classification . . . . . . . . . . . . . 178--183
        Amaryllis Deliyanni and   
             Robert A. Kowalski   Logic and Semantic Networks  . . . . . . 184--192
                  Dalia Motzkin   Use of Normal Multiplication Tables for
                                  Information Storage and Retrieval  . . . 193--207
                 C. L. McMaster   Corrigendum: ``An Analysis of Algorithms
                                  for the Dutch National Flag Problem''    207--207

Communications of the ACM
Volume 22, Number 4, April, 1979

                 Arthur M. Lesk   Detection of Three-Dimensional Patterns
                                  of Atoms in Chemical Structures  . . . . 219--224
                 E. G. Cale and   
          Lee L. Gremillion and   
                 J. L. McKenney   Price/Performance Patterns of U.S.
                                  Computer Systems . . . . . . . . . . . . 225--232
              Giacomo Bucci and   
             Donald N. Streeter   Methodology for the Design of
                                  Distributed Information Systems  . . . . 233--245
          Richard J. Hanson and   
             John A. Wisniewski   A Mathematical Programming Updating
                                  Method Using Modified Givens
                                  Transformations and Applied to LP
                                  Problems . . . . . . . . . . . . . . . . 245--251
           Daniel Brélaz   New Methods to Color the Vertices of a
                                  Graph  . . . . . . . . . . . . . . . . . 251--256

Communications of the ACM
Volume 22, Number 5, May, 1979

        Richard A. De Millo and   
          Richard J. Lipton and   
                 Alan J. Perlis   Social Processes and Proofs of Theorems
                                  and Programs . . . . . . . . . . . . . . 271--280
         Ernest J. H. Chang and   
               Rosemary Roberts   An improved algorithm for decentralized
                                  extrema-finding in circular
                                  configurations of processes  . . . . . . 281--283
            Theodor D. Sterling   Consumer Difficulties with Computerized
                                  Transactions: an Empirical Investigation 283--289
               John C. Reynolds   Reasoning About Arrays . . . . . . . . . 290--299
             Michael J. Manthey   Model for and Discussion of
                                  Multi-Interpreter Systems  . . . . . . . 299--309

Communications of the ACM
Volume 22, Number 6, June, 1979

                Ronald S. Lemos   An Implementation of Structured
                                  Walk-Throughs in Teaching Cobol
                                  Programming  . . . . . . . . . . . . . . 335--340
       Stavros N. Busenberg and   
                    Wing C. Tam   An academic program providing realistic
                                  training in software engineering . . . . 341--345
                   Steven Alter   Model for Automating File and Program
                                  Design in Business Application Systems   345--353
              Jerome A. Feldman   High Level Programming for Distributed
                                  Computing  . . . . . . . . . . . . . . . 353--368
               Robert Sedgewick   Corrigendum: ``Implementing Quicksort
                                  Programs'' . . . . . . . . . . . . . . . 368--368
               Ruth Shapira and   
                Herbert Freeman   The Cyclic Order Property of Vertices as
                                  an Aid in Scene Analysis . . . . . . . . 368--375

Communications of the ACM
Volume 22, Number 7, July, 1979

                 Terry Winograd   Beyond Programming Languages . . . . . . 391--401
            Franco P. Preparata   An Optimal Real-Time Algorithm for
                                  Planar Convex Hulls  . . . . . . . . . . 402--405
         Patrick C. Fischer and   
              Robert L. Probert   Storage Reorganization Techniques for
                                  Matrix Computation in a Paging
                                  Environment  . . . . . . . . . . . . . . 405--415
                 J. H. Hine and   
                Isi Mitrani and   
                        S. Tsur   The Control of Response Times in
                                  Multi-Class Systems by Memory Allocation 415--424
             Robert A. Kowalski   Algorithm = Logic + Control  . . . . . . 424--436

Communications of the ACM
Volume 22, Number 8, August, 1979

                 J. W. Wong and   
                G. Scott Graham   Self-Assessment Procedure VI: a
                                  self-assessment procedure dealing with
                                  queueing network models of computer
                                  systems  . . . . . . . . . . . . . . . . 449--454
                Robert W. Floyd   The Paradigms of Programming . . . . . . 455--460
       Daniel S. Hirschberg and   
           Ashok K. Chandra and   
               Dilip V. Sarwate   Computing Connected Components on
                                  Parallel Computers . . . . . . . . . . . 461--464
          Nachum Dershowitz and   
                    Zohar Manna   Proving Termination with Multiset
                                  Orderings  . . . . . . . . . . . . . . . 465--476
             Dorothy E. Denning   Secure Personal Computing in an Insecure
                                  Network  . . . . . . . . . . . . . . . . 476--482
                Lloyd S. Nelson   Further remark on stably updating mean
                                  and standard deviation estimates . . . . 483--483

