Table of contents for issues of Communications of the ACM

Last update: Sat Dec 2 06:32:27 MST 2017                Valid HTML 3.2!

Volume 3, Number 2, February, 1960
Volume 3, Number 12, December, 1960
Volume 4, Number 1, January, 1961
Volume 6, Number 5, May, 1963
Volume 7, Number 12, December, 1964
Volume 8, Number 9, September, 1965
Volume 9, Number 1, January, 1966
Volume 9, Number 3, March, 1966
Volume 10, Number 4, April, 1967
Volume 11, Number 1, January, 1968
Volume 11, Number 5, May, 1968
Volume 11, Number 7, July, 1968
Volume 12, Number 10, October, 1969
Volume 13, Number 2, February, 1970
Volume 13, Number 6, June, 1970
Volume 13, Number 10, October, 1970
Volume 14, Number 4, April, 1971
Volume 14, Number 12, December, 1971
Volume 15, Number 5, May, 1972
Volume 16, Number 4, April, 1973
Volume 17, Number 7, July, 1974
Volume 19, Number 5, May, 1976
Volume 19, Number 7, July, 1976
Volume 21, Number 11, November, 1978
Volume 21, Number 2, February, 1978
Volume 21, Number 8, August, 1978
Volume 22, Number 4, April, 1979
Volume 23, Number 1, January, 1980
Volume 23, Number 2, February, 1980
Volume 23, Number 3, 1980
Volume 23, Number 4, 1980
Volume 23, Number 5, 1980
Volume 23, Number 6, 1980
Volume 23, Number 7, 1980
Volume 23, Number 8, 1980
Volume 23, Number 9, 1980
Volume 23, Number 10, 1980
Volume 23, Number 11, November, 1980
Volume 23, Number 12, December, 1980
Volume 24, Number 1, 1981
Volume 24, Number 2, 1981
Volume 24, Number 3, 1981
Volume 24, Number 4, April, 1981
Volume 24, Number 5, 1981
Volume 24, Number 6, 1981
Volume 24, Number 7, July, 1981
Volume 24, Number 8, 1981
Volume 24, Number 9, September, 1981
Volume 24, Number 10, October, 1981
Volume 24, Number 11, November, 1981
Volume 24, Number 12, 1981
Volume 24, Number ??, 1981
Volume 25, Number 1, 1982
Volume 25, Number 2, February, 1982
Volume 25, Number 3, 1982
Volume 25, Number 4, 1982
Volume 25, Number 5, 1982
Volume 25, Number 6, June, 1982
Volume 25, Number 7, 1982
Volume 25, Number 8, 1982
Volume 25, Number 9, September, 1982
Volume 25, Number 10, October, 1982
Volume 25, Number 11, 1982
Volume 25, Number 12, 1982
Volume 26, Number 1, 1983
Volume 26, Number 2, 1983
Volume 26, Number 3, March, 1983
Volume 26, Number 4, April, 1984
Volume 26, Number 5, 1983
Volume 26, Number 6, June, 1983
Volume 26, Number 7, July, 1983
Volume 26, Number 8, August, 1983
Volume 26, Number 9, September, 1983
Volume 26, Number 10, October, 1983
Volume 26, Number 11, November, 1983
Volume 26, Number 12, December, 1983
Volume 27, Number 0, September, 1984
Volume 27, Number 1, January, 1984
Volume 27, Number 2, February, 1984
Volume 27, Number 3, March, 1984
Volume 27, Number 4, April, 1984
Volume 27, Number 5, May, 1984
Volume 27, Number 6, June, 1984
Volume 27, Number 7, July, 1984
Volume 27, Number 8, August, 1984
Volume 27, Number 9, September, 1984
Volume 27, Number 10, 1984
Volume 27, Number 11, November, 1984
Volume 27, Number 12, December, 1984
Volume 28, Number 4, 1984
Volume 30, Number 4, 1984
Volume 28, Number 1, 1985
Volume 28, Number 2, February, 1985
Volume 28, Number 3, March, 1985
Volume 28, Number 4, April, 1985
Volume 28, Number 5, May, 1985
Volume 28, Number 6, June, 1985
Volume 28, Number 7, July, 1985
Volume 28, Number 8, August, 1985
Volume 28, Number 9, September, 1985
Volume 28, Number 10, October, 1985
Volume 28, Number 11, November, 1985
Volume 28, Number 12, December, 1985
Volume 29, Number 1, January, 1986
Volume 29, Number 2, February, 1986
Volume 29, Number 3, March, 1986
Volume 29, Number 4, April, 1986
Volume 29, Number 5, May, 1986
Volume 29, Number 6, June, 1986
Volume 29, Number 7, July, 1986
Volume 29, Number 8, August, 1986
Volume 29, Number 9, September, 1986
Volume 29, Number 10, October, 1986
Volume 29, Number 11, November, 1986
Volume 29, Number 12, December, 1986
Volume 30, Number 1, January, 1987
Volume 30, Number 2, February, 1987
Volume 30, Number 3, March, 1987
Volume 30, Number 4, April, 1987
Volume 30, Number 5, May, 1987
Volume 30, Number 6, June, 1987
Volume 30, Number 7, July, 1987
Volume 30, Number 8, August, 1987
Volume 30, Number 9, September, 1987
Volume 30, Number 10, October, 1987
Volume 30, Number 11, November, 1987
Volume 30, Number 12, December, 1987
Volume 31, Number 1, January, 1988
Volume 31, Number 2, February, 1988
Volume 31, Number 3, March, 1988
Volume 31, Number 4, April, 1988
Volume 31, Number 5, May, 1988
Volume 31, Number 6, 1988
Volume 31, Number 7, July, 1988
Volume 31, Number 8, 1988
Volume 31, Number 9, September, 1988
Volume 31, Number 10, October, 1988
Volume 31, Number 11, November, 1988
Volume 31, Number 12, December, 1988
Volume 32, Number 4, 1988
Volume 32, Number 1, January, 1989
Volume 32, Number 2, 1989
Volume 32, Number 3, March, 1989
Volume 32, Number 4, April, 1989
Volume 32, Number 5, 1989
Volume 32, Number 6, 1989
Volume 32, Number 7, 1989
Volume 32, Number 8, 1989
Volume 32, Number 9, September, 1989
Volume 32, Number 10, October, 1989
Volume 32, Number 11, 1989
Volume 32, Number 12, December, 1989
Volume 32, Number 11, November, 1989
Volume 33, Number 3, March, 1990
Volume 33, Number 4, April, 1990
Volume 19, Number ??, 1972
Volume 1, Number 3, September, 1975
Volume 2, Number 4, December, 1976
Volume 3, Number 3, September, 1977
Volume 4, Number 3, September, 1978
Volume 5, Number 2, June, 1979
Volume 6, Number 3, September, 1980
Volume 7, Number 2, June, 1981
Volume 12, Number 1, January, 1982
Volume 8, Number 1, March, 1982
Volume 11, Number 4, December, 1985
Volume 11, Number 2, June, 1985


Communications of the ACM
Volume 3, Number 2, February, 1960

                K. Samelson and   
             Friedrich L. Bauer   Sequential Formula Translation . . . . . 76--83

Communications of the ACM
Volume 3, Number 12, December, 1960

              K. W. Ellenberger   ACM Algorithm 30: Numerical Solution of
                                  the Polynomial Equation  . . . . . . . . 643


Communications of the ACM
Volume 4, Number 1, January, 1961

                 Edgar T. Irons   A Syntax Directed Compiler for ALGOL 60  51--55


Communications of the ACM
Volume 6, Number 5, May, 1963

      Edward H. Sussenguth, Jr.   Use of Tree Structures for Processing
                                  Files  . . . . . . . . . . . . . . . . . 272--279


Communications of the ACM
Volume 7, Number 12, December, 1964

                   J. Boothroyd   ACM Algorithm 246: Graycode  . . . . . . 701


Communications of the ACM
Volume 8, Number 9, September, 1965

             Edsger W. Dijkstra   Solution of a Problem in Concurrent
                                  Programming Control  . . . . . . . . . . 569


Communications of the ACM
Volume 9, Number 1, January, 1966

                  J. Weizenbaum   ELIZA --- a Computer Program for the
                                  Study of Natural Language Communication
                                  between Man and Machine  . . . . . . . . 36--44

Communications of the ACM
Volume 9, Number 3, March, 1966

               J. B. Dennis and   
                 E. C. van Horn   Programming Semantics for
                                  Multiprogrammed Computations . . . . . . 143--155


Communications of the ACM
Volume 10, Number 4, April, 1967

                 I. D. Hill and   
                     M. C. Pike   ACM Algorithm 299: Chi-Squared Integral  243--244


Communications of the ACM
Volume 11, Number 1, January, 1968

            Ward Douglas Maurer   An Improved Hashcode for Scatter Storage 35--37
                  Robert Morris   Scatter Storage Techniques . . . . . . . 38--44

Communications of the ACM
Volume 11, Number 5, May, 1968

               Peter J. Denning   The Working Set Model for Program
                                  Behaviour  . . . . . . . . . . . . . . . 323--333
             Edsger W. Dijkstra   The structure of the
                                  ``THE''-multiprogramming system  . . . . 341--346

Communications of the ACM
Volume 11, Number 7, July, 1968

                     J. R. Bell   ACM Algorithm 334: Normal Random
                                  Deviates [G5]  . . . . . . . . . . . . . 498


Communications of the ACM
Volume 12, Number 10, October, 1969

                 C. A. R. Hoare   An Axiomatic Basis for Computer
                                  Programming  . . . . . . . . . . . . . . 576--580, 583


Communications of the ACM
Volume 13, Number 2, February, 1970

                     Jay Earley   An Efficient Context-Free Parsing
                                  Algorithm  . . . . . . . . . . . . . . . 94--102
                  James R. Bell   The Quadratic Quotient Method: a Hash
                                  Code Eliminating Secondary Clustering    107--109

Communications of the ACM
Volume 13, Number 6, June, 1970

                     E. F. Codd   A Relational Model of Data for Large
                                  Shared Data Banks  . . . . . . . . . . . 377--387

Communications of the ACM
Volume 13, Number 10, October, 1970

                     G. W. Hill   ACM Algorithm 395: Student's
                                  $t$-Distribution . . . . . . . . . . . . 617--619
                     G. W. Hill   ACM Algorithm 396: Student's
                                  $t$-Quantiles  . . . . . . . . . . . . . 619--620


Communications of the ACM
Volume 14, Number 4, April, 1971

                  Niklaus Wirth   Program Development by Stepwise
                                  Refinement . . . . . . . . . . . . . . . 221--227
                  J. M. McNamee   ACM Algorithm 408: a Sparse Matrix
                                  Package (Part I) . . . . . . . . . . . . 265--273

Communications of the ACM
Volume 14, Number 12, December, 1971

                 M. C. Harrison   Implementation of the Substring Test by
                                  Hashing  . . . . . . . . . . . . . . . . 777--779


Communications of the ACM
Volume 15, Number 5, May, 1972

             David Lorge Parnas   A technique for software module
                                  specification with examples  . . . . . . 330--336


Communications of the ACM
Volume 16, Number 4, April, 1973

                    H. Kuki and   
                     W. J. Cody   A Statistical Study of the Accuracy of
                                  Floating Point Number Systems  . . . . . 223--230


Communications of the ACM
Volume 17, Number 7, July, 1974

          Dennis M. Ritchie and   
                   Ken Thompson   The UNIX Time-Sharing System . . . . . . 365--375


Communications of the ACM
Volume 19, Number 5, May, 1976

             Dorothy E. Denning   A Lattice Model of Secure Information
                                  Flow . . . . . . . . . . . . . . . . . . 236--243

Communications of the ACM
Volume 19, Number 7, July, 1976

         Robert M. Metcalfe and   
                 David R. Boggs   Ethernet: Distributed Packet Switching
                                  for Local Computer Networks  . . . . . . 395--404


Communications of the ACM
Volume 21, Number 11, November, 1978

                 C. A. R. Hoare   Corrigendum: ``Communicating Sequential
                                  Processes''  . . . . . . . . . . . . . . 958--958

Communications of the ACM
Volume 21, Number 2, February, 1978

           Ronald L. Rivest and   
                 Adi Shamir and   
             Leonard M. Adleman   A Method for Obtaining Digital
                                  Signatures and Public-Key Cryptosystems  120--126

Communications of the ACM
Volume 21, Number 8, August, 1978

                 C. A. R. Hoare   Communicating Sequential Processes . . . 666--677


Communications of the ACM
Volume 22, Number 4, April, 1979

           Daniel Brélaz   New Methods to Color Vertices of a Graph 251--256


Communications of the ACM
Volume 23, Number 1, January, 1980

                 P. O'Neill and   
                     A. O'Neill   Performance Statistics of a Time Sharing
                                  Network at a Small University  . . . . . 10--13
            Lawrence J. Mazlack   Identifying Potential to Acquire
                                  Programming Skill  . . . . . . . . . . . 14--17
                 R. J. Cichelli   Minimal Perfect Hash Functions Made
                                  Simple . . . . . . . . . . . . . . . . . 17--19
             Harold Abelson and   
                  Peter Andreae   Information Transfer and Area-Time
                                  Tradeoffs for VLSI Multiplication  . . . 20--23
            Jeffrey M. Lane and   
         Loren C. Carpenter and   
          J. Turner Whitted and   
                 James F. Blinn   Scan Line Methods for Displaying
                                  Parametrically Defined Surfaces  . . . . 23--34
                Stephen T. Kent   Technical Correspondence: On Secure
                                  Personal Computing . . . . . . . . . . . 35--36
             Dorothy E. Denning   Technical Correspondence: On Secure
                                  Personal Computing . . . . . . . . . . . 36--39
                 Doug Bates and   
                Ronald S. Lemos   Technical Correspondence: On Statistical
                                  Analysis . . . . . . . . . . . . . . . . 39--40
                      Anonymous   Correction: List of Contributors to the
                                  CS Report [Comm. ACM, March 1979]  . . . 40--40

Communications of the ACM
Volume 23, Number 2, February, 1980

            Anthony Ralston and   
                      Mary Shaw   Curriculum '78 --- Is Computer Science
                                  Really that Unmathematical . . . . . . . 67--70
                M. D. Canon and   
                D. H. Fritz and   
             John H. Howard and   
               T. D. Howell and   
          Michael F. Mitoma and   
          Juan Rodriguez-Rossel   A Virtual Machine Emulator for
                                  Performance Evaluation . . . . . . . . . 71--80
               David Redell and   
                Yogen Dalal and   
             Thomas Horsley and   
                 Hugh Lauer and   
              William Lynch and   
               Paul McJones and   
                 Hal Murray and   
                Stephen Purcell   Pilot: An Operating System for a
                                  Personal Computer  . . . . . . . . . . . 81--92
           J. K. Ousterhout and   
               D. A. Scelza and   
                   P. S. Sindhu   Medusa: an experiment in distributed
                                  operating system structure . . . . . . . 92--105
          Butler W. Lampson and   
                David D. Redell   Experience with Processes and Monitors
                                  in Mesa  . . . . . . . . . . . . . . . . 105--117
               B. J. Walker and   
             R. A. Kemmerer and   
                    G. J. Popek   Specification and Verification of the
                                  UCLA Unix Security Kernel  . . . . . . . 118--131

Communications of the ACM
Volume 23, Number 3, 1980

            Daniel D. McCracken   John W. Mauchly: 1907--1980  . . . . . . 143--143
              Isaac L. Auerbach   A Tribute to John William Mauchly  . . . 144
              J. Presper Eckert   Eulogy: Delivered in St. Anthony's
                                  Church, Ambler, Pennsylvania, at funeral
                                  services on January 11, 1980 . . . . . . 145--146
                 Robert F. Ling   General Considerations on the Design of
                                  an Interactive System for Data Analysis  147--154
                   C. W. Fraser   A Generalized Text Editor  . . . . . . . 154--158
                      K. P. Lee   A Linear Algorithm for Copying Binary
                                  Trees Using Bounded Workspace  . . . . . 159--162
                       H. Samet   Region representation: Quadtrees from
                                  boundary codes . . . . . . . . . . . . . 163--170
                 C. R. Dyer and   
               A. Rosenfeld and   
                       H. Samet   Region representation: Boundary codes
                                  from quadtrees . . . . . . . . . . . . . 171--179

Communications of the ACM
Volume 23, Number 4, 1980

            Charles L. Gold and   
         Seymour E. Goodman and   
             Benjamin G. Walker   Software: Recommendations for an Export
                                  Control Policy . . . . . . . . . . . . . 199--207
                   R. E. Brooks   Studying programming behavior
                                  experimentally: The problems of proper
                                  methodology  . . . . . . . . . . . . . . 207--213
              Jon Louis Bentley   Multidimensional Divide-and-Conquer  . . 214--229
                 Jean Vuillemin   A Unifying Look at Data Structures . . . 229--239

Communications of the ACM
Volume 23, Number 5, 1980

                Robert L. Glass   Real-Time: The ``Lost World'' of
                                  Software Debugging and Testing . . . . . 264--271
                  Joshua Turner   The Structure of Modular Programs  . . . 272--277
            Ishwar K. Sethi and   
                  B. Chatterjee   Conversion of Decision Tables to
                                  Efficient Sequential Testing Procedures  279--285
                       Rik Maes   An Algorithmic Approach to the
                                  Conversion of Decision Grid Charts into
                                  Compressed Decision Tables . . . . . . . 286--293
                    Arthur Gill   Hierarchical Binary Search . . . . . . . 294--300
          Lionel E. Deimel, Jr.   On a matrix chain product algorithm.
                                  Correction to: ``An $O(n)$ algorithm for
                                  determining a near-optimal computation
                                  order of matrix chain products'' [Comm.
                                  ACM, 21, 1978, 544--549, MR 80a:68037]
                                  by F. Y. Chin. With a reply by Chin  . . 301

Communications of the ACM
Volume 23, Number 6, 1980

                    Roger House   Comments on Program Specification and
                                  Testing  . . . . . . . . . . . . . . . . 324--331
           Jack A. Chambers and   
              Jerry W. Sprecher   Computer Assisted Instruction: Current
                                  Trends . . . . . . . . . . . . . . . . . 332--342
                 Turner Whitted   An Improved Illumination Model for
                                  Shaded Display . . . . . . . . . . . . . 343--349
               John G. Fletcher   A More General Algorithm for Computing
                                  Closed Semiring Costs Between Vertices
                                  of a Directed Graph  . . . . . . . . . . 350--351

Communications of the ACM
Volume 23, Number 7, 1980

                   Y. Banno and   
                  H. Hirose and   
                  Y. Karita and   
                H. Mawatari and   
                H. Murakami and   
               H. Takahashi and   
                 S. Yashiro and   
                 H. Yoshiki and   
                N. Hagiwara and   
                     Y. Sakurai   KEKOPEN, An Open Batch Processing System
                                  at KEK . . . . . . . . . . . . . . . . . 368--378
                    David Harel   On Folk Theorems . . . . . . . . . . . . 379--389
             R. C. H. Cheng and   
                    G. M. Feast   Gamma variate generators with increased
                                  shape parameter range  . . . . . . . . . 389--394
            Fabrizio Luccio and   
                    Linda Pagli   Comment on Generalized AVL Trees . . . . 394--395
             Stuart K. Card and   
            Thomas P. Moran and   
                   Allen Newell   The Keystroke-Level Model for User
                                  Performance Time with Interactive
                                  Systems  . . . . . . . . . . . . . . . . 396--410

Communications of the ACM
Volume 23, Number 8, 1980

              J. M. Triance and   
                   J. F. S. Yow   MCOBOL --- a Prototype Macro Facility
                                  for Cobol  . . . . . . . . . . . . . . . 432--439
             Michael T. Compton   Easing Fault Location in Large Systems   440--442
             Kenneth E. Iverson   Notation as a Tool of Thought  . . . . . 444--465
                G. Peterson and   
                   A. B. Budgor   The Computer Language Mathsy and
                                  Applications to Solid State Physics  . . 466--474
        Maurice H. Halstead and   
            Victor B. Schneider   Self-Assessment Procedure VII: a
                                  Self-Assessment Procedure Dealing with
                                  Software Science . . . . . . . . . . . . 475--480

Communications of the ACM
Volume 23, Number 9, 1980

             Dennis E. Hall and   
        Deborah K. Scherrer and   
              Joseph S. Sventek   A Virtual Operating System . . . . . . . 495--502
                  Hitohisa Asai   An overrelaxation for a numerical
                                  inverse of a constant  . . . . . . . . . 503--510
                   B. Kumar and   
                 E. S. Davidson   Computer System Design Using a
                                  Hierarchical Approach to Performance
                                  Evaluation . . . . . . . . . . . . . . . 511--521
             John L. Pfaltz and   
          William J. Berman and   
                Edgar M. Cagley   Partial-Match Retrieval Using Indexed
                                  Descriptor Files . . . . . . . . . . . . 522--528

