Last update: Fri Oct 20 14:56:48 MDT 2023
Volume 3, Number 2, February, 1960K. Samelson and Friedrich L. Bauer Sequential Formula Translation . . . . . 76--83
K. W. Ellenberger ACM Algorithm 30: Numerical Solution of the Polynomial Equation . . . . . . . . 643
Edgar T. Irons A Syntax Directed Compiler for ALGOL 60 51--55
Edward H. Sussenguth, Jr. Use of Tree Structures for Processing Files . . . . . . . . . . . . . . . . . 272--279
J. Boothroyd ACM Algorithm 246: Graycode . . . . . . 701
Edsger W. Dijkstra Solution of a Problem in Concurrent Programming Control . . . . . . . . . . 569
J. Weizenbaum ELIZA --- a Computer Program for the Study of Natural Language Communication between Man and Machine . . . . . . . . 36--44
J. B. Dennis and E. C. van Horn Programming Semantics for Multiprogrammed Computations . . . . . . 143--155
I. D. Hill and M. C. Pike ACM Algorithm 299: Chi-Squared Integral 243--244
Ward Douglas Maurer An Improved Hashcode for Scatter Storage 35--37 Robert Morris Scatter Storage Techniques . . . . . . . 38--44
Peter J. Denning The Working Set Model for Program Behaviour . . . . . . . . . . . . . . . 323--333 Edsger W. Dijkstra The structure of the ``THE''-multiprogramming system . . . . 341--346
J. R. Bell ACM Algorithm 334: Normal Random Deviates [G5] . . . . . . . . . . . . . 498
C. A. R. Hoare An Axiomatic Basis for Computer Programming . . . . . . . . . . . . . . 576--580, 583
Jay Earley An Efficient Context-Free Parsing Algorithm . . . . . . . . . . . . . . . 94--102 James R. Bell The Quadratic Quotient Method: a Hash Code Eliminating Secondary Clustering 107--109
E. F. Codd A Relational Model of Data for Large Shared Data Banks . . . . . . . . . . . 377--387
G. W. Hill ACM Algorithm 395: Student's $t$-Distribution . . . . . . . . . . . . 617--619 G. W. Hill ACM Algorithm 396: Student's $t$-Quantiles . . . . . . . . . . . . . 619--620
Niklaus Wirth Program Development by Stepwise Refinement . . . . . . . . . . . . . . . 221--227 J. M. McNamee ACM Algorithm 408: a Sparse Matrix Package (Part I) . . . . . . . . . . . . 265--273
M. C. Harrison Implementation of the Substring Test by Hashing . . . . . . . . . . . . . . . . 777--779
David Lorge Parnas A technique for software module specification with examples . . . . . . 330--336
H. Kuki and W. J. Cody A Statistical Study of the Accuracy of Floating Point Number Systems . . . . . 223--230
Dennis M. Ritchie and Ken Thompson The UNIX Time-Sharing System . . . . . . 365--375
Dorothy E. Denning A Lattice Model of Secure Information Flow . . . . . . . . . . . . . . . . . . 236--243
Robert M. Metcalfe and David R. Boggs Ethernet: Distributed Packet Switching for Local Computer Networks . . . . . . 395--404
Robert S. Boyer and J. Strother Moore A Fast String Searching Algorithm . . . 762--772
C. A. R. Hoare Corrigendum: ``Communicating Sequential Processes'' . . . . . . . . . . . . . . 958--958
Ronald L. Rivest and Adi Shamir and Leonard M. Adleman A Method for Obtaining Digital Signatures and Public-Key Cryptosystems 120--126
C. A. R. Hoare Communicating Sequential Processes . . . 666--677
Daniel Brélaz New Methods to Color Vertices of a Graph 251--256
P. O'Neill and A. O'Neill Performance Statistics of a Time Sharing Network at a Small University . . . . . 10--13 Lawrence J. Mazlack Identifying Potential to Acquire Programming Skill . . . . . . . . . . . 14--17 R. J. Cichelli Minimal Perfect Hash Functions Made Simple . . . . . . . . . . . . . . . . . 17--19 Harold Abelson and Peter Andreae Information Transfer and Area-Time Tradeoffs for VLSI Multiplication . . . 20--23 Jeffrey M. Lane and Loren C. Carpenter and J. Turner Whitted and James F. Blinn Scan Line Methods for Displaying Parametrically Defined Surfaces . . . . 23--34 Stephen T. Kent Technical Correspondence: On Secure Personal Computing . . . . . . . . . . . 35--36 Dorothy E. Denning Technical Correspondence: On Secure Personal Computing . . . . . . . . . . . 36--39 Doug Bates and Ronald S. Lemos Technical Correspondence: On Statistical Analysis . . . . . . . . . . . . . . . . 39--40 Anonymous Correction: List of Contributors to the CS Report [Comm. ACM, March 1979] . . . 40--40
Anthony Ralston and Mary Shaw Curriculum '78 --- Is Computer Science Really that Unmathematical . . . . . . . 67--70 M. D. Canon and D. H. Fritz and John H. Howard and T. D. Howell and Michael F. Mitoma and Juan Rodriguez-Rossel A Virtual Machine Emulator for Performance Evaluation . . . . . . . . . 71--80 David Redell and Yogen Dalal and Thomas Horsley and Hugh Lauer and William Lynch and Paul McJones and Hal Murray and Stephen Purcell Pilot: An Operating System for a Personal Computer . . . . . . . . . . . 81--92 J. K. Ousterhout and D. A. Scelza and P. S. Sindhu Medusa: an experiment in distributed operating system structure . . . . . . . 92--105 Butler W. Lampson and David D. Redell Experience with Processes and Monitors in Mesa . . . . . . . . . . . . . . . . 105--117 B. J. Walker and R. A. Kemmerer and G. J. Popek Specification and Verification of the UCLA Unix Security Kernel . . . . . . . 118--131
Daniel D. McCracken John W. Mauchly: 1907--1980 . . . . . . 143--143 Isaac L. Auerbach A Tribute to John William Mauchly . . . 144 J. Presper Eckert Eulogy: Delivered in St. Anthony's Church, Ambler, Pennsylvania, at funeral services on January 11, 1980 . . . . . . 145--146 Robert F. Ling General Considerations on the Design of an Interactive System for Data Analysis 147--154 C. W. Fraser A Generalized Text Editor . . . . . . . 154--158 K. P. Lee A Linear Algorithm for Copying Binary Trees Using Bounded Workspace . . . . . 159--162 H. Samet Region representation: Quadtrees from boundary codes . . . . . . . . . . . . . 163--170 C. R. Dyer and A. Rosenfeld and H. Samet Region representation: Boundary codes from quadtrees . . . . . . . . . . . . . 171--179
Charles L. Gold and Seymour E. Goodman and Benjamin G. Walker Software: Recommendations for an Export Control Policy . . . . . . . . . . . . . 199--207 R. E. Brooks Studying programming behavior experimentally: The problems of proper methodology . . . . . . . . . . . . . . 207--213 Jon Louis Bentley Multidimensional Divide-and-Conquer . . 214--229 Jean Vuillemin A Unifying Look at Data Structures . . . 229--239
Robert L. Glass Real-Time: The ``Lost World'' of Software Debugging and Testing . . . . . 264--271 Joshua Turner The Structure of Modular Programs . . . 272--277 Ishwar K. Sethi and B. Chatterjee Conversion of Decision Tables to Efficient Sequential Testing Procedures 279--285 Rik Maes An Algorithmic Approach to the Conversion of Decision Grid Charts into Compressed Decision Tables . . . . . . . 286--293 Arthur Gill Hierarchical Binary Search . . . . . . . 294--300 Lionel E. Deimel, Jr. On a matrix chain product algorithm. Correction to: ``An $O(n)$ algorithm for determining a near-optimal computation order of matrix chain products'' [Comm. ACM, 21, 1978, 544--549, MR 80a:68037] by F. Y. Chin. With a reply by Chin . . 301
Roger House Comments on Program Specification and Testing . . . . . . . . . . . . . . . . 324--331 Jack A. Chambers and Jerry W. Sprecher Computer Assisted Instruction: Current Trends . . . . . . . . . . . . . . . . . 332--342 Turner Whitted An Improved Illumination Model for Shaded Display . . . . . . . . . . . . . 343--349 John G. Fletcher A More General Algorithm for Computing Closed Semiring Costs Between Vertices of a Directed Graph . . . . . . . . . . 350--351
Y. Banno and H. Hirose and Y. Karita and H. Mawatari and H. Murakami and H. Takahashi and S. Yashiro and H. Yoshiki and N. Hagiwara and Y. Sakurai KEKOPEN, An Open Batch Processing System at KEK . . . . . . . . . . . . . . . . . 368--378 David Harel On Folk Theorems . . . . . . . . . . . . 379--389 R. C. H. Cheng and G. M. Feast Gamma variate generators with increased shape parameter range . . . . . . . . . 389--394 Fabrizio Luccio and Linda Pagli Comment on Generalized AVL Trees . . . . 394--395 Stuart K. Card and Thomas P. Moran and Allen Newell The Keystroke-Level Model for User Performance Time with Interactive Systems . . . . . . . . . . . . . . . . 396--410
J. M. Triance and J. F. S. Yow MCOBOL --- a Prototype Macro Facility for Cobol . . . . . . . . . . . . . . . 432--439 Michael T. Compton Easing Fault Location in Large Systems 440--442 Kenneth E. Iverson Notation as a Tool of Thought . . . . . 444--465 G. Peterson and A. B. Budgor The Computer Language Mathsy and Applications to Solid State Physics . . 466--474 Maurice H. Halstead and Victor B. Schneider Self-Assessment Procedure VII: a Self-Assessment Procedure Dealing with Software Science . . . . . . . . . . . . 475--480