Communications of the ACM
Volume 22, Number 9, September, 1979

          Jerome A. Feldman and   
          William R. Sutherland   Rejuvenating Experimental Computer
                                  Science --- A Report to the National
                                  Science Foundation and Others  . . . . . 497--502
   Daniel D. McCracken, CCP and   
           Peter J. Denning and   
               David H. Brandin   Addendum: An ACM Executive Committee
                                  Position on the Crisis in Experimental
                                  Computer Science . . . . . . . . . . . . 503--504
                      Zvi Galil   On Improving the Worse Case Running Time
                                  of the Boyer--Moore String Matching
                                  Algorithm  . . . . . . . . . . . . . . . 505--508
 Kari-Jouko Räihä and   
               Stuart H. Zweben   An Optimal Insertion Algorithm for
                                  One-Sided Height-Balanced Binary Search
                                  Trees  . . . . . . . . . . . . . . . . . 508--512
              Wilfred J. Hansen   Progressive acyclic digraphs --- a tool
                                  for database integrity . . . . . . . . . 513--518
                George Nagy and   
                Sharad G. Wagle   Approximation of Polygonal Maps by
                                  Cellular Maps  . . . . . . . . . . . . . 518--525
               Tony F. Chan and   
               John Gregg Lewis   Computing Standard Deviations: Accuracy  526--531
                  D. H. D. West   Updating mean and variance estimates: an
                                  improved method  . . . . . . . . . . . . 532--535

Communications of the ACM
Volume 22, Number 10, October, 1979

                Philip D. Laird   Comment on: ``An optimal evaluation of
                                  Boolean expressions in an online query
                                  system'' [Comm. ACM, 20, 1977, no. 5,
                                  344--347, MR 55 #9627] by M. Z. Hanani   549--550
                 Ehud Gudes and   
                Anthony Hoffman   A note on: ``An optimal evaluation of
                                  Boolean expressions in an online query
                                  system'' [Comm. ACM, 20, 1977, no. 5,
                                  344--347, MR 55 #9627] by M. Z. Hanani   550--553
             M. R. Anderson and   
                 M. G. Anderson   Corrigendum: ``Comments on Perfect
                                  Hashing Functions: A Single Probe
                                  Retrieving Method for Static Sets''  . . 553
                 Leslie Lamport   On the Proof of Correctness of a
                                  Calendar Program . . . . . . . . . . . . 554--556
                     Paul Klint   Line Numbers Made Cheap  . . . . . . . . 557--559
Tomás Lozano-Pérez and   
              Michael A. Wesley   An Algorithm for Planning Collision-Free
                                  Paths Among Polyhedral Obstacles . . . . 560--570
                   F. L. Morris   On a Comparison of Garbage Collection
                                  Techniques . . . . . . . . . . . . . . . 571

Communications of the ACM
Volume 22, Number 11, November, 1979

               Richard E. Mayer   A Psychology of Learning BASIC . . . . . 589--593
              Robert Morris and   
                   Ken Thompson   Password Security --- A Case History . . 594--597
               Shmuel Peleg and   
               Azriel Rosenfeld   Breaking Substitution Ciphers Using a
                                  Relaxation Algorithm . . . . . . . . . . 598--605
        Robert Endre Tarjan and   
            Andrew Chi Chih Yao   Storing a Sparse Table . . . . . . . . . 606--611
                     Adi Shamir   How to Share a Secret  . . . . . . . . . 612--613

Communications of the ACM
Volume 22, Number 12, 1979

                      Rob Kling   Introduction to the EFT Symposium  . . . 639--640
         Kenneth L. Kraemer and   
                 Kent W. Colton   Overview of the EFT Symposium  . . . . . 641--643
                 Allen H. Lipis   Costs of the Current U.S. Payments
                                  System . . . . . . . . . . . . . . . . . 644--647
                 Robert H. Long   Public Protection and Education with EFT 648--654
                 Donn B. Parker   Vulnerabilities of EFTs to intentionally
                                  caused losses  . . . . . . . . . . . . . 654--660
         Kenneth L. Kraemer and   
                 Kent W. Colton   Policy, values, and EFT research:
                                  anatomy of a research agenda . . . . . . 660--671
                 M. van der Nat   On Interpolation Search  . . . . . . . . 681


Communications of the ACM
Volume 33, Number 6, June, 1990

               Peter K. Pearson   Fast Hashing of Variable-Length Text
                                  Strings  . . . . . . . . . . . . . . . . 677--680