Communications of the ACM
Volume 23, Number 10, 1980

            Donald R. Chand and   
                 Surya B. Yadav   Logical Construction of Software . . . . 546--555
           Henry F. Ledgard and   
          John A. Whiteside and   
              Andrew Singer and   
                William Seymour   The Natural Language of Interactive
                                  Systems  . . . . . . . . . . . . . . . . 556--563
                        Y. Bard   A Model of shared DASD and Multipathing  564--572
             K. Mani Chandy and   
               Charles H. Sauer   Computational algorithms for product
                                  form queueing networks . . . . . . . . . 573--583
                  D. Potier and   
                     P. LeBlanc   Analysis of Locking Policies in Database
                                  Management Systems . . . . . . . . . . . 584--593

Communications of the ACM
Volume 23, Number 11, November, 1980

             Curtis R. Cook and   
                     Do Jin Kim   Best Sorting Algorithms for Nearly
                                  Sorted Lists . . . . . . . . . . . . . . 620--624
          M. L. V. Pitteway and   
                D. J. Watkinson   Bresenham's algorithm with grey scale    625--626
           D. S. Hirschberg and   
                 J. B. Sinclair   Decentralized Extrema-Finding in
                                  Circular Configurations of Processors    627--628
      Guy Lewis Steele, Jr. and   
             Gerald Jay Sussman   Design of a Lisp-based Processor . . . . 628--645
                       M. Hofri   Disk scheduling: FCFS vs. SSTF revisited 645--653

Communications of the ACM
Volume 23, Number 12, December, 1980

            James Lyle Peterson   Computer Programs for Detecting and
                                  Correcting Spelling Errors . . . . . . . 676--687
             Patrick H. Winston   Learning and Reasoning by Analogy  . . . 689--702
                    Hanan Samet   Deletion in two-dimensional quad trees   703--710
              John F. Shoch and   
                    Jon A. Hupp   Measured performance of an Ethernet
                                  local network  . . . . . . . . . . . . . 711--721
                      Anonymous   1980 Index by Subject to Algorithms  . . 722--722
                      Anonymous   Index to Communications of the ACM,
                                  Volume 23, 1980  . . . . . . . . . . . . 723--727
                G. Jaeschke and   
                   G. Osterburg   Technical Correspondence: On Cichelli's
                                  Minimal Perfect Hash Functions Method    728--729
                 R. J. Cichelli   Technical Correspondence: On Cichelli's
                                  Minimal Perfect Hash Functions Method    728--729
            John McClintock and   
                     Paul Klint   Technical Correspondence: Algol-W
                                  Approach to Line Number Maintenance  . . 729--729


Communications of the ACM
Volume 24, Number 1, 1981

                    Barry Dwyer   One More Time --- How to Update a Master
                                  File . . . . . . . . . . . . . . . . . . 3--8
               Glenn Ricart and   
              Ashok K. Agrawala   An Optimal Algorithm for Mutual
                                  Exclusion in Computer Networks . . . . . 9--17
                 Paul Pritchard   A sublinear additive sieve for finding
                                  prime numbers  . . . . . . . . . . . . . 18--23
               Peter G. W. Keen   Information Systems and Organizational
                                  Change . . . . . . . . . . . . . . . . . 24--33

Communications of the ACM
Volume 24, Number 2, 1981

                  Fred N. Krull   Experience With ILIAD: a High-Level
                                  Process Control Language . . . . . . . . 66--72
                    E. J. Gauss   Pracniques: Built-In Checklist Reduces
                                  File Destruction . . . . . . . . . . . . 73
  Charles Anthony Richard Hoare   The Emperor's Old Clothes  . . . . . . . 75--83
                    David Chaum   Untraceable Electronic Mail, Return
                                  Addresses, and Digital Pseudonyms  . . . 84--88
          M. L. V. Pitteway and   
                D. J. Watkinson   Corrigendum: ``Bresenham's algorithm
                                  with grey scale''  . . . . . . . . . . . 88--88
            Arnold L. Rosenberg   On Uniformly Inserting One Data
                                  Structure into Another . . . . . . . . . 88--90

Communications of the ACM
Volume 24, Number 3, 1981

              Marilyn M. Mantai   The Effect of Programming Team
                                  Structures on Programming Tasks  . . . . 106--113
           Kenneth I. Magel and   
         Richard H. Austing and   
              Alfs Berztiss and   
            Gerald L. Engel and   
            John W. Hamblen and   
          A. A. J. Hoffmann and   
                  Robert Mathis   Recommendations for Master's Level
                                  Programs in Computer Science --- a
                                  Report of the ACM Curriculum Committee
                                  on Computer Science  . . . . . . . . . . 115--123
               Jay F. Nunamaker   Educational Programs in Information
                                  Systems  . . . . . . . . . . . . . . . . 124--133
                    Jack Minker   Computer Scientists Whose Scientific
                                  Freedom and Human Rights Have Been
                                  Violated: a Report of the ACM Committee
                                  on Scientific Freedom and Human Rights   134--139
                  G. R. Andrews   Parallel Programs: Proofs, Principles,
                                  and Practice . . . . . . . . . . . . . . 140--146
                Abbe Mowshowitz   On Approaches to the Study of Social
                                  Issues in Computing  . . . . . . . . . . 146--155

Communications of the ACM
Volume 24, Number 4, April, 1981

               Richard E. Nance   The time and state relationships in
                                  simulation modeling  . . . . . . . . . . 173--179
            Tuncer I. Ören   Concepts and Criteria to Access
                                  Acceptability of Simulation Studies: a
                                  Frame of References  . . . . . . . . . . 180--189
                Osman Balci and   
              Robert G. Sargent   A methodology for cost-risk analysis in
                                  the statistical validation of simulation
                                  models . . . . . . . . . . . . . . . . . 190--197
               K. M. Chandy and   
                       I. Misra   Asynchronous Distributed Simulation via
                                  a Sequence of Parallel Computations  . . 198--206
                Gordon M. Clark   Use of Pólya distributions in approximate
                                  solutions to nonstationary ${M}/{M}/s$
                                  queues . . . . . . . . . . . . . . . . . 206--217
             T. J. Schriber and   
                  R. W. Andrews   A conceptual framework for research in
                                  the analysis of simulation output  . . . 218--232
        Philip Heidelberger and   
                 Peter D. Welch   A spectral method for confidence
                                  interval generation and run length
                                  control in simulations . . . . . . . . . 233--245
                Lee W. Schruben   Control of initialization bias in
                                  multivariate simulation response . . . . 246--252
             J. H. Donnelly and   
                  R. E. Shannon   Minimum mean-squared-error estimators
                                  for simulation experiments . . . . . . . 253--259
            P. Heidelberger and   
                 P. A. W. Lewis   Regression-adjusted estimates for
                                  regenerative simulations, with graphics  260--273

Communications of the ACM
Volume 24, Number 5, 1981

         Charles R. Litecky and   
            Larry E. Rittenberg   The External Auditor's Review of
                                  Computer Controls  . . . . . . . . . . . 288--295
             P. J. Robinson and   
                    Dave Singer   Another Spelling Correction Program  . . 296--297
                  Robert P. Nix   Experience With a Space Efficient Way to
                                  Store a Dictionary . . . . . . . . . . . 297--298
                      J. Inglis   Pracniques: Updating a Master File ---
                                  Yet One More Time  . . . . . . . . . . . 299
        Franco P. Preparata and   
                 Jean Vuillemin   The Cube-Connected Cycles: a Versatile
                                  Network for Parallel Computation . . . . 300--309
                Dana H. Ballard   Strip Trees, a Hierarchical
                                  Representation for Curves  . . . . . . . 310--321

Communications of the ACM
Volume 24, Number 6, 1981

                Dan W. Crockett   Triform Programs . . . . . . . . . . . . 344--350
                   Joseph Traub   Quo Vadimus: Computer Science in a
                                  Decade . . . . . . . . . . . . . . . . . 351--369
           Peter J. Denning and   
       Edward A. Feigenbaum and   
               Paul Gilmore and   
           Anthony C. Hearn and   
          Robert W. Ritchie and   
                Joseph F. Traub   The Snowbird Report: a Discipline in
                                  Crisis . . . . . . . . . . . . . . . . . 370--374
                 John A. N. Lee   Response to the Federal Trade
                                  Commission's Proposed Ruling on
                                  Standards and Certification  . . . . . . 375--380
         Martin A. Fischler and   
               Robert C. Bolles   Random sample consensus: a paradigm for
                                  model fitting with applications to image
                                  analysis and automated cartography . . . 381--395

Communications of the ACM
Volume 24, Number 7, July, 1981

                 M. Stonebraker   Operating System Support for Database
                                  Management . . . . . . . . . . . . . . . 412--418
                Anthony Ralston   The Proposed New Computing Reviews
                                  Classification Scheme, a Report of the
                                  Computing Reviews Category Revision
                                  Committee  . . . . . . . . . . . . . . . 419--433
           Peter J. Denning and   
               David H. Brandin   Special Report: Report of the Public
                                  Cryptography Study Group . . . . . . . . 434--434
             Werner A. Baum and   
           David H. Brandin and   
          R. Creighton Buck and   
           George I. Davida and   
           George Handelman and   
          Martin E. Hellman and   
         Ira Michael Heyman and   
             Wilfred Kaplan and   
             Daniel C. Schwartz   Report of the Public Cryptography Study
                                  Group, prepared for American Council on
                                  Education, One Dupont Circle,
                                  Washington, DC 20036, February 7, 1981   435--445
               George I. Davida   The Case Against Restraints on
                                  Non-Governmental Research in
                                  Cryptography . . . . . . . . . . . . . . 445--450
        Harvey J. Greenberg and   
             Richard P. O'Neill   Representing super-sparse matrices with
                                  perturbed values . . . . . . . . . . . . 451--456
                  Brian Billard   Polynomial manipulation with APL . . . . 457--465
            Ralph C. Merkle and   
              Martin E. Hellman   On the security of multiple encryption   465--467

Communications of the ACM
Volume 24, Number 8, 1981

              Richard A. Demers   System Design for Usability  . . . . . . 494--501
                 William L. Ash   Mxec: Parallel Processing with an
                                  Advanced Macro Facility  . . . . . . . . 502--509
           Richard E. Mayer and   
                  Piraye Bayman   Psychology of Calculator Languages: a
                                  Framework for Describing Differences in
                                  Users' Knowledge . . . . . . . . . . . . 511--520
                 Alan Jay Smith   Long-Term File Migration: Development
                                  and Evaluation of Algorithms . . . . . . 521--532
              D. E. Denning and   
                    M. S. Sacco   Timestamps in Key Distribution Protocols 533--536

Communications of the ACM
Volume 24, Number 9, September, 1981

                  P. J. Denning   Computer Architecture: Some Old Ideas
                                  that Haven'T Quite Made It Yet . . . . . 553--554
                    Barry Dwyer   A User-Friendly Algorithm  . . . . . . . 556--561
             Tim Teitelbaum and   
                    Thomas Reps   The Cornell Program Synthesizer: a
                                  Syntax-directed Programming Environment  563--573
                    J. O'Rourke   An on-line algorithm for fitting
                                  straight lines between data ranges . . . 574--578
                P. Quittner and   
                   S. Csoka and   
                  S. Halasz and   
                  D. Kotsis and   
                      K. Varnai   Comparison of Synonym Handling and
                                  Bucket Organization Methods  . . . . . . 579--582
             R. J. McEliece and   
                  D. V. Sarwate   On sharing secrets and Reed--Solomon
                                  codes  . . . . . . . . . . . . . . . . . 583--584
                Jane Fedorowicz   Comments on Price/Performance Patterns
                                  of U.S. Computer Systems . . . . . . . . 585--586
                 Gail E. Kaiser   Automatic Extension of an ATN Knowledge
                                  Base . . . . . . . . . . . . . . . . . . 587--593
           Christopher E. Rothe   An Abstract Programming Model  . . . . . 594--596
                    Jay Gischer   Shuffle Languages, Petri Nets, and
                                  Context-Sensitive Grammars . . . . . . . 597--605
            Michael R. Dunlavey   Letter to the Editor: On Spelling
                                  Correction and Beyond  . . . . . . . . . 608--608
                Lance A. Miller   Letter to the Editor: On Spelling
                                  Correction and Beyond  . . . . . . . . . 608--609
              James L. Peterson   Letter to the Editor: On Spelling
                                  Correction and Beyond  . . . . . . . . . 609--609

Communications of the ACM
Volume 24, Number 10, October, 1981

       Donald D. Chamberlin and   
         Morton M. Astrahan and   
         Michael W. Blasgen and   
              James N. Gray and   
              W. Frank King and   
           Bruce G. Lindsay and   
               Raymod Lorie and   
              James W. Mehl and   
            Thomas G. Price and   
             Franco Putzolo and   
Patricia Griffiths Selinger and   
           Mario Schkolnick and   
            Donald R. Slutz and   
          Irving L. Traiger and   
           Bradford W. Wade and   
                 Robert A. Yost   A History and Evaluation of System R . . 632--646
                   Peter Wegner   Self-Assessment Procedure VIII: a
                                  Self-Assessment Procedure Dealing with
                                  the Programming Language Ada . . . . . . 647--678
                   Daniel Robey   Computer Information Systems and
                                  Organization Structure . . . . . . . . . 679--687
           Peter J. Denning and   
              T. Don Dennis and   
           Jeffrey A. Brumfield   Low Contention Semaphores and Ready
                                  Lists  . . . . . . . . . . . . . . . . . 687--699
             David A. Patterson   An Experiment in High Level Language
                                  Microprogramming and Verification  . . . 699--709

Communications of the ACM
Volume 24, Number 11, November, 1981

                     P. Denning   Performance Analysis: Experimental
                                  computer science at its best . . . . . . 725--727
               Saul I. Gass and   
           Karla L. Hoffman and   
      Richard H. F. Jackson and   
            Lambert S. Joel and   
              Patsy B. Saunders   Documentation for a Model: a
                                  Hierarchical Approach  . . . . . . . . . 728--733
                  M. A. Pechura   Microcomputers as remote nodes of a
                                  distributed system . . . . . . . . . . . 734--738
        Starr Roxanne Hiltz and   
                  Murray Turoff   The Evolution of User Behavior in a
                                  Computerized Conference System . . . . . 739--751
              Izak Benbasat and   
           Albert S. Dexter and   
                Paul S. Masulis   An Experimental Study of the
                                  Human/Computer Interface . . . . . . . . 752--762
           Bennet P. Lientz and   
              E. Burton Swanson   Problems in Application Software
                                  Maintenance  . . . . . . . . . . . . . . 763--769
                 Leslie Lamport   Technical Note: Password Authentication
                                  with Insecure Communication  . . . . . . 770--772
                 Paul Pritchard   Corrigendum: ``A sublinear additive
                                  sieve for finding prime numbers''  . . . 772--772
                    K. S. Booth   Authentication of Signatures Using
                                  Public Key Encryption  . . . . . . . . . 772--774

Communications of the ACM
Volume 24, Number 12, 1981

            Leonard J. Bass and   
                Ralph E. Bunker   A Generalized User Interface for
                                  Applications Programs  . . . . . . . . . 796--800
       William M. McCormack and   
              Robert G. Sargent   Analysis of future event set algorithms
                                  for discrete event simulation  . . . . . 801--812
                      Per Galle   An Algorithm for Exhaustive Generation
                                  of Building Floor Plans  . . . . . . . . 813--825
    John H. Blackstone, Jr. and   
               Gary L. Hogg and   
                Don T. Phillips   A two-list synchronisation procedure for
                                  discrete event simulation  . . . . . . . 825--829
                    G. Jaeschke   Reciprocal Hashing: a Method for
                                  Generating Minimal Perfect Hashing
                                  Functions  . . . . . . . . . . . . . . . 829--833

Communications of the ACM
Volume 24, Number ??, 1981

               F. A. Briggs and   
                      M. Dubois   Performance of cache-based
                                  multiprocessors  . . . . . . . . . . . . 181--190


Communications of the ACM
Volume 25, Number 1, 1982

            G. G. Gustafson and   
                Roberta J. Kerr   Some Practical Experience with a
                                  Software Quality Assurance Program . . . 4--12
             Jean E. Sammet and   
                Anthony Ralston   The New (1982) Computing Reviews
                                  Classification System --- Final Version  13--25
               Jane J. Robinson   DIAGRAM: a Grammar for Dialogues . . . . 27--47
               J. H. Ahrens and   
                      U. Dieter   Generating Gamma variates by a modified
                                  rejection technique  . . . . . . . . . . 47--54
                Ben Shneiderman   Control Flow and Data Structure
                                  Documentation: Two Experiments . . . . . 55--63
          Jon Louis Bentley and   
              Mark G. Faust and   
            Franco P. Preparata   Approximation algorithms for convex
                                  hulls  . . . . . . . . . . . . . . . . . 64--68

Communications of the ACM
Volume 25, Number 2, February, 1982

                 Howard Mozeico   A Human/Computer Interface to
                                  Accommodate User Learning Stages . . . . 100--104
                   L. A. Welsch   Using electronic mail as a teaching tool 105--108
                     E. F. Codd   Relational Database: a Practical
                                  Foundation for Productivity  . . . . . . 109--117
              Patrick G. Skelly   The ACM Position on Standardization of
                                  the Ada Language . . . . . . . . . . . . 118--120
           Henry F. Ledgard and   
                  Andrew Singer   Scaling Down Ada (Or Towards a Standard
                                  Ada Subset)  . . . . . . . . . . . . . . 121--125
               K. M. Chandy and   
                       D. Neuse   Linearizer: a heuristic algorithm for
                                  queueing network models of computing
                                  systems  . . . . . . . . . . . . . . . . 126--134
              John Zahorjan and   
          Kenneth C. Sevcik and   
             Derek L. Eager and   
                   Bruce Galler   Balanced job bound analysis of queueing
                                  networks . . . . . . . . . . . . . . . . 134--141
             P. A. Jacobson and   
                 E. D. Lazowska   Analyzing queueing networks with
                                  simultaneous resource possession . . . . 142--151

Communications of the ACM
Volume 25, Number 3, 1982

               Peter J. Denning   Electronic Junk  . . . . . . . . . . . . 163--165
              John F. Shoch and   
                    Jon A. Hupp   Computing Practices: The `Worm' Programs
                                  --- Early Experience with a Distributed
                                  Computation  . . . . . . . . . . . . . . 172--180
                  Eric A. Weiss   Self-Assessment Procedure IX: a
                                  self-assessment procedure dealing with
                                  ethics in computing  . . . . . . . . . . 181--195
       Anthony I. Wasserman and   
                    Steven Gutz   The Future of Programming  . . . . . . . 196--206
               Edward H. McCall   Performance Results of the Simplex
                                  Algorithm for a Set of Real-World Linear
                                  Programming Models . . . . . . . . . . . 207--212
                  Brian Billard   Corrigendum: ``Polynomial manipulation
                                  with APL'' . . . . . . . . . . . . . . . 213--213

Communications of the ACM
Volume 25, Number 4, 1982

              Marvin L. Watkins   A Technique for Testing Command and
                                  Control Software . . . . . . . . . . . . 228--232
          James G. Mitchell and   
                    Jeremy Dion   A Comparison of Two Network-Based File
                                  Servers  . . . . . . . . . . . . . . . . 233--245
              Alfred Z. Spector   Performing remote operations efficiently
                                  on a local computer network  . . . . . . 246--260
          Andrew D. Birrell and   
                  Roy Levin and   
           Roger M. Needham and   
           Michael D. Schroeder   Grapevine: an exercise in distributed
                                  computing  . . . . . . . . . . . . . . . 260--274
              D. K. Gifford and   
                    A. K. Jones   Cryptographic Sealing for Information
                                  Security and Authentication  . . . . . . 274--286

Communications of the ACM
Volume 25, Number 5, 1982

              William E. Howden   Contemporary Software Development
                                  Environments . . . . . . . . . . . . . . 318--329
                Norihisa Suzuki   Analysis of Pointer ``Rotation'' . . . . 330--335
          Wm. Randolph Franklin   On an Improved Algorithm for
                                  Decentralized Extrema Finding in
                                  Circular Configurations of Processors    336--337
               Richard C. Morey   Estimating and Improving the Quality of
                                  Information in a MIS . . . . . . . . . . 337--342

Communications of the ACM
Volume 25, Number 6, June, 1982

                Michael R. Levy   Modularity and the Sequential File
                                  Update Problem . . . . . . . . . . . . . 362--367
                    D. J. Dodds   Pracniques: Reducing Dictionary Size by
                                  Using a Hashing Technique  . . . . . . . 368--370
                A. Fournier and   
                 D. Fussell and   
                   L. Carpenter   Computer Rendering of Stochastic Models  371--384

Communications of the ACM
Volume 25, Number 7, 1982

                 James W. Brown   Controlling the Complexity of Menu
                                  Networks . . . . . . . . . . . . . . . . 412--418
                 Bertrand Meyer   Principles of Package Design . . . . . . 419--428
                  Greg Kearsley   Authoring Systems in Computer Based
                                  Education  . . . . . . . . . . . . . . . 429--437
           William Swartout and   
                  Robert Balzer   On the Inevitable Intertwining of
                                  Specification and Implementation . . . . 438--440
            Bruce Gilchrist and   
                Arlaana Shenkin   The Impact of Scanners on Employment in
                                  Supermarkets . . . . . . . . . . . . . . 441--445
                    Mark Weiser   Programmers Use Slices When Debugging    446--452
             Dennis Tsichritzis   Form management  . . . . . . . . . . . . 453--478
                   Om Vikas and   
                   V. Rajaraman   Searching in a Dynamic Memory with Fast
                                  Sequential Access  . . . . . . . . . . . 479--484
                    T-Y. Cheung   Estimating Block Accesses and Number of
                                  Records in File Management . . . . . . . 484--487