Dennis E. Hall and Deborah K. Scherrer and Joseph S. Sventek A Virtual Operating System . . . . . . . 495--502 Hitohisa Asai An overrelaxation for a numerical inverse of a constant . . . . . . . . . 503--510 B. Kumar and E. S. Davidson Computer System Design Using a Hierarchical Approach to Performance Evaluation . . . . . . . . . . . . . . . 511--521 John L. Pfaltz and William J. Berman and Edgar M. Cagley Partial-Match Retrieval Using Indexed Descriptor Files . . . . . . . . . . . . 522--528
Donald R. Chand and Surya B. Yadav Logical Construction of Software . . . . 546--555 Henry F. Ledgard and John A. Whiteside and Andrew Singer and William Seymour The Natural Language of Interactive Systems . . . . . . . . . . . . . . . . 556--563 Y. Bard A Model of shared DASD and Multipathing 564--572 K. Mani Chandy and Charles H. Sauer Computational algorithms for product form queueing networks . . . . . . . . . 573--583 D. Potier and P. LeBlanc Analysis of Locking Policies in Database Management Systems . . . . . . . . . . . 584--593
Curtis R. Cook and Do Jin Kim Best Sorting Algorithms for Nearly Sorted Lists . . . . . . . . . . . . . . 620--624 M. L. V. Pitteway and D. J. Watkinson Bresenham's algorithm with grey scale 625--626 D. S. Hirschberg and J. B. Sinclair Decentralized Extrema-Finding in Circular Configurations of Processors 627--628 Guy Lewis Steele, Jr. and Gerald Jay Sussman Design of a Lisp-based Processor . . . . 628--645 M. Hofri Disk scheduling: FCFS vs. SSTF revisited 645--653
James Lyle Peterson Computer Programs for Detecting and Correcting Spelling Errors . . . . . . . 676--687 Patrick H. Winston Learning and Reasoning by Analogy . . . 689--702 Hanan Samet Deletion in two-dimensional quad trees 703--710 John F. Shoch and Jon A. Hupp Measured performance of an Ethernet local network . . . . . . . . . . . . . 711--721 Anonymous 1980 Index by Subject to Algorithms . . 722--722 Anonymous Index to Communications of the ACM, Volume 23, 1980 . . . . . . . . . . . . 723--727 G. Jaeschke and G. Osterburg Technical Correspondence: On Cichelli's Minimal Perfect Hash Functions Method 728--729 R. J. Cichelli Technical Correspondence: On Cichelli's Minimal Perfect Hash Functions Method 728--729 John McClintock and Paul Klint Technical Correspondence: Algol-W Approach to Line Number Maintenance . . 729--729
Barry Dwyer One More Time --- How to Update a Master File . . . . . . . . . . . . . . . . . . 3--8 Glenn Ricart and Ashok K. Agrawala An Optimal Algorithm for Mutual Exclusion in Computer Networks . . . . . 9--17 Paul Pritchard A sublinear additive sieve for finding prime numbers . . . . . . . . . . . . . 18--23 Peter G. W. Keen Information Systems and Organizational Change . . . . . . . . . . . . . . . . . 24--33
Fred N. Krull Experience With ILIAD: a High-Level Process Control Language . . . . . . . . 66--72 E. J. Gauss Pracniques: Built-In Checklist Reduces File Destruction . . . . . . . . . . . . 73 Charles Anthony Richard Hoare The Emperor's Old Clothes . . . . . . . 75--83 David Chaum Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms . . . 84--88 M. L. V. Pitteway and D. J. Watkinson Corrigendum: ``Bresenham's algorithm with grey scale'' . . . . . . . . . . . 88--88 Arnold L. Rosenberg On Uniformly Inserting One Data Structure into Another . . . . . . . . . 88--90
Marilyn M. Mantai The Effect of Programming Team Structures on Programming Tasks . . . . 106--113 Kenneth I. Magel and Richard H. Austing and Alfs Berztiss and Gerald L. Engel and John W. Hamblen and A. A. J. Hoffmann and Robert Mathis Recommendations for Master's Level Programs in Computer Science --- a Report of the ACM Curriculum Committee on Computer Science . . . . . . . . . . 115--123 Jay F. Nunamaker Educational Programs in Information Systems . . . . . . . . . . . . . . . . 124--133 Jack Minker Computer Scientists Whose Scientific Freedom and Human Rights Have Been Violated: a Report of the ACM Committee on Scientific Freedom and Human Rights 134--139 G. R. Andrews Parallel Programs: Proofs, Principles, and Practice . . . . . . . . . . . . . . 140--146 Abbe Mowshowitz On Approaches to the Study of Social Issues in Computing . . . . . . . . . . 146--155
Richard E. Nance The time and state relationships in simulation modeling . . . . . . . . . . 173--179 Tuncer I. Ören Concepts and Criteria to Access Acceptability of Simulation Studies: a Frame of References . . . . . . . . . . 180--189 Osman Balci and Robert G. Sargent A methodology for cost-risk analysis in the statistical validation of simulation models . . . . . . . . . . . . . . . . . 190--197 K. M. Chandy and I. Misra Asynchronous Distributed Simulation via a Sequence of Parallel Computations . . 198--206 Gordon M. Clark Use of Pólya distributions in approximate solutions to nonstationary ${M}/{M}/s$ queues . . . . . . . . . . . . . . . . . 206--217 T. J. Schriber and R. W. Andrews A conceptual framework for research in the analysis of simulation output . . . 218--232 Philip Heidelberger and Peter D. Welch A spectral method for confidence interval generation and run length control in simulations . . . . . . . . . 233--245 Lee W. Schruben Control of initialization bias in multivariate simulation response . . . . 246--252 J. H. Donnelly and R. E. Shannon Minimum mean-squared-error estimators for simulation experiments . . . . . . . 253--259 P. Heidelberger and P. A. W. Lewis Regression-adjusted estimates for regenerative simulations, with graphics 260--273
Charles R. Litecky and Larry E. Rittenberg The External Auditor's Review of Computer Controls . . . . . . . . . . . 288--295 P. J. Robinson and Dave Singer Another Spelling Correction Program . . 296--297 Robert P. Nix Experience With a Space Efficient Way to Store a Dictionary . . . . . . . . . . . 297--298 J. Inglis Pracniques: Updating a Master File --- Yet One More Time . . . . . . . . . . . 299 Franco P. Preparata and Jean Vuillemin The Cube-Connected Cycles: a Versatile Network for Parallel Computation . . . . 300--309 Dana H. Ballard Strip Trees, a Hierarchical Representation for Curves . . . . . . . 310--321
Dan W. Crockett Triform Programs . . . . . . . . . . . . 344--350 Joseph Traub Quo Vadimus: Computer Science in a Decade . . . . . . . . . . . . . . . . . 351--369 Peter J. Denning and Edward A. Feigenbaum and Paul Gilmore and Anthony C. Hearn and Robert W. Ritchie and Joseph F. Traub The Snowbird Report: a Discipline in Crisis . . . . . . . . . . . . . . . . . 370--374 John A. N. Lee Response to the Federal Trade Commission's Proposed Ruling on Standards and Certification . . . . . . 375--380 Martin A. Fischler and Robert C. Bolles Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography . . . 381--395
M. Stonebraker Operating System Support for Database Management . . . . . . . . . . . . . . . 412--418 Anthony Ralston The Proposed New Computing Reviews Classification Scheme, a Report of the Computing Reviews Category Revision Committee . . . . . . . . . . . . . . . 419--433 Peter J. Denning and David H. Brandin Special Report: Report of the Public Cryptography Study Group . . . . . . . . 434--434 Werner A. Baum and David H. Brandin and R. Creighton Buck and George I. Davida and George Handelman and Martin E. Hellman and Ira Michael Heyman and Wilfred Kaplan and Daniel C. Schwartz Report of the Public Cryptography Study Group, prepared for American Council on Education, One Dupont Circle, Washington, DC 20036, February 7, 1981 435--445 George I. Davida The Case Against Restraints on Non-Governmental Research in Cryptography . . . . . . . . . . . . . . 445--450 Harvey J. Greenberg and Richard P. O'Neill Representing super-sparse matrices with perturbed values . . . . . . . . . . . . 451--456 Brian Billard Polynomial manipulation with APL . . . . 457--465 Ralph C. Merkle and Martin E. Hellman On the security of multiple encryption 465--467
Richard A. Demers System Design for Usability . . . . . . 494--501 William L. Ash Mxec: Parallel Processing with an Advanced Macro Facility . . . . . . . . 502--509 Richard E. Mayer and Piraye Bayman Psychology of Calculator Languages: a Framework for Describing Differences in Users' Knowledge . . . . . . . . . . . . 511--520 Alan Jay Smith Long-Term File Migration: Development and Evaluation of Algorithms . . . . . . 521--532 D. E. Denning and M. S. Sacco Timestamps in Key Distribution Protocols 533--536