Communications of the ACM
Volume 33, Number 8, August, 1990

               Daniel M. Sunday   A Very Fast Substring Search Algorithm   132--142


Communications of the ACM
Volume 34, Number 11, November, 1991

                     I. Dittmer   Note on Fast Hashing of Variable Length
                                  Text Strings . . . . . . . . . . . . . . 118
                  Jacques Savoy   Note on Fast Hashing of Variable Length
                                  Text Strings . . . . . . . . . . . . . . 118--119
                  James Litsios   Note on Fast Hashing of Variable Length
                                  Text Strings . . . . . . . . . . . . . . 118--120
                  Peter Pearson   Note on Fast Hashing of Variable Length
                                  Text Strings . . . . . . . . . . . . . . 120


Computing Surveys
Volume 6, Number 4, December, 1974

                Donald E. Knuth   Structured Programming with go to
                                  Statements . . . . . . . . . . . . . . . 261--301


Journal of the ACM
Volume 23, Number 1, January, 1976

            Susan L. Graham and   
                    Mark Wegman   A Fast and Usually Linear Algorithm for
                                  Global Flow Analysis . . . . . . . . . . 172--202


Management Science
Volume 19, 1972

                    R. J. Brown   Chromatic scheduling and the chromatic
                                  number problem . . . . . . . . . . . . . 451--463


SIAM Journal on Computing
Volume 6, Number 2, June, 1977

            Donald E. Knuth and   
               J. H. Morris and   
                    V. R. Pratt   Fast pattern matching in strings . . . . 323--350


Software --- Practice and Experience
Volume 12, Number 1, January, 1982

                A. L. Tharp and   
                      K.-C. Tai   The practicality of text signatures for
                                  accelerating string searching  . . . . . 35--44


ACM Transactions on Mathematical Software
Volume 1, Number 3, September, 1975

                  Ove Skovgaard   Remark on ``Algorithm 236: Bessel
                                  Functions of the First Kind [S17]''  . . 282--284
                  Jayadev Misra   Remark on ``Algorithm 246: Graycode
                                  [Z]''  . . . . . . . . . . . . . . . . . 285--285

ACM Transactions on Mathematical Software
Volume 1, Number 9, September, 1975

               Robert Feinstein   Remark on ``Algorithm 483: Masked
                                  Three-Dimensional Plot Program with
                                  Rotations [J6]'' . . . . . . . . . . . . 285--285


ACM Transactions on Mathematical Software
Volume 2, Number 1, March, 1976

                  D. M. Boulton   Remark on ``Algorithm 434: Exact
                                  Probabilities for $R\times{C}$
                                  Contingency Tables [G2]''  . . . . . . . 108--108
                 Lucian D. Duta   Remark on ``Algorithm 475: Visible
                                  Surface Plotting Program [J6]''  . . . . 109--110
                G. M. White and   
                S. Goudreau and   
                   J. L. Legros   Remark on ``Algorithm 479: A Minimal
                                  Spanning Tree Clustering Method [Z]''    110--111
                    J. Pomeranz   Remark on ``Algorithm 487: Exact
                                  Cumulative Distribution of the
                                  Kolmogorov--Smirnov Statistic for Small
                                  Samples [S14]''  . . . . . . . . . . . . 111--111
                  Robert Morris   Remark on ``Algorithm 490: The
                                  Dilogarithm Function of a Real Argument
                                  [S22]''  . . . . . . . . . . . . . . . . 112--112

ACM Transactions on Mathematical Software
Volume 2, Number 2, June, 1976

            Malcolm C. Pike and   
                  Jennie SooHoo   Remark on ``Algorithm 179: Incomplete
                                  Beta Ratio [S14]'' . . . . . . . . . . . 207--208
            Michael R. Anderson   Remark on ``Algorithm 433: Interpolation
                                  and Smooth Curve Fitting Based on Local
                                  Procedures [E2]''  . . . . . . . . . . . 208--208

ACM Transactions on Mathematical Software
Volume 2, Number 3, September, 1976

                 Alan M. Davies   Remark on ``Algorithm 450: Rosenbrock
                                  Function Minimization [E4]'' . . . . . . 300--301
                 Theodore Brown   Remark on ``Algorithm 489: The Algorithm
                                  SELECT --- for Finding the $i$th
                                  Smallest of $n$ Elements [M1]''  . . . . 301--304

ACM Transactions on Mathematical Software
Volume 2, Number 4, December, 1976

                      M. R. Ito   Remark on ``Algorithm 284: Interchange
                                  of Two Blocks of Data [K2]'' . . . . . . 392--393
                Mohamed el Lozy   Remark on ``Algorithm 299: Chi-Squared
                                  Integral [S15]'' . . . . . . . . . . . . 393--395
             Henk Koppelaar and   
                 Peter Molenaar   Remark on ``Algorithm 486: Numerical
                                  Inversion of Laplace Transform [D5]''    395--396