Communications of the ACM
Volume 25, Number 8, 1982

           James L. Elshoff and   
               Michael Marcotty   Improving Computer Program Readability
                                  to Aid Modification  . . . . . . . . . . 512--521
                    T. N. Turba   Length-segmented lists . . . . . . . . . 522--526
          Robert F. Simmons and   
              Daniel L. Chester   Relating Sentences and Semantic Networks
                                  with Procedural Logic  . . . . . . . . . 527--547
                    T. Berk and   
               L. Brownston and   
                     A. Kaufman   A Human Factors Study of Color Notation
                                  Systems for Computer Graphics  . . . . . 547--550
                M. S. Doyle and   
                   J. W. Graham   A Study of Superfluity in Storage
                                  Hierarchies  . . . . . . . . . . . . . . 550--555
          Clement W. H. Lam and   
             Leonard H. Soicher   Three New Combination Algorithms with
                                  the Minimal Change Property  . . . . . . 555--559
                    Judea Pearl   The Solution for the Branching Factor of
                                  the Alpha-Beta Pruning Algorithm and its
                                  Optimality . . . . . . . . . . . . . . . 559--564
                    Hanan Samet   Heuristics for the Line Division Problem
                                  in Computer Justified Text . . . . . . . 564--571
             Johannes J. Martin   An Efficient Garbage Compaction
                                  Algorithm  . . . . . . . . . . . . . . . 571--581
               B. B. Mandelbrot   Comment on Computer Rendering of Fractal
                                  Stochastic Models  . . . . . . . . . . . 581--584

Communications of the ACM
Volume 25, Number 9, September, 1982

               L. L. Gremillion   Designing a Bloom Filter for
                                  Differential File Access . . . . . . . . 600--604
             Michael A. Pechura   File Archival Techniques Using Data
                                  Compression  . . . . . . . . . . . . . . 605--609
                Ben Shneiderman   Pracniques: Designing Computer System
                                  Messages . . . . . . . . . . . . . . . . 610--611
             Seymour E. Goodman   U.S. Computer Export Control Policies:
                                  Value Conflicts and Policy Choices . . . 613--623
                  David Chapman   A Program Testing Assistant  . . . . . . 625--634
              Yong Tsui Lee and   
       Aristides A. G. Requicha   Algorithms for Computing the Volume and
                                  Other Integral Properties of Solids. I.
                                  Known Methods and Open Issues  . . . . . 635--641
                  Y. T. Lee and   
              A. A. G. Requicha   Algorithms for Computing the Volume and
                                  Other Integral Properties of Solids. II.
                                  A Family of Algorithms Based on
                                  Representation Conversion and Cellular
                                  Approximation  . . . . . . . . . . . . . 642--650
                    Lubomir Bic   A Protection Model and Its
                                  Implementation in a Dataflow System  . . 650--658
            Francis Y. Chin and   
                   John Lam and   
                     I Ngo Chen   Efficient parallel algorithms for some
                                  graph problems . . . . . . . . . . . . . 659--665

Communications of the ACM
Volume 25, Number 10, October, 1982

                    J. F. Isner   A Fortran Programming Methodology based
                                  on Data Abstraction  . . . . . . . . . . 686--698
              Mark L. Gillenson   The State of Practice of Data
                                  Administration--1981 . . . . . . . . . . 699--706
              Lester Lipsky and   
        Chee-Min Henry Lieu and   
       Abolfazl Tehranipour and   
         Appie van de Liefvoort   On the Asymptotic Behavior of
                                  Time-Sharing Systems . . . . . . . . . . 707--714
                 Leland L. Beck   A Dynamic Storage Allocation Technique
                                  Based on Memory Residence Time . . . . . 714--724
                  Jacques Cohen   Computer-assisted microanalysis of
                                  programs . . . . . . . . . . . . . . . . 724--733
            William A. Kornfeld   Combinatorially Implosive Algorithms . . 734--738
              J. Nievergelt and   
                F. P. Preparata   Plane-Sweep Algorithms for Intersecting
                                  Geometric Figures  . . . . . . . . . . . 739--747
                    P. A. Houle   Comment on gamma deviate generation  . . 747--748

Communications of the ACM
Volume 25, Number 11, 1982

             Thomas L. Wicklund   MINI-EXEC: a Portable Executive for
                                  $8$-Bit Microcomputers . . . . . . . . . 772--780
                    E. J. Gauss   Pracniques: The ``Wolf Fence'' Algorithm
                                  for Debugging  . . . . . . . . . . . . . 780
      Jay F. Nunamaker, Jr. and   
           J. Daniel Couger and   
                Gordon B. Davis   Information Systems Curriculum
                                  Recommendations for the 80s:
                                  Undergraduate and Graduate Programs  . . 781--805
            Theodor D. Sterling   Unionization of Professionals in Data
                                  Processing: An Assessment of Recent
                                  Trends . . . . . . . . . . . . . . . . . 807--816
              B. J. Lageweg and   
              J. K. Lenstra and   
           A. H. G. Rinnooy Kan   Computer-Aided Complexity Classification
                                  of Combinatorial Problems  . . . . . . . 817--822
                   W. Y.-P. Lim   HISDL: a structure description language  823--830
               A. M. Langer and   
                     A. W. Shum   The Distribution of Granule Accesses
                                  Made by Database Transactions  . . . . . 831--832
               K. M. Chandy and   
                       J. Misra   Distributed Computation on Graphs:
                                  Shortest Path Algorithms . . . . . . . . 833--837
         Margrethe H. Olson and   
            Henry C. Lucas, Jr.   The Impact of Office Automation on the
                                  Organization: Some Implications for
                                  Research and Practice  . . . . . . . . . 838--847

Communications of the ACM
Volume 25, Number 12, 1982

                  Michael Evans   Software Engineering for the Cobol
                                  Environment  . . . . . . . . . . . . . . 874--882
                 Roger S. Gourd   Self-Assessment Procedure X: a
                                  Self-Assessment Procedure Dealing with
                                  Software Project Management  . . . . . . 883--887
                    Jack Minker   Computer Professionals Whose Scientific
                                  Freedom and Human Rights Have Been
                                  Violated --- 1982  . . . . . . . . . . . 888--894
                        Art Lew   On the Emulation of Flowcharts by
                                  Decision Tables  . . . . . . . . . . . . 895--905
                  I. Gargantini   An Effective Way to Represent Quadtrees  905--910
                   J. S. Vitter   Implementations for Coalesced Hashing    911--926
                M. J. O'Donnell   A Critique of the Foundations of Hoare
                                  Style Programming Logics . . . . . . . . 927--934
                     M. Mor and   
                 A. S. Fraenkel   A Hash Code Method for Detecting and
                                  Correcting Spelling Errors . . . . . . . 935--938
                  C. M. Eastman   A Comment on English Neologisms and
                                  Programming Language Keywords  . . . . . 938--940


Communications of the ACM
Volume 26, Number 1, 1983

                K. Samelson and   
             Friedrich L. Bauer   Sequential Formula Translation (Reprint) 9--13
                 Edgar T. Irons   A Syntax Directed Compiler for ALGOL 60
                                  (Reprint)  . . . . . . . . . . . . . . . 14--16
      Edward H. Sussenguth, Jr.   Use of Tree Structures for Processing
                                  Files (Reprint)  . . . . . . . . . . . . 17--20
             Edsger W. Dijkstra   Solution of a Problem in Concurrent
                                  Programming Control (Reprint)  . . . . . 21--22
              Joseph Weizenbaum   ELIZA --- a Computer Program For the
                                  Study of Natural Language Communication
                                  Between Man And Machine (Reprint)  . . . 23--28
             Jack B. Dennis and   
               Earl C. Van Horn   Programming Semantics for
                                  Multiprogrammed Computations (Reprint)   29--35
                   W. D. Maurer   An Improved Hash Code for Scatter
                                  Storage (Reprint)  . . . . . . . . . . . 36--38
                  Robert Morris   Scatter Storage Techniques (Reprint) . . 39--42
               Peter J. Denning   The Working Set Model for Program
                                  Behaviour (Reprint)  . . . . . . . . . . 43--48
             Edsger W. Dijkstra   The Structure of the
                                  ``THE''-Multiprogramming System
                                  (Reprint)  . . . . . . . . . . . . . . . 49--52
                 C. A. R. Hoare   An Axiomatic Basis for Computer
                                  Programming (Reprint)  . . . . . . . . . 53--56
                     Jay Earley   An Efficient Context-Free Parsing
                                  Algorithm (Reprint)  . . . . . . . . . . 57--61
                  James R. Bell   The Quadratic Quotient Method: a Hash
                                  Code Eliminating Secondary Clustering
                                  (Reprint)  . . . . . . . . . . . . . . . 62--63
                     E. F. Codd   A Relational Model of Data for Large
                                  Shared Data Banks (Reprint)  . . . . . . 64--69
                  Niklaus Wirth   Program Development by Stepwise
                                  Refinement (Reprint) . . . . . . . . . . 70--74
             David Lorge Parnas   A Technique for Software Module
                                  Specification with Examples (Reprint)    75--78
                    H. Kuki and   
                     W. J. Cody   A statistical study of the accuracy of
                                  floating point number systems (Reprint)  79--83
          Dennis M. Ritchie and   
                   Ken Thompson   The UNIX Time-Sharing System (Reprint)   84--89
         Robert M. Metcalfe and   
                 David R. Boggs   Ethernet: Distributed Packet Switching
                                  for Local Computer Networks  . . . . . . 90--95
               R. L. Rivest and   
                  A. Shamir and   
                     L. Adleman   A Method for Obtaining Digital
                                  Signatures and Public-Key Cryptosystems
                                  (Reprint)  . . . . . . . . . . . . . . . 96--99
                 C. A. R. Hoare   Communicating Sequential Processes
                                  (Reprint)  . . . . . . . . . . . . . . . 100--106

Communications of the ACM
Volume 26, Number 2, 1983

                  Ahmed S. Zaki   Regulation of Electronic Funds Transfer:
                                  Impact and Legal Issues  . . . . . . . . 112--118
                    Gordon Bell   The Computer Museum Member's First Field
                                  Trip: The Northbay AN/FSQ7 Sage Site . . 118--119
                        W. Kent   A Simple Guide to Five Normal Forms in
                                  Relational Database Theory . . . . . . . 120--125
                R. Charles Bell   Monte Carlo Debugging: a Brief Tutorial  126--127
                Iris Vessey and   
                      Ron Weber   Some Factors Affecting Program Repair
                                  Maintenance: An Empirical Study  . . . . 128--134
                  B. Srinivasan   On the Synthesis of Decision Tables  . . 135--136
          Michael J. Mathey and   
            Bernard M. E. Moret   The Computational Metaphor and Quantum
                                  Physics  . . . . . . . . . . . . . . . . 137--145
              Arthur I. Schwarz   On File Compression Techniques . . . . . 148--148
                Michael Pechura   On File Compression Techniques: Author's
                                  Response . . . . . . . . . . . . . . . . 148--149

Communications of the ACM
Volume 26, Number 3, March, 1983

                    M. H. Olson   Remote office work: changing work
                                  patterns in space and time . . . . . . . 182--187
             Michael A. Pechura   Comparing Two Microcomputer Operating
                                  Systems: CP/M and HDOS . . . . . . . . . 188--195
                A. Chesnais and   
               Erol Gelenbe and   
                    Isi Mitrani   On the Modeling of Parallel Access to
                                  Shared Data  . . . . . . . . . . . . . . 196--202
               Simon S. Lam and   
                   Y. Luke Lien   A tree convolution algorithm for the
                                  solution of queueing networks  . . . . . 203--215
              Hitohisa Asai and   
                    C. K. Cheng   Speeding Up an Overrelaxation Method of
                                  Division in Radix-$2^n$ Machine  . . . . 216--220

Communications of the ACM
Volume 26, Number 4, April, 1984

                      P. Abrams   Electronic islands . . . . . . . . . . . 241--242
                    P. J. Brown   Error Messages: The Neglected Area of
                                  the Man/Machine Interface? . . . . . . . 246--249
                  Dalia Motzkin   Pracnique: MEANSORT  . . . . . . . . . . 250--251
       Michael L. Schneider and   
                 John C. Thomas   Introduction: The Humanization of
                                  Computer Interfaces  . . . . . . . . . . 252--253
               Donald A. Norman   Design Rules Based on Analyses of Human
                                  Error  . . . . . . . . . . . . . . . . . 254--258
             Robert J. K. Jacob   Using Formal Specifications in the
                                  Design of a Human-Computer Interface . . 259--264
              T. L. Roberts and   
                    T. P. Moran   The Evaluation of Text Editors,
                                  Methodology and Empirical Results  . . . 265--283
           Steven L. Sauter and   
           Mark S. Gottlieb and   
             Karen C. Jones and   
           Vernon N. Dodson and   
              Kathryn M. Rohrer   Job and Health Implications of VDT Use:
                                  Initial results of the Wisconsin--NIOSH
                                  Study  . . . . . . . . . . . . . . . . . 284--294
                J. D. Gould and   
                   J. Conti and   
                   T. Hovanyecz   Composing Letters with a Simulated
                                  Listening Typewriter . . . . . . . . . . 295--308

Communications of the ACM
Volume 26, Number 5, 1983

               T. R. Girill and   
                 Clement H. Luk   Document: An Interactive, Online
                                  Solution to Four Documentation Problems  328--337
            Michael J. Ginzberg   Introduction: Three Papers from the
                                  Third International Conference on
                                  Information Systems  . . . . . . . . . . 339
       Tarek K. Abdel-Hamid and   
              Stuart E. Madnick   The Dynamics of Software Project
                                  Scheduling . . . . . . . . . . . . . . . 340--346
             R. E. A. Mason and   
                    T. T. Carey   Prototyping Interactive Information
                                  Systems  . . . . . . . . . . . . . . . . 347--354
                     H. J. Will   ACL: a Language Specific for Auditors    356--361
              Richard N. Taylor   A General-Purpose Algorithm for
                                  Analyzing Concurrent Programs  . . . . . 362--376
             John Konvalina and   
         Stanley A. Wileman and   
              Larry J. Stephens   Math Proficiency: a Key to Success for
                                  Computer Science Students  . . . . . . . 377--381
                Stephen C. Hora   Estimation of the inverse function for
                                  random variate generation  . . . . . . . 590--594

Communications of the ACM
Volume 26, Number 6, June, 1983

                Stephen A. Cook   An Overview of Computational Complexity  400--408
             Jonathan Jacky and   
                      Ira Kalet   A General Purpose Data Entry Program . . 409--417
                Robert W. Bemer   Coordinated Text and Transparencies  . . 418
            Henry Lieberman and   
                    Carl Hewitt   A Real-Time Garbage Collector Based on
                                  the Lifetimes of Objects . . . . . . . . 419--429
                M. Lynne Markus   Power, Politics, and MIS Implementation  430--444
             H. Rudy Ramsey and   
          Michael E. Atwood and   
             James R. Van Doren   Flowcharts Versus Program Design
                                  Languages: An Experimental Comparison    445--449

Communications of the ACM
Volume 26, Number 7, July, 1983

           David P. Gardner and   
               Yvonne W. Larsen   A Nation At Risk: The Imperative for
                                  Educational Reform, Report by The
                                  National Commission on Excellence in
                                  Education  . . . . . . . . . . . . . . . 467--478
                  Eric A. Weiss   Self-Assessment Procedure XI: a
                                  Self-Assessment Procedure Dealing with
                                  One Part of Early Computing History  . . 479--482
                  D. V. Morland   Human factors guidelines for terminal
                                  interface design . . . . . . . . . . . . 484--494
         Thomas K. Landauer and   
        Kathleen M. Galotti and   
                    S. Hartwell   Natural Command Names and Initial
                                  Learning: a Study of Text-Editing Terms  495--503
                  M.-M. Yau and   
                  S. N. Srihari   A Hierarchical Data Structure for
                                  Multidimensional Digital Images  . . . . 504--515
                 M. Fushimi and   
                      S. Tezuka   The $k$-distribution of Generalized
                                  Feedback Shift Register Pseudorandom
                                  Numbers  . . . . . . . . . . . . . . . . 516--523
           Mark J. Cloutier and   
            Matthew J. Friedman   Precision Averaging for Real-Time
                                  Analysis . . . . . . . . . . . . . . . . 525--529

Communications of the ACM
Volume 26, Number 8, August, 1983

              Jon Louis Bentley   Programming Pearls: Cracking the Oyster  549--552
                William E. Burr   An overview of the proposed American
                                  National Standard for Local Distributed
                                  Data Interfaces  . . . . . . . . . . . . 554--561
                James V. Hansen   Audit Considerations in Distributed
                                  Processing Systems . . . . . . . . . . . 562--569
                James K. Mullin   A Second Look at Bloom Filters . . . . . 570--571
             David Lorge Parnas   A Generalized Control Structure and Its
                                  Formal Definition  . . . . . . . . . . . 572--581
                Frank Milne and   
                      Ron Weber   The Economics of Designing Generalized
                                  Software . . . . . . . . . . . . . . . . 582--589
     Jürgen Peemöller   A correction to Brélaz's modification of
                                  Brown's coloring algorithm . . . . . . . 595--597

Communications of the ACM
Volume 26, Number 9, September, 1983

              Jon Louis Bentley   Programming Pearls: Aha! Algorithms  . . 623--628
                   P. McCorduck   Introduction to the Fifth Generation . . 629--630
                 Paul S. Licker   The Japanese Approach: a Better Way to
                                  Manage Programmers?  . . . . . . . . . . 631--636
                  E. Y. Shapiro   The Fifth Generation Project --- a Trip
                                  Report . . . . . . . . . . . . . . . . . 637--641
                 Rosalie Steier   Cooperation is the Key: An Interview
                                  with B. R. Inman . . . . . . . . . . . . 642--645
                T. Watanabe and   
                  T. Ohsawa and   
                      T. Suzuki   A Simple Database Language for Personal
                                  Computers  . . . . . . . . . . . . . . . 646--653
        Andrew S. Tanenbaum and   
          Hans van Staveren and   
               E. G. Keizer and   
                J. W. Stevenson   A Practical Tool Kit for Making Portable
                                  Compilers  . . . . . . . . . . . . . . . 654--660
            Jeffrey L. Eppinger   An Empirical Study of Insertion and
                                  Deletion in Binary Search Trees  . . . . 663--669
           Ronald Prescott Loui   Optimal Paths in Graphs with Stochastic
                                  or Multidimensional Weights  . . . . . . 670--676
              Piraye Bayman and   
               Richard E. Mayer   A Diagnosis of Beginning Programmers'
                                  Misconceptions of BASIC Programming
                                  Statements . . . . . . . . . . . . . . . 677--679
                       H. Samet   A Quadtree Medial Axis Transform . . . . 680--693

Communications of the ACM
Volume 26, Number 10, October, 1983

              Jon Louis Bentley   Programming Pearls: Data Structures
                                  Programs . . . . . . . . . . . . . . . . 726--730
        Gerardine DeSanctis and   
              James F. Courtney   Toward Friendly User MIS Implementation  732--738
                  Tor Guimaraes   Managing Application Program Maintenance
                                  Expenditures . . . . . . . . . . . . . . 739--746
                    D. A. Comer   A Computer Science Research Network
                                  CSNET: a History and Status Report . . . 747--753
              M. A. Pechura and   
               J. D. Schoeffler   Estimating File Access Time of Floppy
                                  Disks  . . . . . . . . . . . . . . . . . 754--763
                  I. Durham and   
                    D. Lamb and   
                        J. Saxe   Spelling correction in user interfaces   764--773
            Gordon B. Davis and   
                 M. H. Schwartz   Introduction to the Special Section on
                                  Information Systems Management . . . . . 775
              J. F. Rockart and   
                 L. S. Flannery   The Management of End-User Computing . . 776--784
                 Blake Ives and   
         Margrethe H. Olson and   
                Jack J. Baroudi   The Measurement of User Information
                                  Satisfaction . . . . . . . . . . . . . . 785--793
                Beverly K. Kahn   Some Realities of Data Administration    794--799
         John M. Ivancevich and   
           H. Albert Napier and   
              James C. Wetherbe   Occupational Stress, Attitudes, and
                                  Health Problems in the Information
                                  Systems Professionals  . . . . . . . . . 800--806
              Kathryn M. Bartol   Turnover Among DP Personnel: a Causal
                                  Analysis . . . . . . . . . . . . . . . . 807--811