P. J. Denning Computer Architecture: Some Old Ideas that Haven'T Quite Made It Yet . . . . . 553--554 Barry Dwyer A User-Friendly Algorithm . . . . . . . 556--561 Tim Teitelbaum and Thomas Reps The Cornell Program Synthesizer: a Syntax-directed Programming Environment 563--573 J. O'Rourke An on-line algorithm for fitting straight lines between data ranges . . . 574--578 P. Quittner and S. Csoka and S. Halasz and D. Kotsis and K. Varnai Comparison of Synonym Handling and Bucket Organization Methods . . . . . . 579--582 R. J. McEliece and D. V. Sarwate On sharing secrets and Reed--Solomon codes . . . . . . . . . . . . . . . . . 583--584 Jane Fedorowicz Comments on Price/Performance Patterns of U.S. Computer Systems . . . . . . . . 585--586 Gail E. Kaiser Automatic Extension of an ATN Knowledge Base . . . . . . . . . . . . . . . . . . 587--593 Christopher E. Rothe An Abstract Programming Model . . . . . 594--596 Jay Gischer Shuffle Languages, Petri Nets, and Context-Sensitive Grammars . . . . . . . 597--605 Michael R. Dunlavey Letter to the Editor: On Spelling Correction and Beyond . . . . . . . . . 608--608 Lance A. Miller Letter to the Editor: On Spelling Correction and Beyond . . . . . . . . . 608--609 James L. Peterson Letter to the Editor: On Spelling Correction and Beyond . . . . . . . . . 609--609
Donald D. Chamberlin and Morton M. Astrahan and Michael W. Blasgen and James N. Gray and W. Frank King and Bruce G. Lindsay and Raymod Lorie and James W. Mehl and Thomas G. Price and Franco Putzolo and Patricia Griffiths Selinger and Mario Schkolnick and Donald R. Slutz and Irving L. Traiger and Bradford W. Wade and Robert A. Yost A History and Evaluation of System R . . 632--646 Peter Wegner Self-Assessment Procedure VIII: a Self-Assessment Procedure Dealing with the Programming Language Ada . . . . . . 647--678 Daniel Robey Computer Information Systems and Organization Structure . . . . . . . . . 679--687 Peter J. Denning and T. Don Dennis and Jeffrey A. Brumfield Low Contention Semaphores and Ready Lists . . . . . . . . . . . . . . . . . 687--699 David A. Patterson An Experiment in High Level Language Microprogramming and Verification . . . 699--709
P. Denning Performance Analysis: Experimental computer science at its best . . . . . . 725--727 Saul I. Gass and Karla L. Hoffman and Richard H. F. Jackson and Lambert S. Joel and Patsy B. Saunders Documentation for a Model: a Hierarchical Approach . . . . . . . . . 728--733 M. A. Pechura Microcomputers as remote nodes of a distributed system . . . . . . . . . . . 734--738 Starr Roxanne Hiltz and Murray Turoff The Evolution of User Behavior in a Computerized Conference System . . . . . 739--751 Izak Benbasat and Albert S. Dexter and Paul S. Masulis An Experimental Study of the Human/Computer Interface . . . . . . . . 752--762 Bennet P. Lientz and E. Burton Swanson Problems in Application Software Maintenance . . . . . . . . . . . . . . 763--769 Leslie Lamport Technical Note: Password Authentication with Insecure Communication . . . . . . 770--772 Paul Pritchard Corrigendum: ``A sublinear additive sieve for finding prime numbers'' . . . 772--772 K. S. Booth Authentication of Signatures Using Public Key Encryption . . . . . . . . . 772--774
Leonard J. Bass and Ralph E. Bunker A Generalized User Interface for Applications Programs . . . . . . . . . 796--800 William M. McCormack and Robert G. Sargent Analysis of future event set algorithms for discrete event simulation . . . . . 801--812 Per Galle An Algorithm for Exhaustive Generation of Building Floor Plans . . . . . . . . 813--825 John H. Blackstone, Jr. and Gary L. Hogg and Don T. Phillips A two-list synchronisation procedure for discrete event simulation . . . . . . . 825--829 G. Jaeschke Reciprocal Hashing: a Method for Generating Minimal Perfect Hashing Functions . . . . . . . . . . . . . . . 829--833
F. A. Briggs and M. Dubois Performance of cache-based multiprocessors . . . . . . . . . . . . 181--190
G. G. Gustafson and Roberta J. Kerr Some Practical Experience with a Software Quality Assurance Program . . . 4--12 Jean E. Sammet and Anthony Ralston The New (1982) Computing Reviews Classification System --- Final Version 13--25 Jane J. Robinson DIAGRAM: a Grammar for Dialogues . . . . 27--47 J. H. Ahrens and U. Dieter Generating Gamma variates by a modified rejection technique . . . . . . . . . . 47--54 Ben Shneiderman Control Flow and Data Structure Documentation: Two Experiments . . . . . 55--63 Jon Louis Bentley and Mark G. Faust and Franco P. Preparata Approximation algorithms for convex hulls . . . . . . . . . . . . . . . . . 64--68
Howard Mozeico A Human/Computer Interface to Accommodate User Learning Stages . . . . 100--104 L. A. Welsch Using electronic mail as a teaching tool 105--108 E. F. Codd Relational Database: a Practical Foundation for Productivity . . . . . . 109--117 Patrick G. Skelly The ACM Position on Standardization of the Ada Language . . . . . . . . . . . . 118--120 Henry F. Ledgard and Andrew Singer Scaling Down Ada (Or Towards a Standard Ada Subset) . . . . . . . . . . . . . . 121--125 K. M. Chandy and D. Neuse Linearizer: a heuristic algorithm for queueing network models of computing systems . . . . . . . . . . . . . . . . 126--134 John Zahorjan and Kenneth C. Sevcik and Derek L. Eager and Bruce Galler Balanced job bound analysis of queueing networks . . . . . . . . . . . . . . . . 134--141 P. A. Jacobson and E. D. Lazowska Analyzing queueing networks with simultaneous resource possession . . . . 142--151
Peter J. Denning Electronic Junk . . . . . . . . . . . . 163--165 John F. Shoch and Jon A. Hupp Computing Practices: The `Worm' Programs --- Early Experience with a Distributed Computation . . . . . . . . . . . . . . 172--180 Eric A. Weiss Self-Assessment Procedure IX: a self-assessment procedure dealing with ethics in computing . . . . . . . . . . 181--195 Anthony I. Wasserman and Steven Gutz The Future of Programming . . . . . . . 196--206 Edward H. McCall Performance Results of the Simplex Algorithm for a Set of Real-World Linear Programming Models . . . . . . . . . . . 207--212 Brian Billard Corrigendum: ``Polynomial manipulation with APL'' . . . . . . . . . . . . . . . 213--213
Marvin L. Watkins A Technique for Testing Command and Control Software . . . . . . . . . . . . 228--232 James G. Mitchell and Jeremy Dion A Comparison of Two Network-Based File Servers . . . . . . . . . . . . . . . . 233--245 Alfred Z. Spector Performing remote operations efficiently on a local computer network . . . . . . 246--260 Andrew D. Birrell and Roy Levin and Roger M. Needham and Michael D. Schroeder Grapevine: an exercise in distributed computing . . . . . . . . . . . . . . . 260--274 D. K. Gifford and A. K. Jones Cryptographic Sealing for Information Security and Authentication . . . . . . 274--286
William E. Howden Contemporary Software Development Environments . . . . . . . . . . . . . . 318--329 Norihisa Suzuki Analysis of Pointer ``Rotation'' . . . . 330--335 Wm. Randolph Franklin On an Improved Algorithm for Decentralized Extrema Finding in Circular Configurations of Processors 336--337 Richard C. Morey Estimating and Improving the Quality of Information in a MIS . . . . . . . . . . 337--342
Michael R. Levy Modularity and the Sequential File Update Problem . . . . . . . . . . . . . 362--367 D. J. Dodds Pracniques: Reducing Dictionary Size by Using a Hashing Technique . . . . . . . 368--370 A. Fournier and D. Fussell and L. Carpenter Computer Rendering of Stochastic Models 371--384
James W. Brown Controlling the Complexity of Menu Networks . . . . . . . . . . . . . . . . 412--418 Bertrand Meyer Principles of Package Design . . . . . . 419--428 Greg Kearsley Authoring Systems in Computer Based Education . . . . . . . . . . . . . . . 429--437 William Swartout and Robert Balzer On the Inevitable Intertwining of Specification and Implementation . . . . 438--440 Bruce Gilchrist and Arlaana Shenkin The Impact of Scanners on Employment in Supermarkets . . . . . . . . . . . . . . 441--445 Mark Weiser Programmers Use Slices When Debugging 446--452 Dennis Tsichritzis Form management . . . . . . . . . . . . 453--478 Om Vikas and V. Rajaraman Searching in a Dynamic Memory with Fast Sequential Access . . . . . . . . . . . 479--484 T-Y. Cheung Estimating Block Accesses and Number of Records in File Management . . . . . . . 484--487