ACM Transactions on Mathematical Software
Volume 3, Number 1, March, 1977

               Esko G. Cate and   
                 David W. Twigg   Algorithm 513: Analysis of In-Situ
                                  Transposition [F1] . . . . . . . . . . . 104--110
       Françoise Veillon   Remark on ``Algorithm 486: Numerical
                                  Inversion of Laplace Transform'' . . . . 111--111

ACM Transactions on Mathematical Software
Volume 3, Number 2, June, 1977

                J. K. M. Jansen   Remark on ``Algorithm 259: Legendre
                                  Functions for Arguments Larger than
                                  One''  . . . . . . . . . . . . . . . . . 204--250

ACM Transactions on Mathematical Software
Volume 3, Number 3, September, 1977

                   Paolo Sipala   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package (Part I) [F4]'' . . . . . 303--303
                  Dennis Tenney   Remark on ``Algorithm 219: Topological
                                  Ordering for PERT Networks'' . . . . . . 303--303


ACM Transactions on Mathematical Software
Volume 4, Number 1, March, 1978

                  Ove Skovgaard   Remark on ``Algorithm 149: Complete
                                  Elliptic Integral [S21]''  . . . . . . . 95--95

ACM Transactions on Mathematical Software
Volume 4, Number 3, September, 1978

                John P. Coleman   Remark on ``Algorithm 49: Spherical
                                  Neumann Function'' . . . . . . . . . . . 295--295
              Fred G. Gustavson   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package (Part I) [F4]'' . . . . . 295--295
              Andrew Y. Schoene   Remark on ``Algorithm 435: Modified
                                  Incomplete Gamma Function [S14]''  . . . 296--304


ACM Transactions on Mathematical Software
Volume 5, Number 2, June, 1979

                Mohamed el Lozy   Remark on ``Algorithm 395: Student's
                                  $t$-Distribution'' and Remark on
                                  ``Algorithm 396: Student's Quantiles
                                  [S14]''  . . . . . . . . . . . . . . . . 238--239
                   K. O. Geddes   Remark on ``Algorithm 424:
                                  Clenshaw--Curtis Quadrature [O1]'' . . . 240--240
                 M. R. Anderson   Remark on ``Algorithm 474: Bivariate
                                  Interpolation and Smooth Surface Fitting
                                  Based on Local Procedures''  . . . . . . 241--241

ACM Transactions on Mathematical Software
Volume 5, Number 4, December, 1979

             Burton L. Leathers   Remark on ``Algorithm 513: Analysis of
                                  In-Situ Transposition [F1]'' and Remark
                                  on ``Algorithm 467: Matrix Transposition
                                  in Place'' . . . . . . . . . . . . . . . 520--520
       A. C. M. van Swieten and   
            J. Th. M. de Hosson   Remark on ``Algorithm 475: Visible
                                  Surface Plotting Program'' . . . . . . . 521--523


ACM Transactions on Mathematical Software
Volume 6, Number 3, September, 1980

                   U. Harms and   
             H. Kollakowski and   
                 G. Möller   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package (Part 1) [F4]'' . . . . . 456--457


ACM Transactions on Mathematical Software
Volume 7, Number 2, June, 1981

                     G. W. Hill   Remark on ``Algorithm 395: Student's
                                  $t$-Distribution'' . . . . . . . . . . . 247--249
                     G. W. Hill   Remark on ``Algorithm 396: Student's
                                  $t$-Quantiles''  . . . . . . . . . . . . 250--251


Communications of the ACM
Volume 26, Number 8, August, 1983

     Jürgen Peemöller   A correction to Brélaz's modification of
                                  Brown's coloring algorithm . . . . . . . 595--597


ACM Transactions on Mathematical Software
Volume 11, Number 4, December, 1985

                       M. C. Er   Remark on ``Algorithm 246: Graycode
                                  [Z]''  . . . . . . . . . . . . . . . . . 441--443

ACM Transactions on Mathematical Software
Volume 11, Number 2, June, 1985

                 I. D. Hill and   
                     M. C. Pike   Remark on ``Algorithm 299: Chi-Squared
                                  Integral'' . . . . . . . . . . . . . . . 185--185


Communications of the ACM
Volume 28, Number 4, April, 1985

               Marek Kubale and   
             Boguslaw Jackowski   A generalized implicit enumeration
                                  algorithm for graph coloring . . . . . . 412--418


Communications of the ACM
Volume 29, Number 4, April, 1986

               Douglas W. Jones   An empirical comparison of
                                  priority-queue and event-set
                                  implementations  . . . . . . . . . . . . 300--311