Communications of the ACM
Volume 26, Number 11, November, 1983

                    J. F. Allen   Maintaining Knowledge about Temporal
                                  Intervals  . . . . . . . . . . . . . . . 832--843
                 Wolfgang Bibel   Matings in matrices  . . . . . . . . . . 844--852
             Elliot Soloway and   
              Jeffrey Bonar and   
                   Kate Ehrlich   Cognitive Strategies and Looping
                                  Constructs: An Empirical Study . . . . . 853--860
           Richard J. Miara and   
         Joyce A. Musselman and   
            Juan A. Navarro and   
                Ben Shneiderman   Program Indentation and
                                  Comprehensibility  . . . . . . . . . . . 861--867
             You Dong Liang and   
                Brian A. Barsky   An analysis and algorithm for polygon
                                  clipping . . . . . . . . . . . . . . . . 868--877
              J. T. Postmus and   
       A. H. G. Rinnooy Kan and   
                   G. T. Timmer   An efficient dynamic selection method    878--881
               Russel J. Abbott   Program design by Informal English
                                  Descriptions . . . . . . . . . . . . . . 882--894
             Joep L. W. Kessels   On-the-Fly Optimization of Data
                                  Structures . . . . . . . . . . . . . . . 895--901
                        D. Wile   Program developments: formal
                                  explanations of implementations  . . . . 902--911
                  G. Gonnet and   
                    F. W. Tompa   A constructive approach to the design of
                                  algorithms and their data structures . . 912--920
             James F. Korsh and   
                    Gary Laison   A Multiple-Stack Manipulation Procedure  921--923
            R. Charles Bell and   
                    Bryan Floyd   A Monte Carlo Study of Cichelli
                                  Hash-Function Solvability  . . . . . . . 924--925
        Jack P. C. Kleijnen and   
            Anton J. Van Reeken   Principles of Computer Charging in a
                                  University-Type Organization . . . . . . 926--932
    Antoni Olivé i Ramon   Information Derivability Analysis in
                                  Logical Information Systems  . . . . . . 933--938
            Kyu Young Whang and   
             Gio Wiederhold and   
              Daniel Sagalowicz   Estimating Block Accesses in Database
                                  Organizations: a Closed Noniterative
                                  Formula  . . . . . . . . . . . . . . . . 940--944
                      W. S. Luk   On Estimating Block Accesses in Database
                                  Organizations  . . . . . . . . . . . . . 945--947
                N. Vitalari and   
                     G. Dickson   Problem Solving for Effective Systems
                                  Analysis: An Experimental Exploration    948--956
                   Lee Schruben   Simulation Modeling with Event Graphs    957--963
          George S. Fishman and   
             Bao Sheng D. Huang   Antithetic variates revisited  . . . . . 964--971
          Raymond E. Barber and   
            Henry C. Lucas, Jr.   System Response Time, Operator
                                  Productivity, and Job Satisfaction . . . 972--986
                Ron Dagwell and   
                      Ron Weber   System Designers' User Models: a
                                  Comparative Study and Methodological
                                  Critique . . . . . . . . . . . . . . . . 987--997
           Gabriel M. Silberman   Stack Processing Techniques in
                                  Delayed-Staging Storage Hierarchies  . . 999--1007
                 W. P. Petersen   Vector Fortran for Numerical Problems on
                                  CRAY-1 . . . . . . . . . . . . . . . . . 1008--1021
              Gerard Salton and   
              Edward A. Fox and   
                       Harry Wu   Extended Boolean information retrieval   1022--1036

Communications of the ACM
Volume 26, Number 12, December, 1983

              Jon Louis Bentley   Programming Pearls: Writing Correct
                                  Programs . . . . . . . . . . . . . . . . 1040--1045
                  S. S. Yau and   
              R. W. Ritchie and   
                   W. Semon and   
                   J. Traub and   
                 A. Van Dam and   
                     S. Winkler   Meeting the Crisis in Computer Science   1046--1050
              Perry R. Morrison   A Survey of Attitudes Toward Computers   1051--1057
                Marc Eisenstadt   A User-Friendly Software Environment for
                                  the Novice Programmer  . . . . . . . . . 1058--1064
               P. J. Jalics and   
                   T. S. Heines   Transporting a Portable Operating
                                  System: UNIX to an IBM Minicomputer  . . 1066--1072
               Gaston H. Gonnet   Balancing Binary Trees by Internal Path
                                  Reduction  . . . . . . . . . . . . . . . 1074--1081
          Seiichi Nishihara and   
                   Katsuo Ikeda   Reducing the retrieval time of hashing
                                  method by using predictors . . . . . . . 1082--1088


Communications of the ACM
Volume 27, Number 0, September, 1984

                     J. Bentley   Programming Pearls: Algorithm Design
                                  Techniques . . . . . . . . . . . . . . . 865--871

Communications of the ACM
Volume 27, Number 1, January, 1984

                  J. L. Bentley   Programming Pearls: About the Column . . 12--13
                Gerald M. Berns   Assessing Software Maintainability . . . 14--23
                  John W. Geils   Why Students Reject Engineering Teching
                                  Careers  . . . . . . . . . . . . . . . . 25--27
           Robert I. Winner and   
               Edward M. Carter   Self-Assessment Procedure XII: a
                                  Self-Assessment Procedure Dealing with
                                  Computer Architecture  . . . . . . . . . 29--36
         Peter J. L. Wallis and   
              Brian A. Wichmann   Requirements Analysis for Ada Compilers  37--41
           Victor R. Basili and   
             Barry T. Perricone   Software Errors and Complexity: An
                                  Empirical Investigation  . . . . . . . . 42--52
                 Paul Pritchard   Some Negative Results Concerning Prime
                                  Number Generators  . . . . . . . . . . . 53--57
            Henry C. Lucas, Jr.   Organizational Power and the Information
                                  Services Department  . . . . . . . . . . 58--65

Communications of the ACM
Volume 27, Number 2, February, 1984

              Jon Louis Bentley   Programming Pearls: Code Tuning  . . . . 91--96
              Brian A. Wichmann   Is Ada Too Big? A Designer Answers the
                                  Critics  . . . . . . . . . . . . . . . . 98--103
                    Pamela Zave   The operational versus the conventional
                                  approach to software development . . . . 104--118
                 G. E. Anderson   The Coordinated Use of Five Performance
                                  Evaluation Methodologies . . . . . . . . 119--125
            R. C. Houghton, Jr.   Online Help Systems: a Conspectus  . . . 126--133
              Eric C. R. Hehner   Predicative Programming, Part I  . . . . 134--143
              Eric C. R. Hehner   Predicative Programming, Part II . . . . 144--151
             You Dong Liang and   
                Brian A. Barsky   Corrigendum: ``An analysis and algorithm
                                  for polygon clipping'' . . . . . . . . . 151--151
                 Nicola Santoro   Chain multiplication of matrices of
                                  approximately or exactly the same size   152--156

Communications of the ACM
Volume 27, Number 3, March, 1984

              Jon Louis Bentley   Programming Pearls: The Back of the
                                  Envelope . . . . . . . . . . . . . . . . 180--184
              Gene Dallaire and   
           Fortney H. Stark and   
                    Hal Berghel   Should Congress Provide Special Tax
                                  Incentives for Firms Donating Computers
                                  to Schools?  . . . . . . . . . . . . . . 185--194
             Jean B. Rogers and   
          David G. Moursund and   
                Gerald L. Engel   Preparing Precollege Teachers for the
                                  Computer Age . . . . . . . . . . . . . . 195--200
             Robert W. Blanning   Conversing with Management Information
                                  Systems in Natural Language  . . . . . . 201--207
              Thomas A. D'Auria   ACM's Visit to the People's Republic of
                                  China  . . . . . . . . . . . . . . . . . 208--214
                 Paul J. Jalics   COBOL vs. PL/1: Some Performance
                                  Comparisons  . . . . . . . . . . . . . . 216--221
                  Gerald Bozman   The Software Lookaside Buffer Reduces
                                  Search Overhead with Linked Lists  . . . 222--227
                   Dov Dori and   
               Moshe Ben-Bassat   Efficient nesting of congruent convex
                                  figures  . . . . . . . . . . . . . . . . 228--235
                T. Y. Zhang and   
                     C. Y. Suen   A Fast Parallel Algorithm for Thinning
                                  Digital Patterns . . . . . . . . . . . . 236--239
               George Diehr and   
                  Bruce Faaland   Optimal pagination of B-trees with
                                  variable-length items  . . . . . . . . . 241--247
                Markku Tamminen   Comments on quad- and octtrees . . . . . 248--249

Communications of the ACM
Volume 27, Number 4, April, 1984

              Jon Louis Bentley   Programming Pearls: How to Sort  . . . . 287--291
                  Gene Dallaire   American Universities Need Greater
                                  Access to Supercomputers . . . . . . . . 293--298
                Edward F. Hayes   Access to Supercomputers: An NSF
                                  Perspective (Interview)  . . . . . . . . 299--303
                      Anonymous   Coping with the imprecision of the real
                                  world. An interview with Lotfi A. Zadeh  304--311
           Peter J. Denning and   
             Donn B. Parker and   
             Susan H. Nycum and   
                 Willis H. Ware   Computers, Crime and Privacy --- a
                                  National Dilema, Congressional Testimony
                                  from the Industry  . . . . . . . . . . . 312--321
                Allen B. Tucker   A Perspective on Machine Translation:
                                  Theory and Practice  . . . . . . . . . . 322--329
          Michael C. Mulder and   
                John F. Dalphin   Computer Science Program Requirements
                                  and Accreditation, An Interim Report of
                                  the ACM/IEEE Computer Society Joint Task
                                  Force  . . . . . . . . . . . . . . . . . 330--335
             Jean E. Sammet and   
                   Bernard Rous   Special Report: Progress Report on the
                                  ACM Guide to Computing Literature  . . . 336--341
               Peter G. Neumann   A Further View of the First Quarter
                                  Century: Introduction to the April 1984
                                  Special Section  . . . . . . . . . . . . 343
                Donald E. Knuth   The Complexity of Songs (April 1984
                                  Special Section) . . . . . . . . . . . . 344--348
              R. Lawrence Clark   A Linuistic Contribution to Goto-Less
                                  Programming (April 1984 Special Section) 349--350
           Preet J. Nedginn and   
                Trebor L. Bworn   CLOG: An Ada Package for Automatic
                                  Footnote Generation in UNIX (April 1984
                                  Special Section) . . . . . . . . . . . . 351
                    P. J. Brown   Languages: Three Interviews (April 1984
                                  Special Section) . . . . . . . . . . . . 352--355
    J. B. Cadwallader-Cohen and   
                W. W. Zysic and   
                 R. B. Donnelly   The Chaostron: An Important Advance in
                                  Learning Machines (April 1984 Special
                                  Section) . . . . . . . . . . . . . . . . 356--357
              J. J. Pollock and   
                      A. Zamora   Automatic spelling correction in
                                  scientific and scholarly text  . . . . . 358--368
                 David C. Blair   The Data-Document Distinction in
                                  Information Retrieval  . . . . . . . . . 369--374
              Izak Benbasat and   
                      Yair Wand   Command abbreviation behavior in
                                  human-computer interaction . . . . . . . 376--383
             You Dong Liang and   
                Brian A. Barsky   Corrigendum: ``An analysis and algorithm
                                  for polygon clipping'' . . . . . . . . . 383
                    C. C. Chang   The Study of an Ordered Minimal Perfect
                                  Hashing Scheme . . . . . . . . . . . . . 384--387
             Dorothy E. Denning   Digital Signatures with RSA and Other
                                  Public-Key Cryptosystems . . . . . . . . 388--392
           Ronald L. Rivest and   
                     Adi Shamir   How to Expose an Eavesdropper  . . . . . 393--395

Communications of the ACM
Volume 27, Number 5, May, 1984

              Jon Louis Bentley   Programming Pearls: Squeezing Space  . . 416--421
               Robert L. Graham   The Legal Protection of Computer
                                  Software . . . . . . . . . . . . . . . . 422--426
            Richard V. Giddings   Accommodating Uncertainty in Software
                                  Design . . . . . . . . . . . . . . . . . 428--434
                 Gopal K. Gupta   Self-Assessment Procedure XIII: a
                                  Self-Assessment Procedure Dealing with
                                  Binary Trees and B-Trees . . . . . . . . 435--443
                Ben Tsutom Wada   A Virtual Memory System for Picture
                                  Processing . . . . . . . . . . . . . . . 444--454
                 Gerard D. Finn   An Algorithm for Optimized Boolean
                                  Evaluation in Information Management
                                  Systems  . . . . . . . . . . . . . . . . 455--464
           John Leslie King and   
             Kenneth L. Kraemer   Evolution and Organizational Information
                                  Systems: An Assessment of Nolan's Stage
                                  Model  . . . . . . . . . . . . . . . . . 466--475
              Izak Benbasat and   
           Albert S. Dexter and   
            Donald H. Drury and   
            Robert C. Goldstein   A Critique of the Stage Hypothesis:
                                  Theory and Empirical Evidence  . . . . . 476--485
               R. A. Becker and   
                 J. M. Chambers   Design of the S System for Data Analysis 486--495

Communications of the ACM
Volume 27, Number 6, June, 1984

              Jon Louis Bentley   Programming Pearls: Graphic Output . . . 529--536
              Gene Dallaire and   
              John Shattuck and   
            Richard P. Kusserow   Computer Matching: Should It Be Banned?  537--545
                    J. Shattuck   Computer Matching is a Serious Threat to
                                  Individual Rights  . . . . . . . . . . . 538
                 R. P. Kusserow   The Government Needs Computer Matching
                                  to Root Out Waste and Fraud  . . . . . . 542
                 Larry Fujitani   Laser Optical Disk: The Coming
                                  Revolution in On-Line Storage  . . . . . 546--554
                       M. Alavi   An Assessment of the Prototyping
                                  Approach to Information Systems
                                  Development  . . . . . . . . . . . . . . 556--563
             Anthony I. Hinxman   Updating a Database in an Unsafe
                                  Environment  . . . . . . . . . . . . . . 564--566
              E. P. Glinert and   
                   R. E. Ladner   A large font virtual terminal interface:
                                  a software prosthesis for the visually
                                  impaired . . . . . . . . . . . . . . . . 567--572
            Robert Wilensky and   
                Yigal Arens and   
                  David N. Chin   Talking to UNIX in English: An Overview
                                  of UC  . . . . . . . . . . . . . . . . . 574--593
              Eric C. R. Hehner   Corrigendum: ``Predicative programming.
                                  I, II''  . . . . . . . . . . . . . . . . 593--593
                Donald E. Knuth   Corrigendum: ``The complexity of songs'' 593--593
              Ten Hwang Lai and   
                   Sartaj Sahni   Anomalies in Parallel Branch-and-Bound
                                  Algorithms . . . . . . . . . . . . . . . 594--602

Communications of the ACM
Volume 27, Number 7, July, 1984

              Jon Louis Bentley   Programming Pearls: Updates  . . . . . . 630--636
                 Rosalie Steier   An MCC Update  . . . . . . . . . . . . . 636--637
                      Anonymous   Computer Graphics Comes of Age, An
                                  Interview with Andries van Dam . . . . . 638--648
                 D. Gifford and   
                     A. Spector   The TWA Reservation System . . . . . . . 649--669
       Per-Åke Larson and   
                     Ajay Kajla   File Organization: Implementation of a
                                  Method Guaranteeing Retrieval in One
                                  Access . . . . . . . . . . . . . . . . . 670--677
               John Kaunitz and   
                Louis van Ekert   Audit Trail Compaction for Database
                                  Recovery . . . . . . . . . . . . . . . . 678--683
                   R. B. Tilove   A Null-Object Detection Algorithm for
                                  Constructive Solid Geometry  . . . . . . 684--694
                  Hsi Chang and   
           S. Sitharama Iyengar   Efficient Algorithms to Globally Balance
                                  a Binary Search Tree . . . . . . . . . . 695--702
           Jeffrey Scott Vitter   Faster Methods for Random Sampling . . . 703--718

Communications of the ACM
Volume 27, Number 8, August, 1984

                Y. M. Babad and   
                   J. F. Hoffer   Even No Data Has a Value . . . . . . . . 748--756
              Dennis M. Ritchie   Reflections on Software Research . . . . 758--760
                   Ken Thompson   Reflections on Trusting Trust  . . . . . 761--763
              Nazim H. Madhavji   Visibility Aspects of Programmed Dyamic
                                  Data Structures  . . . . . . . . . . . . 764--776
               James A. Haskett   Pass-Algorithms: a User Validation
                                  Scheme Based on Knowledge of Secret
                                  Algorithms . . . . . . . . . . . . . . . 777--781
               Douglas W. Jones   Improved Interpretation of UNIX-Like
                                  File Names Embedded in Data  . . . . . . 782--784
            H. M. Markowitz and   
                A. Malhotra and   
                    D. P. Pazel   The EAS-E Application Development
                                  System: Principles and Language Summary  785--799
            John M. Carroll and   
            Caroline Carrithers   Training Wheels in a User Interface  . . 800--806
             D. R. K. Brownrigg   The Weighted Median Filter . . . . . . . 807--818
            D. Julian M. Davies   Memory Occupancy Patterns in Garbage
                                  Collection Systems . . . . . . . . . . . 819--825
              Lee L. Gremillion   Determinants of Program Repair
                                  Maintenance Requirements . . . . . . . . 826--832

Communications of the ACM
Volume 27, Number 9, September, 1984

              Jon Louis Bentley   Programming Pearls: Algorithm Design
                                  Techniques . . . . . . . . . . . . . . . 865--871
           David K. Gifford and   
              Alfred Z. Spector   The Space Shuttle Primary Computer
                                  System . . . . . . . . . . . . . . . . . 872--900
                 A. Spector and   
                     D. Gifford   The Space Shuttle Primary Computer
                                  System . . . . . . . . . . . . . . . . . 874--900
                  Edward Ng and   
                Paul B. Schneck   Introduction to the Special Section on
                                  Computing in Space . . . . . . . . . . . 901
       Charles E. Trevathan and   
           Thomas D. Taylor and   
     Raymond G. Hartenstein and   
           Ann. C. Merwarth and   
             William N. Stewart   Development and Application of NASA's
                                  First Standard Spacecraft Computer . . . 902--913
          William A. Madden and   
                   Kyle Y. Rone   Design, Development, Integration: Space
                                  Shuttle Primary Flight Software System   914--925
                   G. D. Carlow   Architecture of the Space Shuttle
                                  Primary Avionics Software System . . . . 926--937
                   Hassan Gomaa   A Software Design Method for Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 938--949
                  Tim Maude and   
                  Derwent Maude   Hardware Protection Against Software
                                  Piracy . . . . . . . . . . . . . . . . . 950--959
                 M. D. Good and   
            J. A. Whiteside and   
                D. R. Wixon and   
                    S. J. Jones   Building a user-derived interface  . . . 1032--1043

Communications of the ACM
Volume 27, Number 10, 1984

                   Jean Ichbiah   Ada: Past, Present, Future, An Interview
                                  with Jean Ichbiah, the Principle
                                  Designer of Ada  . . . . . . . . . . . . 990--997
          Elliot B. Koffman and   
           Philip L. Miller and   
             Caroline E. Wardle   Recommended Curriculum for CS1, 1984 . . 998--1001
                Anthony Ralston   The First Course in Computer Science
                                  Needs a Mathematical Corequisite . . . . 1002--1009
           Robert L. Ashenhurst   A Conference on Information Law and
                                  Ethics . . . . . . . . . . . . . . . . . 1006--1007
              C. M. Krishna and   
               Kang G. Shin and   
                  Yann-Hang Lee   Optimization Criteria for Checkpoint
                                  Placement  . . . . . . . . . . . . . . . 1008--1012
               Reinhold Weicker   DHRYSTONE: a Synthetic Systems
                                  Programming Benchmark  . . . . . . . . . 1013--1030
                  Robert Marcus   An Application of Artificial
                                  Intelligence to Operations Research  . . 1044--1047

Communications of the ACM
Volume 27, Number 11, November, 1984

              Jon Louis Bentley   Programming Pearls: Perspective on
                                  Performance  . . . . . . . . . . . . . . 1087--1092
       Patricia F. Campbell and   
               George P. McCabe   Predicting the Success of Freshmen in a
                                  Computer Science Major . . . . . . . . . 1108--1113
          Walter M. Mathews and   
                   Kaye Reifers   The Computer in Cartoons: a
                                  Retrospective from the Saturday Review   1114--1119
           Robert S. Arnold and   
     Norman F. Schneidewind and   
            Nicholas Zvegintzov   A Software Maintenance Workshop  . . . . 1120--1121
               Larry R. Medsker   An Interactive Decision Support System
                                  for Energy Policy Analysis . . . . . . . 1122--1128
            James V. Hansen and   
             William F. Messier   A Relational Approach to Decision
                                  Support for EDP Auditing . . . . . . . . 1129--1133
              Leslie G. Valiant   A Theory of the Learnable  . . . . . . . 1134--1142
                 Tim Hickey and   
                  Jacques Cohen   Performance Analysis of On-the-Fly
                                  Garbage Collection . . . . . . . . . . . 1143--1154