James L. Elshoff and Michael Marcotty Improving Computer Program Readability to Aid Modification . . . . . . . . . . 512--521 T. N. Turba Length-segmented lists . . . . . . . . . 522--526 Robert F. Simmons and Daniel L. Chester Relating Sentences and Semantic Networks with Procedural Logic . . . . . . . . . 527--547 T. Berk and L. Brownston and A. Kaufman A Human Factors Study of Color Notation Systems for Computer Graphics . . . . . 547--550 M. S. Doyle and J. W. Graham A Study of Superfluity in Storage Hierarchies . . . . . . . . . . . . . . 550--555 Clement W. H. Lam and Leonard H. Soicher Three New Combination Algorithms with the Minimal Change Property . . . . . . 555--559 Judea Pearl The Solution for the Branching Factor of the Alpha-Beta Pruning Algorithm and its Optimality . . . . . . . . . . . . . . . 559--564 Hanan Samet Heuristics for the Line Division Problem in Computer Justified Text . . . . . . . 564--571 Johannes J. Martin An Efficient Garbage Compaction Algorithm . . . . . . . . . . . . . . . 571--581 B. B. Mandelbrot Comment on Computer Rendering of Fractal Stochastic Models . . . . . . . . . . . 581--584
L. L. Gremillion Designing a Bloom Filter for Differential File Access . . . . . . . . 600--604 Michael A. Pechura File Archival Techniques Using Data Compression . . . . . . . . . . . . . . 605--609 Ben Shneiderman Pracniques: Designing Computer System Messages . . . . . . . . . . . . . . . . 610--611 Seymour E. Goodman U.S. Computer Export Control Policies: Value Conflicts and Policy Choices . . . 613--623 David Chapman A Program Testing Assistant . . . . . . 625--634 Yong Tsui Lee and Aristides A. G. Requicha Algorithms for Computing the Volume and Other Integral Properties of Solids. I. Known Methods and Open Issues . . . . . 635--641 Y. T. Lee and A. A. G. Requicha Algorithms for Computing the Volume and Other Integral Properties of Solids. II. A Family of Algorithms Based on Representation Conversion and Cellular Approximation . . . . . . . . . . . . . 642--650 Lubomir Bic A Protection Model and Its Implementation in a Dataflow System . . 650--658 Francis Y. Chin and John Lam and I Ngo Chen Efficient parallel algorithms for some graph problems . . . . . . . . . . . . . 659--665
J. F. Isner A Fortran Programming Methodology based on Data Abstraction . . . . . . . . . . 686--698 Mark L. Gillenson The State of Practice of Data Administration--1981 . . . . . . . . . . 699--706 Lester Lipsky and Chee-Min Henry Lieu and Abolfazl Tehranipour and Appie van de Liefvoort On the Asymptotic Behavior of Time-Sharing Systems . . . . . . . . . . 707--714 Leland L. Beck A Dynamic Storage Allocation Technique Based on Memory Residence Time . . . . . 714--724 Jacques Cohen Computer-assisted microanalysis of programs . . . . . . . . . . . . . . . . 724--733 William A. Kornfeld Combinatorially Implosive Algorithms . . 734--738 J. Nievergelt and F. P. Preparata Plane-Sweep Algorithms for Intersecting Geometric Figures . . . . . . . . . . . 739--747 P. A. Houle Comment on gamma deviate generation . . 747--748
Thomas L. Wicklund MINI-EXEC: a Portable Executive for $8$-Bit Microcomputers . . . . . . . . . 772--780 E. J. Gauss Pracniques: The ``Wolf Fence'' Algorithm for Debugging . . . . . . . . . . . . . 780 Jay F. Nunamaker, Jr. and J. Daniel Couger and Gordon B. Davis Information Systems Curriculum Recommendations for the 80s: Undergraduate and Graduate Programs . . 781--805 Theodor D. Sterling Unionization of Professionals in Data Processing: An Assessment of Recent Trends . . . . . . . . . . . . . . . . . 807--816 B. J. Lageweg and J. K. Lenstra and A. H. G. Rinnooy Kan Computer-Aided Complexity Classification of Combinatorial Problems . . . . . . . 817--822 W. Y.-P. Lim HISDL: a structure description language 823--830 A. M. Langer and A. W. Shum The Distribution of Granule Accesses Made by Database Transactions . . . . . 831--832 K. M. Chandy and J. Misra Distributed Computation on Graphs: Shortest Path Algorithms . . . . . . . . 833--837 Margrethe H. Olson and Henry C. Lucas, Jr. The Impact of Office Automation on the Organization: Some Implications for Research and Practice . . . . . . . . . 838--847
Michael Evans Software Engineering for the Cobol Environment . . . . . . . . . . . . . . 874--882 Roger S. Gourd Self-Assessment Procedure X: a Self-Assessment Procedure Dealing with Software Project Management . . . . . . 883--887 Jack Minker Computer Professionals Whose Scientific Freedom and Human Rights Have Been Violated --- 1982 . . . . . . . . . . . 888--894 Art Lew On the Emulation of Flowcharts by Decision Tables . . . . . . . . . . . . 895--905 I. Gargantini An Effective Way to Represent Quadtrees 905--910 J. S. Vitter Implementations for Coalesced Hashing 911--926 M. J. O'Donnell A Critique of the Foundations of Hoare Style Programming Logics . . . . . . . . 927--934 M. Mor and A. S. Fraenkel A Hash Code Method for Detecting and Correcting Spelling Errors . . . . . . . 935--938 C. M. Eastman A Comment on English Neologisms and Programming Language Keywords . . . . . 938--940
K. Samelson and Friedrich L. Bauer Sequential Formula Translation (Reprint) 9--13 Edgar T. Irons A Syntax Directed Compiler for ALGOL 60 (Reprint) . . . . . . . . . . . . . . . 14--16 Edward H. Sussenguth, Jr. Use of Tree Structures for Processing Files (Reprint) . . . . . . . . . . . . 17--20 Edsger W. Dijkstra Solution of a Problem in Concurrent Programming Control (Reprint) . . . . . 21--22 Joseph Weizenbaum ELIZA --- a Computer Program For the Study of Natural Language Communication Between Man And Machine (Reprint) . . . 23--28 Jack B. Dennis and Earl C. Van Horn Programming Semantics for Multiprogrammed Computations (Reprint) 29--35 W. D. Maurer An Improved Hash Code for Scatter Storage (Reprint) . . . . . . . . . . . 36--38 Robert Morris Scatter Storage Techniques (Reprint) . . 39--42 Peter J. Denning The Working Set Model for Program Behaviour (Reprint) . . . . . . . . . . 43--48 Edsger W. Dijkstra The Structure of the ``THE''-Multiprogramming System (Reprint) . . . . . . . . . . . . . . . 49--52 C. A. R. Hoare An Axiomatic Basis for Computer Programming (Reprint) . . . . . . . . . 53--56 Jay Earley An Efficient Context-Free Parsing Algorithm (Reprint) . . . . . . . . . . 57--61 James R. Bell The Quadratic Quotient Method: a Hash Code Eliminating Secondary Clustering (Reprint) . . . . . . . . . . . . . . . 62--63 E. F. Codd A Relational Model of Data for Large Shared Data Banks (Reprint) . . . . . . 64--69 Niklaus Wirth Program Development by Stepwise Refinement (Reprint) . . . . . . . . . . 70--74 David Lorge Parnas A Technique for Software Module Specification with Examples (Reprint) 75--78 H. Kuki and W. J. Cody A statistical study of the accuracy of floating point number systems (Reprint) 79--83 Dennis M. Ritchie and Ken Thompson The UNIX Time-Sharing System (Reprint) 84--89 Robert M. Metcalfe and David R. Boggs Ethernet: Distributed Packet Switching for Local Computer Networks . . . . . . 90--95 R. L. Rivest and A. Shamir and L. Adleman A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint) . . . . . . . . . . . . . . . 96--99 C. A. R. Hoare Communicating Sequential Processes (Reprint) . . . . . . . . . . . . . . . 100--106
Ahmed S. Zaki Regulation of Electronic Funds Transfer: Impact and Legal Issues . . . . . . . . 112--118 Gordon Bell The Computer Museum Member's First Field Trip: The Northbay AN/FSQ7 Sage Site . . 118--119 W. Kent A Simple Guide to Five Normal Forms in Relational Database Theory . . . . . . . 120--125 R. Charles Bell Monte Carlo Debugging: a Brief Tutorial 126--127 Iris Vessey and Ron Weber Some Factors Affecting Program Repair Maintenance: An Empirical Study . . . . 128--134 B. Srinivasan On the Synthesis of Decision Tables . . 135--136 Michael J. Mathey and Bernard M. E. Moret The Computational Metaphor and Quantum Physics . . . . . . . . . . . . . . . . 137--145 Arthur I. Schwarz On File Compression Techniques . . . . . 148--148 Michael Pechura On File Compression Techniques: Author's Response . . . . . . . . . . . . . . . . 148--149
M. H. Olson Remote office work: changing work patterns in space and time . . . . . . . 182--187 Michael A. Pechura Comparing Two Microcomputer Operating Systems: CP/M and HDOS . . . . . . . . . 188--195 A. Chesnais and Erol Gelenbe and Isi Mitrani On the Modeling of Parallel Access to Shared Data . . . . . . . . . . . . . . 196--202 Simon S. Lam and Y. Luke Lien A tree convolution algorithm for the solution of queueing networks . . . . . 203--215 Hitohisa Asai and C. K. Cheng Speeding Up an Overrelaxation Method of Division in Radix-$2^n$ Machine . . . . 216--220