Communications of the ACM
Volume 27, Number 12, December, 1984

              Jon Louis Bentley   Programming Pearls: a Little Program, a
                                  Lot of Fun . . . . . . . . . . . . . . . 1179--1182
                Gordon B. Davis   Selected Papers from the Fifth
                                  International Conference on Information
                                  Systems --- Introduction . . . . . . . . 1183
              Paul Attewell and   
                     James Rule   Computing and Organizations: What We
                                  Know and What We Don't Know  . . . . . . 1184--1192
                 Blake Ives and   
            Gerard P. Learmonth   The Information System as a Competitive
                                  Weapon . . . . . . . . . . . . . . . . . 1193--1201
           Charles R. Franz and   
                   Daniel Robey   An Investigation of User-Led System
                                  Design: Rational and Political
                                  Perspectives . . . . . . . . . . . . . . 1202--1209
                     Jon Turner   Computer Mediated Work: The Interplay
                                  Between Technology and Structured Jobs   1210--1217
                  Rob Kling and   
                 Suzanne Iacono   The Control of Information Systems
                                  Developments after Implementation  . . . 1218--1226
                    J. D. Litke   An improved solution to the traveling
                                  salesman problem with thousands of nodes 1227--1236
              Richard B. Wilmot   Foreign Keys Decrease Adaptability of
                                  Database Designs . . . . . . . . . . . . 1237--1243


Communications of the ACM
Volume 28, Number 4, 1984

                Stephen Wolfram   Special Section on Computing at the
                                  Frontiers of Theoretical Physics ---
                                  Introduction . . . . . . . . . . . . . . 352--353
                W. David Arnett   Computational Astrophysics . . . . . . . 354--357
                     B. Lautrup   Monte Carlo Methods in Theoretical
                                  High-Energy Physics  . . . . . . . . . . 358--362
          Scott Kirkpatrick and   
             Robert H. Swendsen   Statistical Mechanics and Disordered
                                  Systems  . . . . . . . . . . . . . . . . 363--373
             David Campbell and   
            Jim Crutchfield and   
               Doyne Farmer and   
                      Erica Jen   Experimental Mathematics: The Role of
                                  Computation in Nonlinear Science . . . . 374--384
          Robert B. Pearson and   
         John L. Richardson and   
                 Doug Toussaint   Special-Purpose Processors in
                                  Theoretical Physics  . . . . . . . . . . 385--389
                Stephen Wolfram   Symbolic Mathematical Computation  . . . 390--394
            Roger L. Wainwright   A Class of Sorting Algorithms Based on
                                  Quicksort  . . . . . . . . . . . . . . . 396--403
          Jon Louis Bentley and   
           Catherine C. McGeoch   Amortized Analyses of Self-Organizing
                                  Sequential Search Heuristics . . . . . . 404--411
               Marek Kubale and   
             Boguslaw Jackowski   A Generalized Implicit Enumeration
                                  Algorithm for Graph Coloring . . . . . . 412--418


Communications of the ACM
Volume 30, Number 4, 1984

          Jon Louis Bentley and   
David Gries (special guest oyster)   Programming Pearls: Abstract Data Types  284--290
          Alfred Z. Spector and   
               David K. Gifford   Case Study: IBM's System/360--370
                                  Architecture . . . . . . . . . . . . . . 291--307
            Phillip Ein-Dor and   
               Jacob Feldmesser   Attributes of the Performance of Central
                                  Processing Units: a Relative Performance
                                  Prediction Model . . . . . . . . . . . . 308--317
           Jorge L. C. Sanz and   
           Irs'hak Dinstein and   
              Dragutin Petkovic   Computing Multi-Colored Polygonal Masks
                                  in Pipeline Architectures and Its
                                  Application to Automated Visual
                                  Inspection . . . . . . . . . . . . . . . 318--329


Communications of the ACM
Volume 28, Number 1, 1985

               Peter J. Denning   Special Section on Computer Architecture
                                  --- Introduction . . . . . . . . . . . . 6--7
             David A. Patterson   Reduced instruction set computers  . . . 8--21
               Charles L. Seitz   The cosmic cube  . . . . . . . . . . . . 22--33
                 J. R. Gurd and   
              C. C. Kirkham and   
                      I. Watson   The Manchester Prototype Dataflow
                                  Computer . . . . . . . . . . . . . . . . 34--52
             Jean E. Sammet and   
               Robert W. Rector   In recognition of the 25th anniversary
                                  of Computing Reviews: selected reviews
                                  1960--1984 . . . . . . . . . . . . . . . 53--68
                    Jack Minker   Computer professionals whose scientific
                                  freedom and human rights have been
                                  violated --- 1984: a report of the ACM
                                  committee on scientific freedom and
                                  human rights . . . . . . . . . . . . . . 69--78
                R. E. Berry and   
              B. A. E. Meekings   A style analysis of C programs . . . . . 80--88
                   John C. Nash   Design and implementation of a very
                                  small linear algebra program package . . 89--94
               Susan M. Merritt   An inverted taxonomy of sorting
                                  algorithms . . . . . . . . . . . . . . . 96--99

Communications of the ACM
Volume 28, Number 2, February, 1985

              Jon Louis Bentley   Programming Pearls: Tricks of the Trade  138--141
                Phillip Ein-Dor   Grosch's law re-revisited: CPU power and
                                  the cost of computation  . . . . . . . . 142--151
                Ronald S. Lemos   Rating the major computing periodicals
                                  on readability . . . . . . . . . . . . . 152--157
                  Niklaus Wirth   From programming language design to
                                  computer construction  . . . . . . . . . 160--164
         Bernard C. Reimann and   
                 Allan D. Waren   User-oriented criteria for the selection
                                  of DSS software  . . . . . . . . . . . . 166--179
 Stephen José Hanson and   
            Richard R. Rosinski   Programmer perceptions of productivity
                                  and programming tools  . . . . . . . . . 180--189
      C. Michael Overstreet and   
               Richard E. Nance   A specification language to assist in
                                  analysis of discrete event simulation
                                  models . . . . . . . . . . . . . . . . . 190--201
          Daniel D. Sleator and   
               Robert E. Tarjan   Amortized Efficiency of List Update and
                                  Paging Rules . . . . . . . . . . . . . . 202--208

Communications of the ACM
Volume 28, Number 3, March, 1985

              Jon Louis Bentley   Programming Pearls: Thanks, Heaps  . . . 245--250
               James Martin and   
        Philip A. Bernstein and   
           Peter J. Denning and   
       Michael L. Dertouzos and   
              Leonard Kleinrock   Computer Science Education Today: a
                                  Dialogue . . . . . . . . . . . . . . . . 251--262
               James Martin and   
              Leonard Kleinrock   Excerpts from: An Information Systems
                                  Manifesto  . . . . . . . . . . . . . . . 252--255
              D. F. Butcher and   
                     W. A. Muth   Predicting performance in an
                                  introductory computer science course . . 263--268
                   A. J. Turner   Computer science in secondary schools:
                                  curriculum and teacher certification . . 269--279
              Ian H. Witten and   
                   Bob Bramwell   A system for interactive viewing of
                                  structured documents . . . . . . . . . . 280--288
             David C. Blair and   
                    M. E. Maron   An Evaluation of Retrieval Effectiveness
                                  for a Full-Text Document-Retrieval
                                  System . . . . . . . . . . . . . . . . . 285--299
              John D. Gould and   
                  Clayton Lewis   Designing for usability: key principles
                                  and what designers think . . . . . . . . 300--311
                 Haim Mendelson   Pricing computer services: queueing
                                  effects  . . . . . . . . . . . . . . . . 312--321

Communications of the ACM
Volume 28, Number 4, April, 1985

                   W. D. Arnett   Computational astrophysics . . . . . . . 354--357
                     B. Lautrup   Monte Carlo methods in theoretical
                                  high-energy physics  . . . . . . . . . . 358--362
          Scott Kirkpatrick and   
             Robert H. Swendsen   Statistical Mechanics and Disordered
                                  Systems  . . . . . . . . . . . . . . . . 363--373
             David Campbell and   
            Jim Crutchfield and   
               Doyne Farmer and   
                      Erica Jen   Experimental mathematics: the role of
                                  computation in nonlinear science . . . . 374--384
          Robert B. Pearson and   
         John L. Richardson and   
                 Doug Toussaint   Special-purpose processors in
                                  theoretical physics  . . . . . . . . . . 385--389
                Stephen Wolfram   Symbolic Mathematical Computation  . . . 390--394
            Roger L. Wainwright   A class of sorting algorithms based on
                                  Quicksort  . . . . . . . . . . . . . . . 396--402
             Jon L. Bentley and   
           Catherine C. McGeoch   Amortized analyses of self-organizing
                                  sequential search heuristics . . . . . . 404--411
               Marek Kubale and   
             Boguslaw Jackowski   A generalized implicit enumeration
                                  algorithm for graph coloring . . . . . . 412--418

Communications of the ACM
Volume 28, Number 5, May, 1985

              Jon Louis Bentley   Programming Pearls: a Spelling Checker   456--462
                 Michael Conrad   On design principles for a molecular
                                  computer . . . . . . . . . . . . . . . . 464--480
             Jane P. Devlin and   
          William A. Lowell and   
                  Anne E. Alger   Self-Assessment Procedure XIV: a
                                  self-assessment procedure dealing with
                                  the legal issues of computing  . . . . . 481--488
                John Tartar and   
                Bruce Arden and   
               Taylor Booth and   
              Peter Denning and   
                 Ray Miller and   
                Andries van Dam   The 1984 Snowbird Report: future issues
                                  in computer science  . . . . . . . . . . 490--493
                  Tor Guimaraes   A study of application program
                                  development techniques . . . . . . . . . 494--499
                 Jack Gostl and   
                Irwin Greenberg   An application of queueing theory to the
                                  design of a message-switching computer
                                  system . . . . . . . . . . . . . . . . . 500--505
        Rodney R. Oldehoeft and   
               Stephen J. Allan   Adaptive exact-fit storage management    506--511
       Nicholas P. Vitalari and   
           Alladi Venkatesh and   
                 Kjell Gronhaug   Computing in the home: shifts in the
                                  time allocation patterns of households   512--522
                Thomas J. Sager   A Polynomial Time Generator for Minimal
                                  Perfect Hash Functions . . . . . . . . . 523--532

Communications of the ACM
Volume 28, Number 6, June, 1985

              Jon Louis Bentley   Programming Pearls: Associative Arrays   570--576
               Karen A. Frenkel   Toward automating the
                                  software-development cycle . . . . . . . 578--589
                 P.-J. Courtois   On time and space decomposition of
                                  complex structures . . . . . . . . . . . 590--603
               John Beidler and   
         Richard H. Austing and   
              Lillian N. Cassel   Computing programs in small colleges . . 605--611
          David R. McIntyre and   
             Michael A. Pechura   Data compression using static Huffman
                                  code-decode tables . . . . . . . . . . . 612--616
                Leonard J. Bass   A generalized user interface for
                                  applications programs (II) . . . . . . . 617--627
           Alan W. Biermann and   
           Robert D. Rodman and   
             David C. Rubin and   
            J. Francis Heidlage   Natural language with discrete speech as
                                  a mode for human-to-machine  . . . . . . 628--636
                Shimon Even and   
             Oded Goldreich and   
                 Abraham Lempel   A randomized protocol for signing
                                  contracts  . . . . . . . . . . . . . . . 637--647

Communications of the ACM
Volume 28, Number 7, July, 1985

              Jon Louis Bentley   Programming Pearls: Confessions of a
                                  Coder  . . . . . . . . . . . . . . . . . 671--679
        Starr Roxanne Hiltz and   
                  Murray Turoff   Structuring Computer-Mediated
                                  Communication Systems to Avoid
                                  Information Overload . . . . . . . . . . 680--689
                    Mark Stefik   Strategic computing at DARPA: overview
                                  and assessment . . . . . . . . . . . . . 690--704
                Robert Papsdorf   A Prescription for Computer Anxiety ---
                                  Review of John Shore's ``The Sachertorte
                                  Algorithm''  . . . . . . . . . . . . . . 704--706
                  John A. Mills   A pragmatic view of the system architect 708--717
          Václav Rajlich   Paradigms for design and implementation
                                  in ADA . . . . . . . . . . . . . . . . . 718--727
              Kenneth C. Laudon   Environmental and institutional models
                                  of system development: a national
                                  criminal history system  . . . . . . . . 728--740
                W. David Kelton   Transient exponential-Erlang queues and
                                  steady-state simulation  . . . . . . . . 741--749

Communications of the ACM
Volume 28, Number 8, August, 1985

                    Mark Stefik   Corrigendum: ``Strategic Computing at
                                  DARPA: Overview and Assessment'' . . . . 788--788
              David Gifford and   
                 Alfred Spector   The CIRRUS banking network . . . . . . . 798--807
               Karen A. Frenkel   Report on the microelectronics and
                                  computer technology corporation
                                  conference . . . . . . . . . . . . . . . 808--813
          Elliot B. Koffman and   
              David Stemple and   
             Caroline E. Wardle   Recommended curriculum for CS2, 1984: a
                                  report of the ACM curriculum task force
                                  for CS2  . . . . . . . . . . . . . . . . 815--818
              J. M. Shearer and   
                    M. A. Wolfe   ALGLIB, a simple symbol-manipulation
                                  package  . . . . . . . . . . . . . . . . 820--825
                 Henry C. Smith   Database design: composing fully
                                  normalized tables from a rigorous
                                  dependency diagram . . . . . . . . . . . 826--838
          Dianne P. O'Leary and   
                  G. W. Stewart   Data-flow algorithms for parallel matrix
                                  computation  . . . . . . . . . . . . . . 840--853
              L. L. Larmore and   
               D. S. Hirschberg   Efficient optimal pagination of scrolls  854--856

Communications of the ACM
Volume 28, Number 9, September, 1985

              Jon Louis Bentley   Programming Pearls: Bumper-Sticker
                                  Computer Science . . . . . . . . . . . . 896--901
                Peter Friedland   Special section on architectures for
                                  knowledge-based systems  . . . . . . . . 902--903
              Richard Fikes and   
                     Tom Kehler   The Role of Frame-Based Representation
                                  in Reasoning . . . . . . . . . . . . . . 904--920
           Frederick Hayes-Roth   Rule-based systems . . . . . . . . . . . 921--932
      Michael R. Genesereth and   
            Matthew L. Ginsberg   Logic programming  . . . . . . . . . . . 933--941
                   J. Gutknecht   Concepts of the text editor Lara . . . . 942--960
                 Gerard D. Finn   Extended use of null productions in
                                  LR(1) parser applications  . . . . . . . 961--972
                    Hanan Samet   Data structures for quadtree
                                  approximation and compression  . . . . . 973--993
            James R. Slagle and   
                Henry Hamburger   An expert system for a resource
                                  allocation problem . . . . . . . . . . . 994--1004

Communications of the ACM
Volume 28, Number 10, October, 1985

                    David Chaum   Security without identification:
                                  transaction systems to make big brother
                                  obsolete . . . . . . . . . . . . . . . . 1030--1044
                  Gad Ariav and   
            Michael J. Ginzberg   DSS design: a systemic view of decision
                                  support  . . . . . . . . . . . . . . . . 1045--1052
                   Robert Mandl   Orthogonal Latin squares: an application
                                  of experiment design to compiler testing 1054--1058
                      Bo Sanden   Systems programming with JSP: example
                                  --- a VDU controller . . . . . . . . . . 1059--1067
               R. M. Norton and   
                   D. P. Yeager   A Probability Model for Overflow
                                  Sufficiency in Small Hash Tables . . . . 1068--1075
                   Raj Jain and   
                Imrich Chlamtac   The $P^2$ Algorithm for Dynamic
                                  Calculation of Quantiles and Histograms
                                  Without Storing Observations . . . . . . 1076--1085

Communications of the ACM
Volume 28, Number 11, November, 1985

              Jon Louis Bentley   Programming Pearls: Selection  . . . . . 1121--1127
           Peter J. Denning and   
              Michael C. Mulder   Computing in the Frontiers of Science
                                  and Engineering --- Introduction . . . . 1128--1129
               Michael R. Raugh   Modeling California earthquakes and
                                  earth structures . . . . . . . . . . . . 1130--1150
              D. K. Cullers and   
           Ivan R. Linscott and   
              Bernard M. Oliver   Signal processing in SETI  . . . . . . . 1151--1163
            Peter Friedland and   
              Laurence H. Kedes   Discovering the secrets of DNA . . . . . 1164--1186
           Alan B. Chambers and   
                 David C. Nagel   Pilots of the future: human or computer? 1187--1199
              Leonard Kleinrock   Distributed systems  . . . . . . . . . . 1200--1213
           Edward Balkovich and   
              Steven Lerman and   
            Richard P. Parmelee   Computing in higher education: the
                                  Athena experience  . . . . . . . . . . . 1214--1224
               Joel S. Birnbaum   Toward the domestication of
                                  microelectronics . . . . . . . . . . . . 1225--1235

Communications of the ACM
Volume 28, Number 12, December, 1985

               Alain Colmerauer   Prolog in 10 figures . . . . . . . . . . 1296--1310
                  Jacques Cohen   Describing Prolog by its interpretation
                                  and compilation  . . . . . . . . . . . . 1311--1324
             David Lorge Parnas   Software aspects of strategic defense
                                  systems  . . . . . . . . . . . . . . . . 1326--1335
              Gordon V. Cormack   Data compression on a database system    1336--1342
               J. D. McKeen and   
                  Tor Guimaraes   Selecting MIS projects by steering
                                  committee  . . . . . . . . . . . . . . . 1344--1352


Communications of the ACM
Volume 29, Number 1, January, 1986

              Kenneth C. Laudon   Data quality and due process in large
                                  interorganizational record systems . . . 4--11
             Jason L. Frand and   
              Ephraim R. McLean   Summary of the second annual UCLA survey
                                  of business school computer usage  . . . 12--18
  Jean-Pierre Banâtre and   
       Michel Banâtre and   
                Guy Lapalme and   
             Florimond Ployette   The design and building of Ench\`ere, a
                                  distributed electronic marketing system  19--29
                  Mike Heck and   
                  Martin Plaehn   A workstation model for an interactive
                                  graphics system  . . . . . . . . . . . . 30--37
                Gordon B. Davis   Selected papers from the sixth
                                  international conference on information
                                  systems  . . . . . . . . . . . . . . . . 39--39
            Gary W. Dickson and   
        Gerardine DeSanctis and   
                  D. J. McBride   Understanding the effectiveness of
                                  computer graphics for decision support:
                                  a cumulative experimental approach . . . 40--47
                Iris Vessey and   
                      Ron Weber   Structured tools and conditional logic:
                                  an empirical investigation . . . . . . . 48--57

Communications of the ACM
Volume 29, Number 2, February, 1986

              Jon Louis Bentley   Programming Pearls: Cutting the Gordian
                                  Knot . . . . . . . . . . . . . . . . . . 92--96
                Richard M. Karp   Combinatorics, complexity, and
                                  randomness . . . . . . . . . . . . . . . 98--109
                  Karen Frenkel   Piecing together complexity  . . . . . . 110--111
               Karen A. Frenkel   Complexity and parallel processing: an
                                  interview with Richard Karp  . . . . . . 112--117
          Simon L. Peyton Jones   Parsing Distfix Operators  . . . . . . . 118--122
            Warren Harrison and   
                 Curtis R. Cook   A note on the Berry-Meekings style
                                  metric . . . . . . . . . . . . . . . . . 123--125
               K. A. Redish and   
                    W. F. Smyth   Program style analysis: a natural
                                  by-product of program compilation  . . . 126--133
                 D. Yun Yeh and   
             Toshinori Munakata   Dynamic initial allocation and local
                                  reallocation procedures for multiple
                                  stacks . . . . . . . . . . . . . . . . . 134--141
          Carol S. Saunders and   
             Richard W. Scamell   Organizational power and the information
                                  services department: a reexamination . . 142--147

Communications of the ACM
Volume 29, Number 3, March, 1986

                  J. L. Bentley   Programming Pearls: The Envelope is Back 176--182
            James H. Morris and   
     Mahadev Satyanarayanan and   
          Michael H. Conner and   
             John H. Howard and   
         David S. Rosenthal and   
              F. Donelson Smith   Andrew: a Distributed Personal Computing
                                  Environment  . . . . . . . . . . . . . . 184--201
            Norman E. Gibbs and   
                Allen B. Tucker   A Model Curriculum for a Liberal Arts
                                  Degree in Computer Science . . . . . . . 202--210
               Sumit Sircar and   
                    Dinesh Dave   The relationship between benchmark tests
                                  and microcomputer price  . . . . . . . . 212--217
          Philip J. Fleming and   
                John J. Wallace   How not to lie with statistics: the
                                  correct way to summarize benchmark
                                  results  . . . . . . . . . . . . . . . . 218--221
              Donald Golden and   
                Michael Pechura   The structure of microcomputer file
                                  systems  . . . . . . . . . . . . . . . . 222--230
                 Gary Lindstrom   Elliott I. Organick (1925--1985) . . . . 231--231
            Jack J. Baroudi and   
         Margrethe H. Olson and   
                     Blake Ives   An empirical study of the impact of user
                                  involvement on system usage and
                                  information satisfaction . . . . . . . . 232--238
              H. E. Lü and   
                  P. S. P. Wang   A Comment on ``A Fast Parallel Algorithm
                                  for Thinning Digital Patterns''  . . . . 239--242

Communications of the ACM
Volume 29, Number 4, April, 1986

             Alfred Spector and   
                  David Gifford   A computer science perspective of bridge
                                  design . . . . . . . . . . . . . . . . . 267--283
               Karen A. Frenkel   Computers, complexity, and the Statue of
                                  Liberty restoration  . . . . . . . . . . 284--296
                John A. Lee and   
               Gerald Segal and   
                 Rosalie Steier   Positive alternatives: a report on an
                                  ACM panel on hacking . . . . . . . . . . 297--299
               Douglas W. Jones   An empirical comparison of
                                  priority-queue and event-set
                                  implementations  . . . . . . . . . . . . 300--311
                Larry Koved and   
                Ben Scneiderman   Embedded menus: selecting items in
                                  context  . . . . . . . . . . . . . . . . 312--318
          Jon Louis Bentley and   
          Daniel D. Sleator and   
           Robert E. Tarjan and   
                  Victor K. Wei   A Locally Adaptive Data Compression
                                  Scheme . . . . . . . . . . . . . . . . . 320--330
               W. Richard Stark   Comment on: ``Logic programming'' [Comm.
                                  ACM, 28, 1985, 9, 933--941] by M. R.
                                  Genesereth and M. L. Ginsberg. With a
                                  reply by the authors . . . . . . . . . . 331--331

Communications of the ACM
Volume 29, Number 5, May, 1986

                Jon Bentley and   
with Special Guest Oyster, Donald E. Knuth   Programming Pearls: Literate
                                  Programming: A \tt WEB program for
                                  sampling . . . . . . . . . . . . . . . . 364--369
               M. J. Sergot and   
                   F. Sadri and   
             R. A. Kowalski and   
               F. Kriwaczek and   
                 P. Hammond and   
                     H. T. Cory   The British Nationality Act as a logic
                                  program  . . . . . . . . . . . . . . . . 370--386
                John S. Gourlay   A language for music printing  . . . . . 388--401
             Valdis Berzins and   
               Michael Gray and   
                  David Naumann   Abstraction-based software development   402--415
                Richard Botting   Novel security techniques for online
                                  systems  . . . . . . . . . . . . . . . . 416--417
             David S. Scott and   
           S. Sitharama Iyengar   TID --- a Translation Invariant Data
                                  Structure for Storing Images . . . . . . 418--429

Communications of the ACM
Volume 29, Number 6, June, 1986

                Jon Bentley and   
            Donald E. Knuth and   
             M. Douglas McIlroy   Programming Pearls: a Literate Program:
                                  A \tt WEB program for common words . . . 471--483
           Herbert J. Bernstein   Special Section on Factory Automation
                                  and Robotics . . . . . . . . . . . . . . 484--485
               John E. Hopcroft   The impact of robotics on computer
                                  science  . . . . . . . . . . . . . . . . 486--498
                Marc H. Raibert   Legged robots  . . . . . . . . . . . . . 499--514
              David D. Grossman   Opportunities for research on numerical
                                  control machining  . . . . . . . . . . . 515--522
                    S. Ceri and   
                     G. Gottlob   Normalization of relations and PROLOG    524--544
            Jack J. Baroudi and   
            Michael J. Ginzberg   Impact of the technological environment
                                  on programmer/analyst job outcomes . . . 546--555

Communications of the ACM
Volume 29, Number 7, July, 1986

                 Clark Thompson   Military direction of academic CS
                                  research . . . . . . . . . . . . . . . . 583--585
               Henry F. Ledgard   Special Section on The Human Aspects of
                                  Computing: a Note on This Collection . . 593--593
               Avi Rushinek and   
               Sara F. Rushinek   What makes users happy?  . . . . . . . . 594--598
            Brian M. Slator and   
        Matthew P. Anderson and   
                    Walt Conley   Pygmalion at the Interface . . . . . . . 599--604
           Richard E. Mayer and   
           Jennifer L. Dyck and   
                William Vilberg   Learning to program and learning to
                                  think: what's the connection?  . . . . . 605--610
          Geoffry S. Howard and   
                Robert D. Smith   Computer anxiety in management: myth or
                                  reality? . . . . . . . . . . . . . . . . 611--615
               J. D. Gannon and   
                 E. E. Katz and   
                   V. R. Basili   Metrics for Ada packages: an initial
                                  study  . . . . . . . . . . . . . . . . . 616--623
           James C. Spohrer and   
                 Elliot Soloway   Novice mistakes: are the folk wisdoms
                                  correct? . . . . . . . . . . . . . . . . 624--632
              James L. Peterson   A note on undetected typing errors . . . 633--637
                Moira LeMay and   
                      Eric Hird   Operator work load: when is enough
                                  enough?  . . . . . . . . . . . . . . . . 638--642
            Neal S. Coulter and   
                Norman H. Kelly   Computer instruction set usage by
                                  programmers: an empirical investigation  643--647
                  Gerard Salton   Another look at automatic text-retrieval
                                  systems  . . . . . . . . . . . . . . . . 648--656
                   Hassan Gomaa   Software development of real-time
                                  systems  . . . . . . . . . . . . . . . . 657--668
                Neil Sarnak and   
               Robert E. Tarjan   Planar point location using persistent
                                  search trees . . . . . . . . . . . . . . 669--679

Communications of the ACM
Volume 29, Number 8, August, 1986

              Jon Louis Bentley   Programming Pearls: Little Languages . . 711--721
                 Jean E. Sammet   Why Ada is Not Just Another Programming
                                  Language . . . . . . . . . . . . . . . . 722--732
                Edward Lieblein   The Department of Defense software
                                  initiative --- a status report . . . . . 734--744
          Martin K. Solomon and   
              Riva Wenig Bickel   Self-assessment procedure XV: a
                                  self-assessment procedure dealing with
                                  file processing  . . . . . . . . . . . . 745--751
               Karen A. Frenkel   Evaluating two massively parallel
                                  machines . . . . . . . . . . . . . . . . 752--758
           Russell M. Clapp and   
           Louis Duchesneau and   
            Richard A. Volz and   
            Trevor N. Mudge and   
               Timothy Schultze   Toward real-time performance benchmarks
                                  for Ada  . . . . . . . . . . . . . . . . 760--778
             Young Moo Kang and   
           Robert B. Miller and   
                Roger Alan Pick   Comments on ``Grosch's law re-revisited:
                                  CPU power and the cost of computation''  779--781
          Jon Louis Bentley and   
             Brian W. Kernighan   GRAP --- a Language for Typesetting
                                  Graphs . . . . . . . . . . . . . . . . . 782--792
               R. H. Irving and   
              C. A. Higgins and   
                 F. R. Safayeni   Computerized performance monitoring
                                  systems: use and abuse . . . . . . . . . 794--801
             Raymond F. Koopman   The orders of equidistribution of
                                  subsequences of some asymptotically
                                  random sequences . . . . . . . . . . . . 802--806

Communications of the ACM
Volume 29, Number 9, September, 1986

              Jon Louis Bentley   Programming Pearls: Document Design  . . 832--839
               Derek H. Sleeman   Special Section on The Challenges of
                                  Teaching Computer Programming  . . . . . 840--841
             J. R. Anderson and   
                   E. Skwarecki   The automated tutoring of introductory
                                  computer programming . . . . . . . . . . 842--849
                     E. Soloway   Learning to program = learning to
                                  construct mechanisms and explanations    850--858
            Andrea di Sessa and   
                 Harold Abelson   Boxer: a reconstructible computational
                                  medium . . . . . . . . . . . . . . . . . 859--868
                   D. Gries and   
                  R. Miller and   
                 R. Ritchie and   
                       P. Young   Imbalance between Growth and Funding in
                                  Academic Computer Science: Two Trends
                                  Colliding  . . . . . . . . . . . . . . . 870--878
           Daniel G. Bobrow and   
              Sanjay Mittal and   
                 Mark J. Stefik   Expert systems: perils and promise . . . 880--894
             M. D. Janssens and   
                J. K. Annot and   
              A. J. Van De Goor   Adapting UNIX for a multiprocessor
                                  environment  . . . . . . . . . . . . . . 895--901
                Q. F. Stout and   
                   B. L. Warren   Tree rebalancing in optimal time and
                                  space  . . . . . . . . . . . . . . . . . 902--908

Communications of the ACM
Volume 29, Number 10, October, 1986

         John S. Quarterman and   
              Josiah C. Hoskins   Notable Computer Networks  . . . . . . . 932--971
                    David Gries   The 1984--1985 Taulbee survey  . . . . . 972--977
                  Niklaus Wirth   Microprocessor architectures: a
                                  comparison based on code generation by
                                  compiler . . . . . . . . . . . . . . . . 978--990
                    Manny Hayes   Accessing bit fields in FORTRAN-77 . . . 991--995
             M. D. Atkinson and   
                 J.-R. Sack and   
                 B. Santoro and   
                  T. Strothotte   Min-max heaps and generalized priority
                                  queues . . . . . . . . . . . . . . . . . 996--1000

Communications of the ACM
Volume 29, Number 11, November, 1986

         William K. McHenry and   
             Seymour E. Goodman   MIS in Soviet industrial enterprise: the
                                  limits of reform from above  . . . . . . 1034--1043
          Joseph P. Kearney and   
        Robert L. Sedlmeyer and   
        William B. Thompson and   
            Michael A. Gray and   
               Michael A. Adler   Software complexity measurement  . . . . 1044--1050
           Glen G. Langdon, Jr.   Self-assessment procedure XVI: a
                                  self-assessment procedure dealing with
                                  computer organization and logic design   1051--1060
           Dorothy Deringer and   
              David Brandin and   
            Dexter Fletcher and   
                Neil Jacobstein   The report of the ACM Long-Range
                                  Planning Committee: a summary  . . . . . 1061--1071
            Pierre N. Robillard   Schematic pseudocode for program
                                  constructs and its computer automation
                                  by SCHEMACODE  . . . . . . . . . . . . . 1072--1089
           Frank G. Landram and   
              James R. Cook and   
                Marvin Johnston   Spreadsheet calculations of
                                  probabilities from the $F$, $t$,
                                  $\chi^2$, and normal distribution  . . . 1090--1092
              Izak Benbasat and   
           Albert S. Dexter and   
                     Peter Todd   An experimental program investigating
                                  color-enhanced and graphical information
                                  presentation: an integration of the
                                  findings . . . . . . . . . . . . . . . . 1094--1105

Communications of the ACM
Volume 29, Number 12, December, 1986

              Jon Louis Bentley   Programming Pearls: Birth of a Cruncher  1155--1161
                  P. J. Denning   Editorial: Parallel Computing and Its
                                  Evolution  . . . . . . . . . . . . . . . 1163--1166
               Karen A. Frenkel   Introduction to the Special Issue on
                                  Parallelism  . . . . . . . . . . . . . . 1168--1169
           W. Daniel Hillis and   
             Guy L. Steele, Jr.   Data parallel algorithms . . . . . . . . 1170--1183
             David A. Padua and   
               Michael J. Wolfe   Advanced Compiler Optimization for
                                  Supercomputers . . . . . . . . . . . . . 1184--1201
           Randall Rettberg and   
                  Robert Thomas   Contention is no obstacle to
                                  shared-memory multiprocessing  . . . . . 1202--1212
             Craig Stanfill and   
                    David Waltz   Toward memory-based reasoning  . . . . . 1213--1228
             Craig Stanfill and   
                 Brewster Kahle   Parallel Free Text Search on the
                                  Connection Machine System  . . . . . . . 1229--1239


Communications of the ACM
Volume 30, Number 1, January, 1987

            Daniel D. McCracken   Viewpoint: Ruminations on Computer
                                  Science Curricula  . . . . . . . . . . . 3--5
            John M. Carroll and   
                 Jean McKendree   Interface design issues for
                                  advice-giving expert systems . . . . . . 14--32
                Mark Stefik and   
               Gregg Foster and   
           Daniel G. Bobrow and   
               Kenneth Kahn and   
               Stan Lanning and   
                   Lucy Suchman   Beyond the chalkboard: computer support
                                  for collaboration and problem solving in
                                  meetings . . . . . . . . . . . . . . . . 32--47
             Daniel R. Dolk and   
           Robert A. Kirsch, II   A relational information resource
                                  dictionary system  . . . . . . . . . . . 48--61
              James P. Held and   
                 John V. Carlis   MATCH: a new high-level relational
                                  operator for pattern matching  . . . . . 62--75
           W. Daniel Hillis and   
             Guy L. Steele, Jr.   Update to ``Data Parallel Algorithms''   78--78

Communications of the ACM
Volume 30, Number 2, February, 1987

                   Alan Borning   Computer system reliability and nuclear
                                  war  . . . . . . . . . . . . . . . . . . 112--131
               David Notkin and   
          Norman Hutchinson and   
                Jan Sanislo and   
               Michael Schwartz   Heterogeneous computing environments:
                                  report on the ACM SIGOPS workshop on
                                  accommodating heterogeneity  . . . . . . 132--140
                 Paul J. Jalics   COBOL on a PC: a new perspective on a
                                  language and its performance . . . . . . 142--154
        Christopher M. Holt and   
               Alan Stewart and   
              Maurice Clint and   
              Ronald H. Perrott   An improved parallel thinning algorithm  156--160
            Zen-Cheung Shih and   
              Gen-Huey Chen and   
                   R. C. T. Lee   Systolic algorithms to examine all pairs
                                  of elements  . . . . . . . . . . . . . . 161--167

Communications of the ACM
Volume 30, Number 3, March, 1987

               John E. Hopcroft   Computer Science: The Emergence of a
                                  Discipline . . . . . . . . . . . . . . . 198--202
               Robert E. Tarjan   Algorithm Design . . . . . . . . . . . . 204--212
               Karen A. Frenkel   An interview with the 1986 A. M. Turing
                                  Award recipients --- John E. Hopcroft
                                  and Robert E. Tarjan . . . . . . . . . . 214--222
           Michael Allen Bickel   Automatic Correction to Misspelled
                                  Names: a Fourth generation Approach  . . 224--228
               Nancy C. Goodwin   Functionality and usability  . . . . . . 229--233
             John T. Stasko and   
           Jeffrey Scott Vitter   Pairing Heaps: Experiments and Analysis  234--249
          Farokh B. Bastani and   
           S. Sitharama Iyengar   The effect of data structures on the
                                  logical complexity of programs . . . . . 250--259

Communications of the ACM
Volume 30, Number 4, April, 1987

             Jon L. Bentley and   
                    David Gries   Programming Pearls: Abstract data types  284--290
              David Gifford and   
                 Alfred Spector   Case study: IBM's system/360--370
                                  architecture . . . . . . . . . . . . . . 291--307
            Phillip Ein-Dor and   
               Jacob Feldmesser   Attributes of the Performance of Central
                                  Processing Units: a Relative Performance
                                  Prediction Model . . . . . . . . . . . . 308--317
           Jorge L. C. Sanz and   
           Its'hak Dinstein and   
              Dragutin Petkovic   Computing multi-colored polygonal masks
                                  in pipeline architecture and its
                                  application to automated visual
                                  inspection . . . . . . . . . . . . . . . 318--329

Communications of the ACM
Volume 30, Number 5, May, 1987

                  Alfs Berztiss   A mathematically focused curriculum for
                                  computer science . . . . . . . . . . . . 356--365
              Carolynn Van Dyke   Taking ``Computer Literacy'' Literally   366--374
               Taylor Booth and   
              Raymond E. Miller   Computer Science Program Accreditation:
                                  the first-year activities of the
                                  computing sciences accreditation board   376--388
           Thomas W. Malone and   
           Kenneth R. Grant and   
         Franklyn A. Turbak and   
          Stephen A. Brobst and   
               Michael D. Cohen   Intelligent information-sharing systems  390--402
           Jack J. Dongarra and   
                    Eric Grosse   Distribution of mathematical software
                                  via electronic mail  . . . . . . . . . . 403--407
               S. A. Mamrak and   
            M. J. Kaelbling and   
             C. K. Nicholas and   
                       M. Share   A Software Architecture for Supporting
                                  the Exchange of Electronic Manuscripts   408--414
               Chris F. Kemerer   An empirical validation of software cost
                                  estimation models  . . . . . . . . . . . 416--429
              Richard Nance and   
               Robert Moose and   
                   Robert Foutz   A statistical technique for comparing
                                  heuristics: an example from capacity
                                  assignment strategies in computer
                                  network design . . . . . . . . . . . . . 430--442

Communications of the ACM
Volume 30, Number 6, June, 1987

              Jon Louis Bentley   Programming Pearls: Self-Describing Data 479--483
           Thomas W. Malone and   
               Joanne Yates and   
             Robert I. Benjamin   Electronic markets and electronic
                                  hierarchies  . . . . . . . . . . . . . . 484--497
            M. Lynne Markus and   
    Niels Bjòrn-Andersen   Power over users: its exercise by system
                                  professionals  . . . . . . . . . . . . . 498--504
                  Itzhak Shemer   Systems Analysis: a Systemic Analysis of
                                  a Conceptual Model . . . . . . . . . . . 506--512
              Jürgen Ebert   A versatile data structure for
                                  edge-oriented graph algorithms . . . . . 513--519
              Ian H. Witten and   
            Radford M. Neal and   
                 John G. Cleary   Arithmetic coding for data compression   520--540
                Vasant Dhar and   
                 Harry E. Pople   Rule-based versus structure-based models
                                  for explaining and generating expert
                                  behavior . . . . . . . . . . . . . . . . 542--555
          Ananth Srinivasan and   
                 Kate M. Kaiser   Relationships between selected
                                  organizational factors and systems
                                  development  . . . . . . . . . . . . . . 556--562

Communications of the ACM
Volume 30, Number 7, July, 1987

                  J. L. Bentley   Programming Pearls: Profilers  . . . . . 587--592
               Peter J. Denning   Announcing Literate Programming,
                                  moderated by Christopher J. Van Wyk  . . 593--593
     Christopher J. Van Wyk and   
            David R. Hanson and   
                   John Gilbert   Literate Programming: Printing Common
                                  Words  . . . . . . . . . . . . . . . . . 594--599
               Joseph D. Becker   Arabic word processing . . . . . . . . . 600--610
    José A. Mañas   Word division in Spanish . . . . . . . . 612--616
          Georgia Griffiths and   
              G. Carlyle Stones   The tea-leaf reader algorithm: an
                                  efficient implementation of CRC-16 and
                                  CRC-32 . . . . . . . . . . . . . . . . . 617--620
               Shu-Xiang Li and   
                 Murray H. Loew   The quadcode and its arithmetic  . . . . 621--626
               Shu-Xiang Li and   
                 Murray H. Loew   Adjacency Detection Using Quadcodes  . . 627--631

Communications of the ACM
Volume 30, Number 8, August, 1987

              Russell J. Abbott   Knowledge abstraction  . . . . . . . . . 664--671
             C. A. R. Hoare and   
                I. J. Hayes and   
                  He Jifeng and   
               C. C. Morgan and   
               A. W. Roscoe and   
              J. W. Sanders and   
      I. H. Sòrensen and   
               J. M. Spivey and   
                   B. A. Sufrin   Laws of programming  . . . . . . . . . . 672--686
                    David Gries   The 1985--1986 Taulbee survey  . . . . . 688--694
           Kjell W. Nielsen and   
                    Ken Shumate   Designing large real-time systems with
                                  Ada  . . . . . . . . . . . . . . . . . . 695--715
            Lee W. Schruben and   
              V. James Cogliano   An experimental procedure for simulation
                                  response surface model identification    716--730
                     Shu Tezuka   Walsh-spectral test for GFSR
                                  pseudorandom numbers . . . . . . . . . . 731--735

Communications of the ACM
Volume 30, Number 9, September, 1987

          Jon Louis Bentley and   
                    R. W. Floyd   Programming Pearls: a Sample of
                                  Brilliance . . . . . . . . . . . . . . . 754--757
              John D. Gould and   
           Stephen J. Boies and   
               Stephen Levy and   
           John T. Richards and   
                  Jim Schoonard   The 1984 Olympic Message System: a test
                                  of behavioral principles of system
                                  design . . . . . . . . . . . . . . . . . 758--769
             C. A. R. Hoare and   
                I. J. Hayes and   
                  Jifeng He and   
               C. C. Morgan and   
               A. W. Roscoe and   
              J. W. Sanders and   
             I. H. Sorensen and   
               J. M. Spivey and   
                   B. A. Sufrin   Corrigenda: ``Laws of programming''  . . 770--770
               Chris F. Kemerer   Corrigenda: ``An Empirical Validation of
                                  Software Cost Estimation Models''  . . . 770--770
          Jonathan P. Jacky and   
                   Ira J. Kalet   An object-oriented programming
                                  discipline for standard Pascal . . . . . 772--776
                 Niv Ahituv and   
             Yeheskel Lapid and   
                   Seev Neumann   Processing encrypted data  . . . . . . . 777--780
                     Niv Ahituv   A metamodel of information flow: a tool
                                  to support information systems theory    781--791
              B. Ya. Ryabko and   
          R. Nigel Horspool and   
              Gordon V. Cormack   Comments to: ``A locally adaptive data
                                  compression scheme'' [Comm. ACM \bf 29,
                                  1986, 4, 320--330, MR 87e:68020] by J.
                                  L. Bentley, D. D. Sleator, R. E. Tarjan
                                  and V. K. Wei  . . . . . . . . . . . . . 792--794