P. Abrams Electronic islands . . . . . . . . . . . 241--242 P. J. Brown Error Messages: The Neglected Area of the Man/Machine Interface? . . . . . . . 246--249 Dalia Motzkin Pracnique: MEANSORT . . . . . . . . . . 250--251 Michael L. Schneider and John C. Thomas Introduction: The Humanization of Computer Interfaces . . . . . . . . . . 252--253 Donald A. Norman Design Rules Based on Analyses of Human Error . . . . . . . . . . . . . . . . . 254--258 Robert J. K. Jacob Using Formal Specifications in the Design of a Human-Computer Interface . . 259--264 T. L. Roberts and T. P. Moran The Evaluation of Text Editors, Methodology and Empirical Results . . . 265--283 Steven L. Sauter and Mark S. Gottlieb and Karen C. Jones and Vernon N. Dodson and Kathryn M. Rohrer Job and Health Implications of VDT Use: Initial results of the Wisconsin--NIOSH Study . . . . . . . . . . . . . . . . . 284--294 J. D. Gould and J. Conti and T. Hovanyecz Composing Letters with a Simulated Listening Typewriter . . . . . . . . . . 295--308
T. R. Girill and Clement H. Luk Document: An Interactive, Online Solution to Four Documentation Problems 328--337 Michael J. Ginzberg Introduction: Three Papers from the Third International Conference on Information Systems . . . . . . . . . . 339 Tarek K. Abdel-Hamid and Stuart E. Madnick The Dynamics of Software Project Scheduling . . . . . . . . . . . . . . . 340--346 R. E. A. Mason and T. T. Carey Prototyping Interactive Information Systems . . . . . . . . . . . . . . . . 347--354 H. J. Will ACL: a Language Specific for Auditors 356--361 Richard N. Taylor A General-Purpose Algorithm for Analyzing Concurrent Programs . . . . . 362--376 John Konvalina and Stanley A. Wileman and Larry J. Stephens Math Proficiency: a Key to Success for Computer Science Students . . . . . . . 377--381 Stephen C. Hora Estimation of the inverse function for random variate generation . . . . . . . 590--594
Stephen A. Cook An Overview of Computational Complexity 400--408 Jonathan Jacky and Ira Kalet A General Purpose Data Entry Program . . 409--417 Robert W. Bemer Coordinated Text and Transparencies . . 418 Henry Lieberman and Carl Hewitt A Real-Time Garbage Collector Based on the Lifetimes of Objects . . . . . . . . 419--429 M. Lynne Markus Power, Politics, and MIS Implementation 430--444 H. Rudy Ramsey and Michael E. Atwood and James R. Van Doren Flowcharts Versus Program Design Languages: An Experimental Comparison 445--449
David P. Gardner and Yvonne W. Larsen A Nation At Risk: The Imperative for Educational Reform, Report by The National Commission on Excellence in Education . . . . . . . . . . . . . . . 467--478 Eric A. Weiss Self-Assessment Procedure XI: a Self-Assessment Procedure Dealing with One Part of Early Computing History . . 479--482 D. V. Morland Human factors guidelines for terminal interface design . . . . . . . . . . . . 484--494 Thomas K. Landauer and Kathleen M. Galotti and S. Hartwell Natural Command Names and Initial Learning: a Study of Text-Editing Terms 495--503 M.-M. Yau and S. N. Srihari A Hierarchical Data Structure for Multidimensional Digital Images . . . . 504--515 M. Fushimi and S. Tezuka The $k$-distribution of Generalized Feedback Shift Register Pseudorandom Numbers . . . . . . . . . . . . . . . . 516--523 Mark J. Cloutier and Matthew J. Friedman Precision Averaging for Real-Time Analysis . . . . . . . . . . . . . . . . 525--529
Jon Louis Bentley Programming Pearls: Cracking the Oyster 549--552 William E. Burr An overview of the proposed American National Standard for Local Distributed Data Interfaces . . . . . . . . . . . . 554--561 James V. Hansen Audit Considerations in Distributed Processing Systems . . . . . . . . . . . 562--569 James K. Mullin A Second Look at Bloom Filters . . . . . 570--571 David Lorge Parnas A Generalized Control Structure and Its Formal Definition . . . . . . . . . . . 572--581 Frank Milne and Ron Weber The Economics of Designing Generalized Software . . . . . . . . . . . . . . . . 582--589 Jürgen Peemöller A correction to Brélaz's modification of Brown's coloring algorithm . . . . . . . 595--597
Jon Louis Bentley Programming Pearls: Aha! Algorithms . . 623--628 P. McCorduck Introduction to the Fifth Generation . . 629--630 Paul S. Licker The Japanese Approach: a Better Way to Manage Programmers? . . . . . . . . . . 631--636 E. Y. Shapiro The Fifth Generation Project --- a Trip Report . . . . . . . . . . . . . . . . . 637--641 Rosalie Steier Cooperation is the Key: An Interview with B. R. Inman . . . . . . . . . . . . 642--645 T. Watanabe and T. Ohsawa and T. Suzuki A Simple Database Language for Personal Computers . . . . . . . . . . . . . . . 646--653 Andrew S. Tanenbaum and Hans van Staveren and E. G. Keizer and J. W. Stevenson A Practical Tool Kit for Making Portable Compilers . . . . . . . . . . . . . . . 654--660 Jeffrey L. Eppinger An Empirical Study of Insertion and Deletion in Binary Search Trees . . . . 663--669 Ronald Prescott Loui Optimal Paths in Graphs with Stochastic or Multidimensional Weights . . . . . . 670--676 Piraye Bayman and Richard E. Mayer A Diagnosis of Beginning Programmers' Misconceptions of BASIC Programming Statements . . . . . . . . . . . . . . . 677--679 H. Samet A Quadtree Medial Axis Transform . . . . 680--693
Jon Louis Bentley Programming Pearls: Data Structures Programs . . . . . . . . . . . . . . . . 726--730 Gerardine DeSanctis and James F. Courtney Toward Friendly User MIS Implementation 732--738 Tor Guimaraes Managing Application Program Maintenance Expenditures . . . . . . . . . . . . . . 739--746 D. A. Comer A Computer Science Research Network CSNET: a History and Status Report . . . 747--753 M. A. Pechura and J. D. Schoeffler Estimating File Access Time of Floppy Disks . . . . . . . . . . . . . . . . . 754--763 I. Durham and D. Lamb and J. Saxe Spelling correction in user interfaces 764--773 Gordon B. Davis and M. H. Schwartz Introduction to the Special Section on Information Systems Management . . . . . 775 J. F. Rockart and L. S. Flannery The Management of End-User Computing . . 776--784 Blake Ives and Margrethe H. Olson and Jack J. Baroudi The Measurement of User Information Satisfaction . . . . . . . . . . . . . . 785--793 Beverly K. Kahn Some Realities of Data Administration 794--799 John M. Ivancevich and H. Albert Napier and James C. Wetherbe Occupational Stress, Attitudes, and Health Problems in the Information Systems Professionals . . . . . . . . . 800--806 Kathryn M. Bartol Turnover Among DP Personnel: a Causal Analysis . . . . . . . . . . . . . . . . 807--811
J. F. Allen Maintaining Knowledge about Temporal Intervals . . . . . . . . . . . . . . . 832--843 Wolfgang Bibel Matings in matrices . . . . . . . . . . 844--852 Elliot Soloway and Jeffrey Bonar and Kate Ehrlich Cognitive Strategies and Looping Constructs: An Empirical Study . . . . . 853--860 Richard J. Miara and Joyce A. Musselman and Juan A. Navarro and Ben Shneiderman Program Indentation and Comprehensibility . . . . . . . . . . . 861--867 You Dong Liang and Brian A. Barsky An analysis and algorithm for polygon clipping . . . . . . . . . . . . . . . . 868--877 J. T. Postmus and A. H. G. Rinnooy Kan and G. T. Timmer An efficient dynamic selection method 878--881 Russel J. Abbott Program design by Informal English Descriptions . . . . . . . . . . . . . . 882--894 Joep L. W. Kessels On-the-Fly Optimization of Data Structures . . . . . . . . . . . . . . . 895--901 D. Wile Program developments: formal explanations of implementations . . . . 902--911 G. Gonnet and F. W. Tompa A constructive approach to the design of algorithms and their data structures . . 912--920 James F. Korsh and Gary Laison A Multiple-Stack Manipulation Procedure 921--923 R. Charles Bell and Bryan Floyd A Monte Carlo Study of Cichelli Hash-Function Solvability . . . . . . . 924--925 Jack P. C. Kleijnen and Anton J. Van Reeken Principles of Computer Charging in a University-Type Organization . . . . . . 926--932 Antoni Olivé i Ramon Information Derivability Analysis in Logical Information Systems . . . . . . 933--938 Kyu Young Whang and Gio Wiederhold and Daniel Sagalowicz Estimating Block Accesses in Database Organizations: a Closed Noniterative Formula . . . . . . . . . . . . . . . . 940--944 W. S. Luk On Estimating Block Accesses in Database Organizations . . . . . . . . . . . . . 945--947 N. Vitalari and G. Dickson Problem Solving for Effective Systems Analysis: An Experimental Exploration 948--956 Lee Schruben Simulation Modeling with Event Graphs 957--963 George S. Fishman and Bao Sheng D. Huang Antithetic variates revisited . . . . . 964--971 Raymond E. Barber and Henry C. Lucas, Jr. System Response Time, Operator Productivity, and Job Satisfaction . . . 972--986 Ron Dagwell and Ron Weber System Designers' User Models: a Comparative Study and Methodological Critique . . . . . . . . . . . . . . . . 987--997 Gabriel M. Silberman Stack Processing Techniques in Delayed-Staging Storage Hierarchies . . 999--1007 W. P. Petersen Vector Fortran for Numerical Problems on CRAY-1 . . . . . . . . . . . . . . . . . 1008--1021 Gerard Salton and Edward A. Fox and Harry Wu Extended Boolean information retrieval 1022--1036
Jon Louis Bentley Programming Pearls: Writing Correct Programs . . . . . . . . . . . . . . . . 1040--1045 S. S. Yau and R. W. Ritchie and W. Semon and J. Traub and A. Van Dam and S. Winkler Meeting the Crisis in Computer Science 1046--1050 Perry R. Morrison A Survey of Attitudes Toward Computers 1051--1057 Marc Eisenstadt A User-Friendly Software Environment for the Novice Programmer . . . . . . . . . 1058--1064 Paul J. Jalics and Thomas S. Heines Transporting a Portable Operating System: UNIX to an IBM Minicomputer . . 1066--1072 Gaston H. Gonnet Balancing Binary Trees by Internal Path Reduction . . . . . . . . . . . . . . . 1074--1081 Seiichi Nishihara and Katsuo Ikeda Reducing the retrieval time of hashing method by using predictors . . . . . . . 1082--1088
J. Bentley Programming Pearls: Algorithm Design Techniques . . . . . . . . . . . . . . . 865--871
J. L. Bentley Programming Pearls: About the Column . . 12--13 Gerald M. Berns Assessing Software Maintainability . . . 14--23 John W. Geils Why Students Reject Engineering Teching Careers . . . . . . . . . . . . . . . . 25--27 Robert I. Winner and Edward M. Carter Self-Assessment Procedure XII: a Self-Assessment Procedure Dealing with Computer Architecture . . . . . . . . . 29--36 Peter J. L. Wallis and Brian A. Wichmann Requirements Analysis for Ada Compilers 37--41 Victor R. Basili and Barry T. Perricone Software Errors and Complexity: An Empirical Investigation . . . . . . . . 42--52 Paul Pritchard Some Negative Results Concerning Prime Number Generators . . . . . . . . . . . 53--57 Henry C. Lucas, Jr. Organizational Power and the Information Services Department . . . . . . . . . . 58--65
Jon Louis Bentley Programming Pearls: Code Tuning . . . . 91--96 Brian A. Wichmann Is Ada Too Big? A Designer Answers the Critics . . . . . . . . . . . . . . . . 98--103 Pamela Zave The operational versus the conventional approach to software development . . . . 104--118 G. E. Anderson The Coordinated Use of Five Performance Evaluation Methodologies . . . . . . . . 119--125 R. C. Houghton, Jr. Online Help Systems: a Conspectus . . . 126--133 Eric C. R. Hehner Predicative Programming, Part I . . . . 134--143 Eric C. R. Hehner Predicative Programming, Part II . . . . 144--151 You Dong Liang and Brian A. Barsky Corrigendum: ``An analysis and algorithm for polygon clipping'' . . . . . . . . . 151--151 Nicola Santoro Chain multiplication of matrices of approximately or exactly the same size 152--156
Jon Louis Bentley Programming Pearls: The Back of the Envelope . . . . . . . . . . . . . . . . 180--184 Gene Dallaire and Fortney H. Stark and Hal Berghel Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools? . . . . . . . . . . . . . . 185--194 Jean B. Rogers and David G. Moursund and Gerald L. Engel Preparing Precollege Teachers for the Computer Age . . . . . . . . . . . . . . 195--200 Robert W. Blanning Conversing with Management Information Systems in Natural Language . . . . . . 201--207 Thomas A. D'Auria ACM's Visit to the People's Republic of China . . . . . . . . . . . . . . . . . 208--214 Paul J. Jalics COBOL vs. PL/1: Some Performance Comparisons . . . . . . . . . . . . . . 216--221 Gerald Bozman The Software Lookaside Buffer Reduces Search Overhead with Linked Lists . . . 222--227 Dov Dori and Moshe Ben-Bassat Efficient nesting of congruent convex figures . . . . . . . . . . . . . . . . 228--235 T. Y. Zhang and C. Y. Suen A Fast Parallel Algorithm for Thinning Digital Patterns . . . . . . . . . . . . 236--239 George Diehr and Bruce Faaland Optimal pagination of B-trees with variable-length items . . . . . . . . . 241--247 Markku Tamminen Comments on quad- and octtrees . . . . . 248--249
Jon Louis Bentley Programming Pearls: How to Sort . . . . 287--291 Gene Dallaire American Universities Need Greater Access to Supercomputers . . . . . . . . 293--298 Edward F. Hayes Access to Supercomputers: An NSF Perspective (Interview) . . . . . . . . 299--303 Anonymous Coping with the imprecision of the real world. An interview with Lotfi A. Zadeh 304--311 Peter J. Denning and Donn B. Parker and Susan H. Nycum and Willis H. Ware Computers, Crime and Privacy --- a National Dilema, Congressional Testimony from the Industry . . . . . . . . . . . 312--321 Allen B. Tucker A Perspective on Machine Translation: Theory and Practice . . . . . . . . . . 322--329 Michael C. Mulder and John F. Dalphin Computer Science Program Requirements and Accreditation, An Interim Report of the ACM/IEEE Computer Society Joint Task Force . . . . . . . . . . . . . . . . . 330--335 Jean E. Sammet and Bernard Rous Special Report: Progress Report on the ACM Guide to Computing Literature . . . 336--341 Peter G. Neumann A Further View of the First Quarter Century: Introduction to the April 1984 Special Section . . . . . . . . . . . . 343 Donald E. Knuth The Complexity of Songs (April 1984 Special Section) . . . . . . . . . . . . 344--348 R. Lawrence Clark A Linuistic Contribution to Goto-Less Programming (April 1984 Special Section) 349--350 Preet J. Nedginn and Trebor L. Bworn CLOG: An Ada Package for Automatic Footnote Generation in UNIX (April 1984 Special Section) . . . . . . . . . . . . 351 P. J. Brown Languages: Three Interviews (April 1984 Special Section) . . . . . . . . . . . . 352--355 J. B. Cadwallader-Cohen and W. W. Zysic and R. B. Donnelly The Chaostron: An Important Advance in Learning Machines (April 1984 Special Section) . . . . . . . . . . . . . . . . 356--357 J. J. Pollock and A. Zamora Automatic spelling correction in scientific and scholarly text . . . . . 358--368 David C. Blair The Data-Document Distinction in Information Retrieval . . . . . . . . . 369--374 Izak Benbasat and Yair Wand Command abbreviation behavior in human-computer interaction . . . . . . . 376--383 You Dong Liang and Brian A. Barsky Corrigendum: ``An analysis and algorithm for polygon clipping'' . . . . . . . . . 383 C. C. Chang The Study of an Ordered Minimal Perfect Hashing Scheme . . . . . . . . . . . . . 384--387 Dorothy E. Denning Digital Signatures with RSA and Other Public-Key Cryptosystems . . . . . . . . 388--392 Ronald L. Rivest and Adi Shamir How to Expose an Eavesdropper . . . . . 393--395
Jon Louis Bentley Programming Pearls: Squeezing Space . . 416--421 Robert L. Graham The Legal Protection of Computer Software . . . . . . . . . . . . . . . . 422--426 Richard V. Giddings Accommodating Uncertainty in Software Design . . . . . . . . . . . . . . . . . 428--434 Gopal K. Gupta Self-Assessment Procedure XIII: a Self-Assessment Procedure Dealing with Binary Trees and B-Trees . . . . . . . . 435--443 Ben Tsutom Wada A Virtual Memory System for Picture Processing . . . . . . . . . . . . . . . 444--454 Gerard D. Finn An Algorithm for Optimized Boolean Evaluation in Information Management Systems . . . . . . . . . . . . . . . . 455--464 John Leslie King and Kenneth L. Kraemer Evolution and Organizational Information Systems: An Assessment of Nolan's Stage Model . . . . . . . . . . . . . . . . . 466--475 Izak Benbasat and Albert S. Dexter and Donald H. Drury and Robert C. Goldstein A Critique of the Stage Hypothesis: Theory and Empirical Evidence . . . . . 476--485 R. A. Becker and J. M. Chambers Design of the S System for Data Analysis 486--495