Communications of the ACM
Volume 30, Number 10, October, 1987

               Peter J. Denning   Paradigms crossed  . . . . . . . . . . . 808--809
                 Diane Crawford   Public policy issues ripen with age  . . 810--813
               Karen A. Frenkel   Profiles in Computing --- Introduction   815--828
               Karen A. Frenkel   Profiles in computing: Donald E. Knuth:
                                  scholar with a passion for the
                                  particular . . . . . . . . . . . . . . . 816--819
               Karen A. Frenkel   Profiles in computing: Brian K. Reid: a
                                  graphics tale of a hacker tracker  . . . 820--823
               Karen A. Frenkel   Profiles in computing: Allan L. Scherr
                                  --- Big Blue's Time-Sharing Pioneer  . . 824--828
                      Mina Rees   The computing program of the Office of
                                  Naval Research, 1946--1953 . . . . . . . 830--848
                   Linda Feczko   ACM --- Making Computing History for 40
                                  Years --- Introduction . . . . . . . . . 849--849
                   Franz L. Alt   Fifteen years ACM  . . . . . . . . . . . 850--857
                     Lee Revens   The first 25 years: ACM 1947--1962 . . . 860--865
                  Anita Cochran   ACM: the past 15 years: 1972--1987 . . . 866--872
                  Eric A. Weiss   Commentaries on the past 15 years  . . . 880--883
                  Eric A. Weiss   Self-assessment procedure XVII . . . . . 886--891

Communications of the ACM
Volume 30, Number 11, November, 1987

         Richard H. Lathrop and   
          Teresa A. Webster and   
                Temple F. Smith   ARIADNE: pattern-directed inference and
                                  hierarchical abstraction in protein
                                  structure recognition  . . . . . . . . . 909--921
         Ulises Agüero and   
               Subrata Sasgupta   A plausibility-driven approach to
                                  computer architecture design . . . . . . 922--932
            James H. Coombs and   
            Allen H. Renear and   
               Steven J. DeRose   Markup systems and the future of
                                  scholarly text processing  . . . . . . . 933--947
                      Kemal Efe   A proposed solution to the problem of
                                  levels in error-message generation . . . 948--955
             Robert G. Reynolds   The partial metrics system: modeling the
                                  stepwise refinement process using
                                  partial metrics  . . . . . . . . . . . . 956--963
               G. W. Furnas and   
             T. K. Landauer and   
                L. M. Gomez and   
                   S. T. Dumais   The vocabulary problem in human-system
                                  communication  . . . . . . . . . . . . . 964--971
            William J. Doll and   
            Golamreza Torkzadeh   The relationship of MIS steering
                                  committees to size of firm and
                                  formalization of MIS planning  . . . . . 972--978

Communications of the ACM
Volume 30, Number 12, December, 1987

              Jon Louis Bentley   Programming Pearls: The Furbelow
                                  Memorandum . . . . . . . . . . . . . . . 998--999, 1010
     Christopher J. Van Wyk and   
            Michael Jackson and   
                  David W. Wall   Literate Programming: Processing
                                  Transactions . . . . . . . . . . . . . . 1000--1010
                  John McCarthy   Generality in artificial intelligence    1030--1035
               Jeff Shrager and   
           Daniel S. Jordan and   
            Thomas P. Moran and   
            Gregor Kiczales and   
              Daniel M. Russell   Issues in the pragmatics of qualitative
                                  modeling: lessons learned from a
                                  xerographics project . . . . . . . . . . 1036--1047
        Channing H. Russell and   
             Pamela J. Waterman   Variations on UNIX for
                                  parallel-processing computers  . . . . . 1048--1055
              Mark L. Gillenson   The duality of database structures and
                                  design techniques  . . . . . . . . . . . 1056--1065
                 Haim Mendelson   Economies of scale in computing:
                                  Grosch's law revisited . . . . . . . . . 1066--1072
           Kjell W. Nielsen and   
                    Ken Shumate   Corrigenda: ``Designing large real-time
                                  systems with Ada'' . . . . . . . . . . . 1073--1073
               J. H. Hester and   
               D. H. Hirschberg   Self-organizing search lists using
                                  probabilistic back-pointers  . . . . . . 1074--1079


Communications of the ACM
Volume 31, Number 1, January, 1988

                 G. A. Ringwood   Parlog86 and the dining logicians  . . . 10--25
                  Jacques Cohen   A view of the origins and development of
                                  Prolog . . . . . . . . . . . . . . . . . 26--36
             Robert A. Kowalski   The early years of logic programming . . 38--43
                     J. Kay and   
                      P. Lauder   A Fair Share Scheduler . . . . . . . . . 44--55
              Jack W. Stott and   
           Jeffrey E. Kottemann   Anatomy of a compact user interface
                                  development tool . . . . . . . . . . . . 56--66
                      Ron Weber   Computer technology and jobs: an impact
                                  assessment model . . . . . . . . . . . . 68--77
              Yehuda Kahane and   
               Seev Neumann and   
             Charles S. Tapiero   Computer backup pools, disaster
                                  recovery, and default risk . . . . . . . 78--83

Communications of the ACM
Volume 31, Number 2, February, 1988

               Karen A. Frenkel   The Art and Science of Visualizing Data  110--121
            Donald P. Greenberg   Coons Award Lecture  . . . . . . . . . . 122--129
               Paul S. Heckbert   Ray Tracing Jell-O Brand Gelatin . . . . 130--134
           Clifford A. Pickover   Pattern Formation and Chaos in Networks  136--151
             Stephen I. Gallant   Connectionist Expert Systems . . . . . . 152--169
          Jerome A. Feldman and   
              Mark A. Fanty and   
           Nigel H. Goddard and   
                Kenton J. Lynne   Computing with Structured Connectionist
                                  Networks . . . . . . . . . . . . . . . . 170--187
                Brian A. Nejmeh   NPATH: a Measure of Execution Path
                                  Complexity and its Applications  . . . . 188--200
              Gerard Salton and   
                  Chris Buckley   Parallel Text Search Methods . . . . . . 202--215
  Voratas Kachitvichyanukul and   
             Bruce W. Schmeiser   Binomial Random Variate Generation . . . 216--222

Communications of the ACM
Volume 31, Number 3, March, 1988

                  Abraham Peled   John Cocke: The 1987 ACM A. M. Turing
                                  Award recipient  . . . . . . . . . . . . 249--249
                     John Cocke   The search for performance in scientific
                                  processors: the Turing Award Lecture . . 250--253
                      Alan Shaw   Special section on operating systems . . 255--257
               David Notkin and   
            Andrew P. Black and   
         Edward D. Lazowska and   
              Henry M. Levy and   
                Jan Sanislo and   
                  John Zahorjan   Interconnecting heterogeneous computer
                                  systems  . . . . . . . . . . . . . . . . 258--273
            Stuart R. Faulk and   
                David L. Parnas   On Synchronization in Hard-Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 274--287
           David K. Gifford and   
           Roger M. Needham and   
           Michael D. Schroeder   The Cedar File System  . . . . . . . . . 288--298
                 Barbara Liskov   Distributed programming in Argus . . . . 300--312
                 David Cheriton   The V distributed system . . . . . . . . 314--333
                 John C. Munson   Self-assessment procedure XVIII:
                                  fundamentals of data communications  . . 334--341
                  Jan L. Guynes   Impact of system response time on state
                                  anxiety  . . . . . . . . . . . . . . . . 342--347
            Bing-Chao Huang and   
            Michael A. Langston   Practical In-Place Merging . . . . . . . 348--352

Communications of the ACM
Volume 31, Number 4, April, 1988

               Robert E. Filman   Reasoning with worlds and truth
                                  maintenance in a knowledge-based
                                  programming environment  . . . . . . . . 382--401
           Christopher Cherniak   Undebuggability and cognitive science    402--412
           Michael R. Blaha and   
      William J. Premerlani and   
              James E. Rumbaugh   Relational database design using an
                                  object-oriented methodology  . . . . . . 414--427
          Marilyn M. Mantei and   
                 Toby J. Teorey   Cost/benefit analysis for incorporating
                                  human factors in the software lifecycle  428--439
             Bennett L. Fox and   
                 Peter W. Glynn   Computing Poisson probabilities  . . . . 440--445
           Per-Åke Larson   Dynamic Hash Tables  . . . . . . . . . . 446--457

Communications of the ACM
Volume 31, Number 5, May, 1988

                 Clifford Stoll   Stalking the wily hacker . . . . . . . . 484--497
                   Roger Clarke   Information technology and dataveillance 498--512
                    David Harel   On Visual Formalisms . . . . . . . . . . 514--530
              John L. Gustafson   Reevaluating Amdahl's law  . . . . . . . 532--533
           James M. Cupello and   
           David J. Mishelevich   Managing prototype knowledge/expert
                                  system projects  . . . . . . . . . . . . 534--541
                Sid L. Huff and   
           Malcolm C. Munro and   
              Barbara H. Martin   Growth stages of end user computing  . . 542--550
             Suzanne Rivard and   
                    Sid L. Huff   Factors of success for end-user
                                  computing  . . . . . . . . . . . . . . . 552--561
         Narayan S. Umanath and   
             Richard W. Schmell   An experimental evaluation of the impact
                                  of data display format on recall
                                  performance  . . . . . . . . . . . . . . 562--570
            Andrew W. Appel and   
                Guy J. Jacobson   The world's fastest Scrabble program . . 572--578
              Thomas E. Gerasch   An insertion algorithm for a minimal
                                  internal path length binary search tree  579--585
        Michael J. Ginzberg and   
                Jack J. Baroudi   MIS Careers --- a Theoretical
                                  Perspective  . . . . . . . . . . . . . . 586--594

Communications of the ACM
Volume 31, Number 6, 1988

                  Paul Abrahams   The Strategic Defense Initiative ---
                                  President's Letter . . . . . . . . . . . 628--629
                  B. W. Mel and   
            S. M. Omohundro and   
              A. D. Robison and   
               S. S. Skiena and   
                K. H. Thearling   Tablet: personal computer of the year
                                  2000 . . . . . . . . . . . . . . . . . . 638--648
        Michael J. Callahan and   
              David Hoffman and   
               James T. Hoffman   Computer Graphics Tools for the Study of
                                  Minimal Surfaces . . . . . . . . . . . . 648--661
              Richard G. Hamlet   Introduction to special section on
                                  software testing . . . . . . . . . . . . 662--667
                  E. J. Weyuker   The evaluation of program-based software
                                  test data adequacy criteria  . . . . . . 668--675
              T. J. Ostrand and   
                   M. J. Balcer   The Category-Partition Method for
                                  Specifying and Generating Functional
                                  Tests  . . . . . . . . . . . . . . . . . 676--686
                D. Gelperin and   
                      B. Hetzel   The Growth of Software Testing . . . . . 687--695
                  S. B. Guthery   Self-timing programs and the quantum
                                  scheduler  . . . . . . . . . . . . . . . 696--702
                     D. R. Dolk   Model management and structured
                                  modeling: the role of an information
                                  resource dictionary system . . . . . . . 704--718
                 K. Appleby and   
                M. Carllson and   
                  S. Haridi and   
                     D. Sawhlin   Garbage collection for Prolog based on
                                  WAM  . . . . . . . . . . . . . . . . . . 719--741
                Pierre L'Ecuyer   Efficient and portable combined random
                                  number generators  . . . . . . . . . . . 742--749, 774
                 Sukhamay Kundu   The Equivalence of the Subregion
                                  Representation and the Wall
                                  Representation for a Certain Class of
                                  Rectangular Dissections  . . . . . . . . 752--763
            S. L. Jarvenpaa and   
                  G. W. Dickson   Graphics and managerial decision making:
                                  research-based guidelines  . . . . . . . 764--774
               Peter J. Denning   Edmund C. Berkeley --- ACM founder . . . 781--782

Communications of the ACM
Volume 31, Number 7, July, 1988

              John B. Smith and   
               Stephen F. Weiss   Hypertext: Introduction to the Special
                                  Issue  . . . . . . . . . . . . . . . . . 816--819
           Robert M. Akscyn and   
        Donald L. McCracken and   
                 Elise A. Yoder   KMS: a Distributed Hypermedia System for
                                  Managing Knowledge in Organizations  . . 820--835
                Frank G. Halasz   Reflections on NoteCards: seven issues
                                  for the next generation of hypermedia
                                  systems  . . . . . . . . . . . . . . . . 836--855
              Brad Campbell and   
              Joseph M. Goodman   HAM: a General Purpose Hypertext
                                  Abstract Machine . . . . . . . . . . . . 856--861
                 Pankaj K. Garg   Abstraction mechanisms in hypertext  . . 862--870
         Darrell R. Raymond and   
                Frank Wm. Tompa   Hypertext and the Oxford English
                                  Dictionary . . . . . . . . . . . . . . . 871--879
                 Mark E. Frisse   Searching for information in a hypertext
                                  medical handbook . . . . . . . . . . . . 880--886
                Andries van Dam   Hypertext '87: Keynote Address . . . . . 887--895
             Jason L. Frand and   
          Ephraim R. McLean and   
                 Julia A. Britt   Fourth annual UCLA survey of business
                                  school computer usage  . . . . . . . . . 896--910
            James L. Poirot and   
          Harriet G. Taylor and   
             Cathleen A. Norris   Retraining teachers to teach high school
                                  computer science . . . . . . . . . . . . 912--917

Communications of the ACM
Volume 31, Number 8, 1988

                  Edward A. Fox   ACM Press Database and Electronic
                                  Products --- New Services for the
                                  Information Age  . . . . . . . . . . . . 948--951
               J. D. Wilson and   
                E. S. Adams and   
             H. P. Baouendi and   
               W. A. Marion and   
                G. J. Yaverbaum   Computer science education in the
                                  People's Republic of China in the late
                                  1980s  . . . . . . . . . . . . . . . . . 956--964
                      S. F. Lam   An empirical study of computer capacity
                                  planning in Japan  . . . . . . . . . . . 965--976
               N. P. Archer and   
              M. W. L. Chan and   
                S. J. Huang and   
                      R. T. Liu   A Chinese-English microcomputer system   977--982
                   D. Gries and   
                       D. Marsh   The 1986--1987 Taulbee survey  . . . . . 984--991
              Monty Newborn and   
                    Danny Kopec   Results of ACM's Eighteenth Computer
                                  Chess Championship . . . . . . . . . . . 992--995
               Douglas W. Jones   Application of Splay Trees to Data
                                  Compression  . . . . . . . . . . . . . . 996--1007
                  D. V. Sarwate   Computation of cyclic redundancy checks
                                  via table look-up  . . . . . . . . . . . 1008--1013
                       L. Press   Benchmarks for LAN performance
                                  evaluation . . . . . . . . . . . . . . . 1014--1017

Communications of the ACM
Volume 31, Number 9, September, 1988

                James H. Fetzer   Program verification: the very idea  . . 1048--1063
            John M. Carroll and   
                Amy P. Aaronson   Learning by doing with simulated
                                  intelligent help . . . . . . . . . . . . 1064--1079
          Wilfred J. Hansen and   
                 Christina Haas   Reading and Writing with Computers: a
                                  Framework for Explaining Differences in
                                  Performance  . . . . . . . . . . . . . . 1080--1089
             Surya B. Yadav and   
           Ralph R. Bravoco and   
         Akemi T. Chatfield and   
                 T. M. Rajkumar   Comparison of analysis techniques for
                                  information requirement determination    1090--1097
                  Alan M. Davis   A Comparison of Techniques for the
                                  Specification of External System
                                  Behavior . . . . . . . . . . . . . . . . 1098--1115
              Alok Aggarwal and   
           Jeffrey Scott Vitter   The Input/Output Complexity of Sorting
                                  and Related Problems . . . . . . . . . . 1116--1127
                  Robert Courts   Improving locality of reference in a
                                  garbage-collecting memory management
                                  system . . . . . . . . . . . . . . . . . 1128--1138
           David W. Hamaker and   
              Ian H. Witten and   
            Radford M. Neal and   
                 John G. Cleary   Compress and Compact Discussed Further
                                  (letters)  . . . . . . . . . . . . . . . 1139, 1140, 1145

Communications of the ACM
Volume 31, Number 10, October, 1988

                  K. A. Frenkel   Computers and elections  . . . . . . . . 1176--1183
                  R. G. Saltman   Accuracy, integrity and security in
                                  computerized vote-tallying . . . . . . . 1184--1191
            Stephen K. Park and   
                Keith W. Miller   Random Number Generators: Good Ones are
                                  Hard to Find . . . . . . . . . . . . . . 1192--1201
                    J. E. Smith   Characterizing computer performance with
                                  a single number  . . . . . . . . . . . . 1202--1206
                      M. Gordon   Probabilistic and genetic algorithms in
                                  document retrieval . . . . . . . . . . . 1208--1218
                       R. Brown   Calendar Queues: a Fast ${O}(1)$
                                  Priority Queue Implementation for the
                                  Simulation Event Set Problem . . . . . . 1220--1227
              D. Rubinstein and   
                 J. Shallit and   
                     M. Szegedy   A subset coloring algorithm and its
                                  applications to computer graphics  . . . 1228--1232

Communications of the ACM
Volume 31, Number 11, November, 1988

            Ben Shneiderman and   
                John M. Carroll   Ecological Studies of Professional
                                  Programmers: An Overview . . . . . . . . 1256--1258
             Elliot Soloway and   
              Robin Lampert and   
              Stan Letovsky and   
              David Littman and   
                 Jeannine Pinto   Designing documentation to compensate
                                  for delocalized plans  . . . . . . . . . 1259--1267
                Bill Curtis and   
               Herb Krasner and   
                     Neil Iscoe   A field study of the software design
                                  process for large systems  . . . . . . . 1268--1287
           Mary Beth Rosson and   
              Wendy Kellogg and   
                  Susanne Maass   The designer as user: building
                                  requirements for design tools from
                                  design practice  . . . . . . . . . . . . 1288--1298
                     Udi Manber   Using induction to design algorithms . . 1300--1313
                Paul C. K. Kwok   A thinning algorithm by contour
                                  generation . . . . . . . . . . . . . . . 1314--1324
           Clifford A. Pickover   A Note on Chaos and Halley's Method  . . 1326--1329
          Joachim H. Ahrens and   
                  Ulrich Dieter   Efficient table-free sampling methods
                                  for the exponential, Cauchy, and normal
                                  distributions  . . . . . . . . . . . . . 1330--1337
                  Alon Itai and   
                       Yoav Raz   The Number of Buffers Required for
                                  Sequential Processing of a Disk File . . 1338--1342
          James R. Driscoll and   
            Harold N. Gabow and   
             Ruth Shrairman and   
               Robert E. Tarjan   Relaxed Heaps: An Alternative to
                                  Fibonacci Heaps with Applications to
                                  Parallel Computation . . . . . . . . . . 1343--1354

Communications of the ACM
Volume 31, Number 12, December, 1988

     Christopher J. Van Wyk and   
              Eric Hamilton and   
                     Don Colner   Literate Programming: Expanding
                                  Generalized Regular Expressions  . . . . 1376--1385
            Richard C. Holt and   
                 James R. Cordy   The Turing programming language  . . . . 1410--1423
                 Tore Risch and   
          René Reboh and   
              Peter E. Hart and   
                Richard O. Duda   A functional approach to integrating
                                  database and expert systems  . . . . . . 1424--1437
            Starr Roxanne Hiltz   Productivity Enhancement from
                                  Computer-Mediated Communication: a
                                  Systems Contingency Approach . . . . . . 1438--1454
              Feng-Yang Kuo and   
                Jahangir Karimi   User interface design from a real time
                                  perspective  . . . . . . . . . . . . . . 1456--1466
                 Niv Ahituv and   
                  Magid Igbaria   A model for predicting and evaluating
                                  computer resource consumption  . . . . . 1467--1473
               Gautam Mitra and   
              Mehrdad Tamiz and   
                 Joseph Yadegar   Experimental Investigation of an
                                  Interior Search Method within a Simplex
                                  Framework  . . . . . . . . . . . . . . . 1474--1482
               Michael Lebowitz   The use of memory in text processing . . 1483--1502
                S. L. Jarvenpaa   The Importance of Laboratory
                                  Experimentation in IS Research . . . . . 1502--1504


Communications of the ACM
Volume 32, Number 4, 1988

            John R. Weitzel and   
               Larry Kerschberg   Developing Knowledge-Based Systems:
                                  Reorganizing the System Development Life
                                  Cycle  . . . . . . . . . . . . . . . . . 482--488