Jon Louis Bentley Programming Pearls: Graphic Output . . . 529--536 Gene Dallaire and John Shattuck and Richard P. Kusserow Computer Matching: Should It Be Banned? 537--545 J. Shattuck Computer Matching is a Serious Threat to Individual Rights . . . . . . . . . . . 538 R. P. Kusserow The Government Needs Computer Matching to Root Out Waste and Fraud . . . . . . 542 Larry Fujitani Laser Optical Disk: The Coming Revolution in On-Line Storage . . . . . 546--554 M. Alavi An Assessment of the Prototyping Approach to Information Systems Development . . . . . . . . . . . . . . 556--563 Anthony I. Hinxman Updating a Database in an Unsafe Environment . . . . . . . . . . . . . . 564--566 E. P. Glinert and R. E. Ladner A large font virtual terminal interface: a software prosthesis for the visually impaired . . . . . . . . . . . . . . . . 567--572 Robert Wilensky and Yigal Arens and David N. Chin Talking to UNIX in English: An Overview of UC . . . . . . . . . . . . . . . . . 574--593 Eric C. R. Hehner Corrigendum: ``Predicative programming. I, II'' . . . . . . . . . . . . . . . . 593--593 Donald E. Knuth Corrigendum: ``The complexity of songs'' 593--593 Ten Hwang Lai and Sartaj Sahni Anomalies in Parallel Branch-and-Bound Algorithms . . . . . . . . . . . . . . . 594--602
Jon Louis Bentley Programming Pearls: Updates . . . . . . 630--636 Rosalie Steier An MCC Update . . . . . . . . . . . . . 636--637 Anonymous Computer Graphics Comes of Age, An Interview with Andries van Dam . . . . . 638--648 D. Gifford and A. Spector The TWA Reservation System . . . . . . . 649--669 Per-Åke Larson and Ajay Kajla File Organization: Implementation of a Method Guaranteeing Retrieval in One Access . . . . . . . . . . . . . . . . . 670--677 John Kaunitz and Louis van Ekert Audit Trail Compaction for Database Recovery . . . . . . . . . . . . . . . . 678--683 R. B. Tilove A Null-Object Detection Algorithm for Constructive Solid Geometry . . . . . . 684--694 Hsi Chang and S. Sitharama Iyengar Efficient Algorithms to Globally Balance a Binary Search Tree . . . . . . . . . . 695--702 Jeffrey Scott Vitter Faster Methods for Random Sampling . . . 703--718
Y. M. Babad and J. F. Hoffer Even No Data Has a Value . . . . . . . . 748--756 Dennis M. Ritchie Reflections on Software Research . . . . 758--760 Ken Thompson Reflections on Trusting Trust . . . . . 761--763 Nazim H. Madhavji Visibility Aspects of Programmed Dyamic Data Structures . . . . . . . . . . . . 764--776 James A. Haskett Pass-Algorithms: a User Validation Scheme Based on Knowledge of Secret Algorithms . . . . . . . . . . . . . . . 777--781 Douglas W. Jones Improved Interpretation of UNIX-Like File Names Embedded in Data . . . . . . 782--784 H. M. Markowitz and A. Malhotra and D. P. Pazel The EAS-E Application Development System: Principles and Language Summary 785--799 John M. Carroll and Caroline Carrithers Training Wheels in a User Interface . . 800--806 D. R. K. Brownrigg The Weighted Median Filter . . . . . . . 807--818 D. Julian M. Davies Memory Occupancy Patterns in Garbage Collection Systems . . . . . . . . . . . 819--825 Lee L. Gremillion Determinants of Program Repair Maintenance Requirements . . . . . . . . 826--832
Jon Louis Bentley Programming Pearls: Algorithm Design Techniques . . . . . . . . . . . . . . . 865--871 David K. Gifford and Alfred Z. Spector The Space Shuttle Primary Computer System . . . . . . . . . . . . . . . . . 872--900 A. Spector and D. Gifford The Space Shuttle Primary Computer System . . . . . . . . . . . . . . . . . 874--900 Edward Ng and Paul B. Schneck Introduction to the Special Section on Computing in Space . . . . . . . . . . . 901 Charles E. Trevathan and Thomas D. Taylor and Raymond G. Hartenstein and Ann. C. Merwarth and William N. Stewart Development and Application of NASA's First Standard Spacecraft Computer . . . 902--913 William A. Madden and Kyle Y. Rone Design, Development, Integration: Space Shuttle Primary Flight Software System 914--925 G. D. Carlow Architecture of the Space Shuttle Primary Avionics Software System . . . . 926--937 Hassan Gomaa A Software Design Method for Real-Time Systems . . . . . . . . . . . . . . . . 938--949 Tim Maude and Derwent Maude Hardware Protection Against Software Piracy . . . . . . . . . . . . . . . . . 950--959 M. D. Good and J. A. Whiteside and D. R. Wixon and S. J. Jones Building a user-derived interface . . . 1032--1043
Jean Ichbiah Ada: Past, Present, Future, An Interview with Jean Ichbiah, the Principle Designer of Ada . . . . . . . . . . . . 990--997 Elliot B. Koffman and Philip L. Miller and Caroline E. Wardle Recommended Curriculum for CS1, 1984 . . 998--1001 Anthony Ralston The First Course in Computer Science Needs a Mathematical Corequisite . . . . 1002--1009 Robert L. Ashenhurst A Conference on Information Law and Ethics . . . . . . . . . . . . . . . . . 1006--1007 C. M. Krishna and Kang G. Shin and Yann-Hang Lee Optimization Criteria for Checkpoint Placement . . . . . . . . . . . . . . . 1008--1012 Reinhold Weicker DHRYSTONE: a Synthetic Systems Programming Benchmark . . . . . . . . . 1013--1030 Robert Marcus An Application of Artificial Intelligence to Operations Research . . 1044--1047
Jon Louis Bentley Programming Pearls: Perspective on Performance . . . . . . . . . . . . . . 1087--1092 Patricia F. Campbell and George P. McCabe Predicting the Success of Freshmen in a Computer Science Major . . . . . . . . . 1108--1113 Walter M. Mathews and Kaye Reifers The Computer in Cartoons: a Retrospective from the Saturday Review 1114--1119 Robert S. Arnold and Norman F. Schneidewind and Nicholas Zvegintzov A Software Maintenance Workshop . . . . 1120--1121 Larry R. Medsker An Interactive Decision Support System for Energy Policy Analysis . . . . . . . 1122--1128 James V. Hansen and William F. Messier A Relational Approach to Decision Support for EDP Auditing . . . . . . . . 1129--1133 Leslie G. Valiant A Theory of the Learnable . . . . . . . 1134--1142 Tim Hickey and Jacques Cohen Performance Analysis of On-the-Fly Garbage Collection . . . . . . . . . . . 1143--1154
Jon Louis Bentley Programming Pearls: a Little Program, a Lot of Fun . . . . . . . . . . . . . . . 1179--1182 Gordon B. Davis Selected Papers from the Fifth International Conference on Information Systems --- Introduction . . . . . . . . 1183 Paul Attewell and James Rule Computing and Organizations: What We Know and What We Don't Know . . . . . . 1184--1192 Blake Ives and Gerard P. Learmonth The Information System as a Competitive Weapon . . . . . . . . . . . . . . . . . 1193--1201 Charles R. Franz and Daniel Robey An Investigation of User-Led System Design: Rational and Political Perspectives . . . . . . . . . . . . . . 1202--1209 Jon Turner Computer Mediated Work: The Interplay Between Technology and Structured Jobs 1210--1217 Rob Kling and Suzanne Iacono The Control of Information Systems Developments after Implementation . . . 1218--1226 J. D. Litke An improved solution to the traveling salesman problem with thousands of nodes 1227--1236 Richard B. Wilmot Foreign Keys Decrease Adaptability of Database Designs . . . . . . . . . . . . 1237--1243
Stephen Wolfram Special Section on Computing at the Frontiers of Theoretical Physics --- Introduction . . . . . . . . . . . . . . 352--353 W. David Arnett Computational Astrophysics . . . . . . . 354--357 B. Lautrup Monte Carlo Methods in Theoretical High-Energy Physics . . . . . . . . . . 358--362 Scott Kirkpatrick and Robert H. Swendsen Statistical Mechanics and Disordered Systems . . . . . . . . . . . . . . . . 363--373 David Campbell and Jim Crutchfield and Doyne Farmer and Erica Jen Experimental Mathematics: The Role of Computation in Nonlinear Science . . . . 374--384 Robert B. Pearson and John L. Richardson and Doug Toussaint Special-Purpose Processors in Theoretical Physics . . . . . . . . . . 385--389 Stephen Wolfram Symbolic Mathematical Computation . . . 390--394 Roger L. Wainwright A Class of Sorting Algorithms Based on Quicksort . . . . . . . . . . . . . . . 396--403 Jon Louis Bentley and Catherine C. McGeoch Amortized Analyses of Self-Organizing Sequential Search Heuristics . . . . . . 404--411 Marek Kubale and Boguslaw Jackowski A Generalized Implicit Enumeration Algorithm for Graph Coloring . . . . . . 412--418
Jon Louis Bentley and David Gries (special guest oyster) Programming Pearls: Abstract Data Types 284--290 Alfred Z. Spector and David K. Gifford Case Study: IBM's System/360--370 Architecture . . . . . . . . . . . . . . 291--307 Phillip Ein-Dor and Jacob Feldmesser Attributes of the Performance of Central Processing Units: a Relative Performance Prediction Model . . . . . . . . . . . . 308--317 Jorge L. C. Sanz and Irs'hak Dinstein and Dragutin Petkovic Computing Multi-Colored Polygonal Masks in Pipeline Architectures and Its Application to Automated Visual Inspection . . . . . . . . . . . . . . . 318--329