Communications of the ACM
Volume 32, Number 1, January, 1989

                   Bryan Kocher   A Hygiene Lesson . . . . . . . . . . . . 3
           Peter J. Denning and   
                D. E. Comer and   
                David Gries and   
          Michael C. Mulder and   
               Allen Tucker and   
              A. Joe Turner and   
                  Paul R. Young   Computing as a discipline  . . . . . . . 9--23
               Karen A. Frenkel   The computer bowl  . . . . . . . . . . . 24--31
                 Leslie Lamport   A Simple Approach to Specifying
                                  Concurrent Systems . . . . . . . . . . . 32--45
            Claude Banville and   
                 Maurice Landry   Can the field of MIS be disciplined? . . 48--60
             Jason L. Frand and   
                 Julia A. Britt   Fifth annual UCLA survey of business
                                  school computer usage  . . . . . . . . . 62--76
            David M. Abrahamson   An Adaptive Dependency Source Model for
                                  Data Compression . . . . . . . . . . . . 77--83
                 Boaz Ronen and   
          Michael A. Palley and   
            Henry C. Lucas, Jr.   Spreadsheet analysis and design  . . . . 84--93
            David M. DeJean and   
              George W. Zobrist   A definition optimization technique used
                                  in a code translation algorithm  . . . . 94--105
             Neal R. Wagner and   
                    Paul Putter   Error detecting decimal digits . . . . . 106--110
           Boris D. Lubachevsky   Efficient Distributed Event-Driven
                                  Simulations of Multiple-Loop Networks    111--123, 131
                     R. W. Hall   Fast Parallel Thinning Algorithms:
                                  Parallel Speed and Connectivity
                                  Preservation . . . . . . . . . . . . . . 124--131
               Douglas W. Jones   Concurrent Operations on Priority Queues 132--137

Communications of the ACM
Volume 32, Number 2, 1989

                E. Robert Yoche   Legal Protection for Computer Software   169--171
                     L. Earnest   Can computers cope with human races? . . 173--182
                S. L. Young and   
            A. G. Hauptmann and   
                 W. H. Ward and   
                E. T. Smith and   
                      P. Werner   High level knowledge sources in usable
                                  speech recognition systems . . . . . . . 183--194
                  Y. Bengio and   
                  R. Cardin and   
                 R. De Mori and   
                       E. Merlo   Programmable execution of multi-layered
                                  networks for automatic speech
                                  recognition  . . . . . . . . . . . . . . 195--199
       Walter Hollingsworth and   
               Howard Sachs and   
                 Alan Jay Smith   The Clipper Processor: Instruction Set
                                  Architecture and Implementation  . . . . 200--219
            Robert E. Kraut and   
            Susan T. Dumais and   
                     Susan Koch   Computerization, productivity, and
                                  quality of work-life . . . . . . . . . . 220--238
             John Tillquist and   
                  Feng-Yang Kuo   An approach to the recursive retrieval
                                  problem in the relational database . . . 239--245
               P. J. Jalics and   
                 D. R. McIntyre   Caching and other disk access avoidance
                                  techniques on personal computers . . . . 246--255

Communications of the ACM
Volume 32, Number 3, March, 1989

                 Rosalie Steier   News track . . . . . . . . . . . . . . . 285--286
           Robert L. Ashenhurst   ACM forum  . . . . . . . . . . . . . . . 287--ff.
                   Bryan Kocher   President's letter . . . . . . . . . . . 292--293
                David Gries and   
            Terry M. Walker and   
                     Paul Young   The 1988 Snowbird Report: a Discipline
                                  Matures  . . . . . . . . . . . . . . . . 294--297
         Virginia E. Barker and   
         Dennis E. O'Connor and   
             Judith Bachant and   
                 Elliot Soloway   Expert systems for configuration at
                                  Digital: XCON and beyond . . . . . . . . 298--318
           Donald P. Ballou and   
                Giri Kumar.Tayi   Methodology for allocating resources for
                                  data quality enhancement . . . . . . . . 320--329
                      Bo Sanden   An Entity-Life Modeling Approach to the
                                  Design of Concurrent Software  . . . . . 330--343
                   Xue Dong Luo   A practical sieve algorithm for finding
                                  prime numbers  . . . . . . . . . . . . . 344--346
         Virginia R. Gibson and   
                  James A. Senn   System structure and software
                                  maintenance performance  . . . . . . . . 347--358
                Zicheng Guo and   
                Richard W. Hall   Parallel Thinning with Two-Subiteration
                                  Algorithms . . . . . . . . . . . . . . . 359--373
          James C. Pleasant and   
           Lawrence Paulson and   
                 Avra Cohen and   
      Michael Gordon Bevier and   
           Michael K. Smith and   
           William D. Young and   
            Thomas R. Clune and   
           Stephen Savitzky and   
                James H. Fetzer   Correspondence on Fetzer, Program
                                  Verification: The Very Idea  . . . . . . 374--381

Communications of the ACM
Volume 32, Number 4, April, 1989

                John Dobson and   
                  Brian Randell   Program Verification: Public Image And
                                  Private Reality  . . . . . . . . . . . . 420--422
               Karen A. Frenkel   Volume rendering . . . . . . . . . . . . 426--435
           Peter J. Denning and   
               Karen A. Frenkel   A conversation with Steve Jobs . . . . . 436--443
          Nicholas Carriero and   
                David Gelernter   Linda in context . . . . . . . . . . . . 444--458
                      L. Bailyn   Toward the perfect workplace?  . . . . . 460--471
                R. Wenig Bickel   Self-assessment procedure XIX  . . . . . 472--480
            John R. Weitzel and   
               Larry Kerschberg   Developing knowledge-based systems:
                                  reorganizing the system development life
                                  cycle  . . . . . . . . . . . . . . . . . 482--488
                E. R. Fiala and   
                   D. H. Greene   Data compression with finite windows . . 490--505
      Harald M. Müller and   
        Christopher M. Holt and   
              Aaron Watters and   
                James H. Fetzer   More on the Very Idea (letters)  . . . . 506--512

Communications of the ACM
Volume 32, Number 5, 1989

            E. Robert Yoche and   
               Arthur J. Levine   Basic Principles of Copyright Protection
                                  for Computer Software  . . . . . . . . . 544--545
             Harold Abelson and   
          Michael Eisenberg and   
            Matthew Halfant and   
          Jacob Katzenelson and   
               Elisha Sacks and   
          Gerald J. Sussman and   
                Jack Wisdom and   
                    Kenneth Yip   Intelligence in Scientific Computing . . 546--562
                   P. Samuelson   Why the look and feel of software user
                                  interfaces should not be protected by
                                  copyright law  . . . . . . . . . . . . . 563--572
                       John Yen   GERTIS: a Dempster-Shafer Approach to
                                  Diagnosing Hierarchical Hypotheses . . . 573--585
                     Y. M. Kang   Computer hardware performance:
                                  production and cost function analyses    586--593
                    N. E. Gibbs   The SEI education program: the challenge
                                  of teaching future software engineers    594--605
               Sidney C. Bailin   An Object-Oriented Requirements
                                  Specifications Method  . . . . . . . . . 608--623

Communications of the ACM
Volume 32, Number 6, 1989

               Pamela Samuelson   Can Hackers Be Sued for Damages Caused
                                  by Computer Viruses? . . . . . . . . . . 666--669
              Michael Gemignani   Viruses and Criminal Law . . . . . . . . 669--671
                      Anonymous   The Worm Story . . . . . . . . . . . . . 677--677
             Eugene H. Spafford   The Internet Worm: Crisis and Aftermath  678--687
             Jon A. Rochlis and   
                 Mark W. Eichin   With microscope and tweezers: the worm
                                  from MIT's perspective . . . . . . . . . 689--698
                    Donn Seeley   Password cracking: a game of wits  . . . 700--703
               T. Eisenberg and   
                   D. Gries and   
               J. Hartmanis and   
                 D. Holcomb and   
             M. Stuart Lynn and   
                     T. Santoro   The Cornell commission: on Morris and
                                  the worm . . . . . . . . . . . . . . . . 706--709
               Karen A. Frenkel   An interview with Ivan Sutherland  . . . 712--718
               I. E. Sutherland   Micropipelines . . . . . . . . . . . . . 720--738
     Christopher J. Van Wyk and   
              Donald C. Lindsay   Literate Programming: a File Difference
                                  Program  . . . . . . . . . . . . . . . . 740--754
               Harold Thimbleby   A Review of Donald C. Lindsay's Text
                                  File Difference Utility, \em diff  . . . 754--755
                Zicheng Guo and   
                Richard W. Hall   Corrigenda: ``Parallel Thinning with
                                  Two-Sub-Iteration Algorithms'' . . . . . 759--759
                Richard W. Hall   Corrigenda: ``Fast Parallel Thinning
                                  Algorithms: Parallel Speed and
                                  Connectivity Preservation''  . . . . . . 759--760

Communications of the ACM
Volume 32, Number 7, 1989

                    Larry Press   Thoughts and Observations at the
                                  Microsoft CD-ROM Conference  . . . . . . 784--788
                  Edward A. Fox   The coming revolution in interactive
                                  digital video  . . . . . . . . . . . . . 794--801
            Wendy E. Mackay and   
            Glorianna Davenport   Virtual video editing in interactive
                                  multimedia applications  . . . . . . . . 802--810
                G. David Ripley   DVI --- a Digital Multimedia Technology  811--822
               Douglas F. Dixon   Life Before the Chips: Simulating
                                  Digital Video Interactive Technology . . 824--831
               Scott M. Stevens   Intelligent interactive video simulation
                                  of a code inspection . . . . . . . . . . 832--843
                 Michael Tinker   DVI parallel image compression . . . . . 844--851
             Andrew Lippman and   
                 William Butera   Coding image sequences for interactive
                                  retrieval  . . . . . . . . . . . . . . . 852--860
                 Clement Yu and   
                    Wei Sun and   
                Dina Bitton and   
                    Qi Yang and   
              Richard Bruno and   
                    John Tullis   Efficient placement of audio data on
                                  optical disks for real-time applications 862--871
               Karen A. Frenkel   The next generation of interactive
                                  technologies . . . . . . . . . . . . . . 872--881

Communications of the ACM
Volume 32, Number 8, 1989

           J. Michael Jakes and   
                E. Robert Yoche   Basic Principles of Patent Protection
                                  for Computer Software  . . . . . . . . . 922--924
            Douglas Schuler and   
                 Jonathan Jacky   Introduction --- computing and social
                                  responsibilities . . . . . . . . . . . . 925--927
           Donald H. Berman and   
               Carole D. Hafner   The potential of artificial intelligence
                                  to help solve the crisis in our legal
                                  system . . . . . . . . . . . . . . . . . 928--938
              Jack Beusmans and   
                 Karen Wieckert   Computing, research, and war: if
                                  knowledge is power, where is
                                  responsibility?  . . . . . . . . . . . . 939--951
              Richard E. Ladner   Computer accessibility for federal
                                  workers with disabilities: it's the law  952--956
                    Jack Minker   Scientific Freedom and Human Rights of
                                  Computer Professionals --- 1989  . . . . 957--974
             Toby J. Teorey and   
              Guangping Wei and   
          Deborah L. Bolton and   
                 John A. Koenig   ER model clustering as an aid for user
                                  communication and documentation in
                                  database design  . . . . . . . . . . . . 975--987
                Steve Rozen and   
                  Dennis Shasha   Using a relational system on Wall
                                  Street: the good, the bad, the ugly, and
                                  the ideal  . . . . . . . . . . . . . . . 988--994
                Pai-Chun Ma and   
         Frederic H. Murphy and   
                Edward A. Stohr   A Graphics Interface for Linear
                                  Programming  . . . . . . . . . . . . . . 996--1012
                   Fatin Sezgin   On efficient and portable combined
                                  random number generators . . . . . . . . 1019--1020
            Rick L. Edgeman and   
           Paul W. Abrahams and   
            Francis M. Sand and   
            James Crawford, Jr.   Random Number Generators and the Minimal
                                  Standard . . . . . . . . . . . . . . . . 1020--1024

Communications of the ACM
Volume 32, Number 9, September, 1989

     Christopher J. Van Wyk and   
                  Norman Ramsey   Literate Programming: Waving a
                                  Language-Independent WEB . . . . . . . . 1051--1055
                   John Sculley   The Relationship Between Business and
                                  Higher Education: a Perspective on the
                                  21st Century . . . . . . . . . . . . . . 1056--1061
           John D. McGregor and   
                Arthur M. Riehl   Support for Multiprocessing
                                  (Introduction to the Special Section)    1062--1064
         Anthony E. Terrano and   
            Stanley M. Dunn and   
               Joseph E. Peters   Using an architectural knowledge base to
                                  generate code for parallel computers . . 1065--1072
           Carolyn McCreary and   
                     Helen Gill   Automatic determination of grain size
                                  for efficient parallel processing  . . . 1073--1078
          Wan-Hong S. Cheng and   
           Virgil E. Wallentine   DEBL: a Knowledge-Based Language for
                                  Specifying and Debugging Distributed
                                  Programs . . . . . . . . . . . . . . . . 1079--1084
    Charles J. Fleckenstein and   
             David Hemmendinger   Using a global name space for parallel
                                  execution of UNIX tools  . . . . . . . . 1085--1090
                 C. Gordon Bell   The future of high performance computers
                                  in science and engineering . . . . . . . 1091--1101
           Ronald J. Norman and   
          Jay F. Nunamaker, Jr.   CASE productivity perceptions of
                                  software engineering professionals . . . 1102--1108
               Rui Feng Zhu and   
                  Tadao Takaoka   A Technique for Two-Dimensional Pattern
                                  Matching . . . . . . . . . . . . . . . . 1110--1120

Communications of the ACM
Volume 32, Number 10, October, 1989

                Jonathan Grudin   The case against user interface
                                  consistency  . . . . . . . . . . . . . . 1164--1173
                 Glenn D. Blank   A Finite and Real-Time Processor for
                                  Natural Language . . . . . . . . . . . . 1174--1189
           H. Albert Napier and   
         Richard R. Batsell and   
         Norman S. Guadango and   
                  David M. Lane   Impact of a restricted natural language
                                  interface on ease of learning and
                                  productivity . . . . . . . . . . . . . . 1190--1198
            Rudy Hirschheim and   
                 Heinz K. Klein   Four paradigms of information systems
                                  development  . . . . . . . . . . . . . . 1199--1216
                David Gries and   
                  Dorothy Marsh   The 1987 --- 1988 Taulbee survey . . . . 1217--1224
              Monty Newborn and   
                    Danny Kopec   Results of the nineteenth ACM North
                                  American computer chess championship . . 1225--1230
         Carol B. MacKnight and   
            Santosh Balagopalan   An evaluation tool for measuring
                                  authoring system performance . . . . . . 1231--1236
              M. V. Ramakrishna   Practical performance of Bloom filters
                                  and parallel free-text searching . . . . 1237--1239

Communications of the ACM
Volume 32, Number 11, 1989

                    Larry Press   The Toshiba T1000, IBM's Academic
                                  Computing Conference and SPARC PCs . . . 1292--1298
               Karen A. Frenkel   HDTV and the computer industry . . . . . 1300--1312
       William W. Cotterman and   
                  Kuldeep Kumar   User cube: a taxonomy of end users . . . 1313--1320
            Gerald E. Evans and   
                 Mark G. Simkin   What best predicts computer proficiency? 1322--1327
      Detmar W. Straub, Jr. and   
              James C. Wetherbe   Information Technologies for the 1990's:
                                  An Organizational Impact Perspective . . 1328--1339
            Victor M. Matos and   
                 Paul J. Jalics   An Experimental Analysis of the
                                  Performance of Fourth Generation Tools
                                  on PCs . . . . . . . . . . . . . . . . . 1340--1351
        Eliezer Kantorowitz and   
                  Oded Sudarsky   The adaptable user interface . . . . . . 1352--1358
           Jayaram K. Udupa and   
                Gabor T. Herman   Volume Rendering Versus Surface
                                  Rendering  . . . . . . . . . . . . . . . 1364--1367

Communications of the ACM
Volume 32, Number 12, December, 1989

                  John McCarthy   Networks Considered Harmful for
                                  Electronic Mail  . . . . . . . . . . . . 1389--1390
             Saul Lefkowitz and   
                E. Robert Yoche   The Role of Trademarks in the Protection
                                  of Computer Software . . . . . . . . . . 1391--1393, 1396
               Peter J. Denning   A debate on teaching computing science   1397--1397
             Edsger W. Dijkstra   On the Cruelty of Really Teaching
                                  Computer Science . . . . . . . . . . . . 1398--1404
            David L. Parnas and   
             W. L. Scherlis and   
            M. H. van Emden and   
              Jacques Cohen and   
              R. W. Hamming and   
            Richard M. Karp and   
                 Terry Winograd   Colleagues Respond to Dijkstra's
                                  Comments . . . . . . . . . . . . . . . . 1405--1413
             Edsger W. Dijkstra   Dijkstra's Reply To Comments . . . . . . 1414--1414
           Thomas J. McCabe and   
              Charles W. Butler   Design complexity measurement and
                                  testing  . . . . . . . . . . . . . . . . 1415--1425
       Tarek K. Abdel-Hamid and   
              Stuart E. Madnick   Lessons learned from modeling the
                                  dynamics of software development . . . . 1426--1438
               Samson W. Tu and   
            Michael G. Kahn and   
              Mark A. Musen and   
          Lawrence M. Fagan and   
                Jay C. Ferguson   Episodic Skeletal-Plan Refinement Based
                                  on Temporal Data . . . . . . . . . . . . 1439--1455
                   Eugene Levin   Grand challenges to computation science  1456--1457
                      Bo Sanden   Entity-life modeling and structured
                                  analysis in real-time software design
                                  --- a comparison . . . . . . . . . . . . 1458--1466
           James J. Purtilo and   
               John R. Callahan   Parse tree annotations . . . . . . . . . 1467--1477

Communications of the ACM
Volume 32, Number 11, November, 1989

                          Libes   Choosing a Name for Your Computer  . . . 1289--1291


Communications of the ACM
Volume 33, Number 3, March, 1990

      Danielle R. Bernstein and   
               Joshua Stern and   
             William Ehrich and   
        Michael R. Dunlavey and   
             Leonard Zettel and   
           Bruce B. Herbert and   
                Mark Nelson and   
                W. F. Smyth and   
            Bruce W. Walker and   
           Robert M. Gordon and   
            Stephen N. Cole and   
            David B. Lightstone   ACM Forum: Debatable . . . . . . . . . . 264--271

Communications of the ACM
Volume 33, Number 4, April, 1990

             Martin Wielgus and   
          Marvin L. Watkins and   
            Edward Sacharuk and   
           Srinivasarao Damerla   ACM Forum: More Debatable  . . . . . . . 396--397


Management Science
Volume 19, Number ??, 1972

                    R. J. Brown   Chromatic scheduling and the chromatic
                                  number problem . . . . . . . . . . . . . 451--463


ACM Transactions on Mathematical Software
Volume 1, Number 3, September, 1975

                  Jayadev Misra   Remark on ``Algorithm 246: Graycode
                                  [Z]''  . . . . . . . . . . . . . . . . . 285--285


ACM Transactions on Mathematical Software
Volume 2, Number 4, December, 1976

                Mohamed el Lozy   Remark on ``Algorithm 299: Chi-Squared
                                  Integral [S15]'' . . . . . . . . . . . . 393--395


ACM Transactions on Mathematical Software
Volume 3, Number 3, September, 1977

                   Paolo Sipala   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package (Part I) [F4]'' . . . . . 303--303


ACM Transactions on Mathematical Software
Volume 4, Number 3, September, 1978

              Fred G. Gustavson   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package (Part I) [F4]'' . . . . . 295--295


ACM Transactions on Mathematical Software
Volume 5, Number 2, June, 1979

                Mohamed el Lozy   Remark on ``Algorithm 395: Student's
                                  $t$-Distribution'' and Remark on
                                  ``Algorithm 396: Student's Quantiles
                                  [S14]''  . . . . . . . . . . . . . . . . 238--239


ACM Transactions on Mathematical Software
Volume 6, Number 3, September, 1980

                   U. Harms and   
             H. Kollakowski and   
                 G. Möller   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package (Part 1) [F4]'' . . . . . 456--457


ACM Transactions on Mathematical Software
Volume 7, Number 2, June, 1981

                     G. W. Hill   Remark on ``Algorithm 395: Student's
                                  $t$-Distribution'' . . . . . . . . . . . 247--249
                     G. W. Hill   Remark on ``Algorithm 396: Student's
                                  $t$-Quantiles''  . . . . . . . . . . . . 250--251


Software --- Practice and Experience
Volume 12, Number 1, January, 1982

                A. L. Tharp and   
                      K.-C. Tai   The practicality of text signatures for
                                  accelerating string searching  . . . . . 35--44


ACM Transactions on Mathematical Software
Volume 8, Number 1, March, 1982

                Allen E. Tracht   Remark on ``Algorithm 334: Normal Random
                                  Deviates'' . . . . . . . . . . . . . . . 89--89


ACM Transactions on Mathematical Software
Volume 11, Number 4, December, 1985

                       M. C. Er   Remark on ``Algorithm 246: Graycode
                                  [Z]''  . . . . . . . . . . . . . . . . . 441--443

ACM Transactions on Mathematical Software
Volume 11, Number 2, June, 1985

                 I. D. Hill and   
                     M. C. Pike   Remark on ``Algorithm 299: Chi-Squared
                                  Integral'' . . . . . . . . . . . . . . . 185--185
                  Milan Novotny   Remark on ``Algorithm 30: Numerical
                                  Solution of the Polynomial Equation''    183--184