Peter J. Denning Special Section on Computer Architecture --- Introduction . . . . . . . . . . . . 6--7 David A. Patterson Reduced instruction set computers . . . 8--21 Charles L. Seitz The cosmic cube . . . . . . . . . . . . 22--33 J. R. Gurd and C. C. Kirkham and I. Watson The Manchester Prototype Dataflow Computer . . . . . . . . . . . . . . . . 34--52 Jean E. Sammet and Robert W. Rector In recognition of the 25th anniversary of Computing Reviews: selected reviews 1960--1984 . . . . . . . . . . . . . . . 53--68 Jack Minker Computer professionals whose scientific freedom and human rights have been violated --- 1984: a report of the ACM committee on scientific freedom and human rights . . . . . . . . . . . . . . 69--78 R. E. Berry and B. A. E. Meekings A style analysis of C programs . . . . . 80--88 John C. Nash Design and implementation of a very small linear algebra program package . . 89--94 Susan M. Merritt An inverted taxonomy of sorting algorithms . . . . . . . . . . . . . . . 96--99
Jon Louis Bentley Programming Pearls: Tricks of the Trade 138--141 Phillip Ein-Dor Grosch's law re-revisited: CPU power and the cost of computation . . . . . . . . 142--151 Ronald S. Lemos Rating the major computing periodicals on readability . . . . . . . . . . . . . 152--157 Niklaus Wirth From programming language design to computer construction . . . . . . . . . 160--164 Bernard C. Reimann and Allan D. Waren User-oriented criteria for the selection of DSS software . . . . . . . . . . . . 166--179 Stephen José Hanson and Richard R. Rosinski Programmer perceptions of productivity and programming tools . . . . . . . . . 180--189 C. Michael Overstreet and Richard E. Nance A specification language to assist in analysis of discrete event simulation models . . . . . . . . . . . . . . . . . 190--201 Daniel D. Sleator and Robert E. Tarjan Amortized Efficiency of List Update and Paging Rules . . . . . . . . . . . . . . 202--208
Jon Louis Bentley Programming Pearls: Thanks, Heaps . . . 245--250 James Martin and Philip A. Bernstein and Peter J. Denning and Michael L. Dertouzos and Leonard Kleinrock Computer Science Education Today: a Dialogue . . . . . . . . . . . . . . . . 251--262 James Martin and Leonard Kleinrock Excerpts from: An Information Systems Manifesto . . . . . . . . . . . . . . . 252--255 D. F. Butcher and W. A. Muth Predicting performance in an introductory computer science course . . 263--268 A. J. Turner Computer science in secondary schools: curriculum and teacher certification . . 269--279 Ian H. Witten and Bob Bramwell A system for interactive viewing of structured documents . . . . . . . . . . 280--288 David C. Blair and M. E. Maron An Evaluation of Retrieval Effectiveness for a Full-Text Document-Retrieval System . . . . . . . . . . . . . . . . . 285--299 John D. Gould and Clayton Lewis Designing for usability: key principles and what designers think . . . . . . . . 300--311 Haim Mendelson Pricing computer services: queueing effects . . . . . . . . . . . . . . . . 312--321
W. D. Arnett Computational astrophysics . . . . . . . 354--357 B. Lautrup Monte Carlo methods in theoretical high-energy physics . . . . . . . . . . 358--362 Scott Kirkpatrick and Robert H. Swendsen Statistical Mechanics and Disordered Systems . . . . . . . . . . . . . . . . 363--373 David Campbell and Jim Crutchfield and Doyne Farmer and Erica Jen Experimental mathematics: the role of computation in nonlinear science . . . . 374--384 Robert B. Pearson and John L. Richardson and Doug Toussaint Special-purpose processors in theoretical physics . . . . . . . . . . 385--389 Stephen Wolfram Symbolic Mathematical Computation . . . 390--394 Roger L. Wainwright A class of sorting algorithms based on Quicksort . . . . . . . . . . . . . . . 396--402 Jon L. Bentley and Catherine C. McGeoch Amortized analyses of self-organizing sequential search heuristics . . . . . . 404--411 Marek Kubale and Boguslaw Jackowski A generalized implicit enumeration algorithm for graph coloring . . . . . . 412--418
Jon Louis Bentley Programming Pearls: a Spelling Checker 456--462 Michael Conrad On design principles for a molecular computer . . . . . . . . . . . . . . . . 464--480 Jane P. Devlin and William A. Lowell and Anne E. Alger Self-Assessment Procedure XIV: a self-assessment procedure dealing with the legal issues of computing . . . . . 481--488 John Tartar and Bruce Arden and Taylor Booth and Peter Denning and Ray Miller and Andries van Dam The 1984 Snowbird Report: future issues in computer science . . . . . . . . . . 490--493 Tor Guimaraes A study of application program development techniques . . . . . . . . . 494--499 Jack Gostl and Irwin Greenberg An application of queueing theory to the design of a message-switching computer system . . . . . . . . . . . . . . . . . 500--505 Rodney R. Oldehoeft and Stephen J. Allan Adaptive exact-fit storage management 506--511 Nicholas P. Vitalari and Alladi Venkatesh and Kjell Gronhaug Computing in the home: shifts in the time allocation patterns of households 512--522 Thomas J. Sager A Polynomial Time Generator for Minimal Perfect Hash Functions . . . . . . . . . 523--532
Jon Louis Bentley Programming Pearls: Associative Arrays 570--576 Karen A. Frenkel Toward automating the software-development cycle . . . . . . . 578--589 P.-J. Courtois On time and space decomposition of complex structures . . . . . . . . . . . 590--603 John Beidler and Richard H. Austing and Lillian N. Cassel Computing programs in small colleges . . 605--611 David R. McIntyre and Michael A. Pechura Data compression using static Huffman code-decode tables . . . . . . . . . . . 612--616 Leonard J. Bass A generalized user interface for applications programs (II) . . . . . . . 617--627 Alan W. Biermann and Robert D. Rodman and David C. Rubin and J. Francis Heidlage Natural language with discrete speech as a mode for human-to-machine . . . . . . 628--636 Shimon Even and Oded Goldreich and Abraham Lempel A randomized protocol for signing contracts . . . . . . . . . . . . . . . 637--647
Jon Louis Bentley Programming Pearls: Confessions of a Coder . . . . . . . . . . . . . . . . . 671--679 Starr Roxanne Hiltz and Murray Turoff Structuring Computer-Mediated Communication Systems to Avoid Information Overload . . . . . . . . . . 680--689 Mark Stefik Strategic computing at DARPA: overview and assessment . . . . . . . . . . . . . 690--704 Robert Papsdorf A Prescription for Computer Anxiety --- Review of John Shore's ``The Sachertorte Algorithm'' . . . . . . . . . . . . . . 704--706 John A. Mills A pragmatic view of the system architect 708--717 Václav Rajlich Paradigms for design and implementation in ADA . . . . . . . . . . . . . . . . . 718--727 Kenneth C. Laudon Environmental and institutional models of system development: a national criminal history system . . . . . . . . 728--740 W. David Kelton Transient exponential-Erlang queues and steady-state simulation . . . . . . . . 741--749
Mark Stefik Corrigendum: ``Strategic Computing at DARPA: Overview and Assessment'' . . . . 788--788 David Gifford and Alfred Spector The CIRRUS banking network . . . . . . . 798--807 Karen A. Frenkel Report on the microelectronics and computer technology corporation conference . . . . . . . . . . . . . . . 808--813 Elliot B. Koffman and David Stemple and Caroline E. Wardle Recommended curriculum for CS2, 1984: a report of the ACM curriculum task force for CS2 . . . . . . . . . . . . . . . . 815--818 J. M. Shearer and M. A. Wolfe ALGLIB, a simple symbol-manipulation package . . . . . . . . . . . . . . . . 820--825 Henry C. Smith Database design: composing fully normalized tables from a rigorous dependency diagram . . . . . . . . . . . 826--838 Dianne P. O'Leary and G. W. Stewart Data-flow algorithms for parallel matrix computation . . . . . . . . . . . . . . 840--853 L. L. Larmore and D. S. Hirschberg Efficient optimal pagination of scrolls 854--856
Jon Louis Bentley Programming Pearls: Bumper-Sticker Computer Science . . . . . . . . . . . . 896--901 Peter Friedland Special section on architectures for knowledge-based systems . . . . . . . . 902--903 Richard Fikes and Tom Kehler The Role of Frame-Based Representation in Reasoning . . . . . . . . . . . . . . 904--920 Frederick Hayes-Roth Rule-based systems . . . . . . . . . . . 921--932 Michael R. Genesereth and Matthew L. Ginsberg Logic programming . . . . . . . . . . . 933--941 J. Gutknecht Concepts of the text editor Lara . . . . 942--960 Gerard D. Finn Extended use of null productions in LR(1) parser applications . . . . . . . 961--972 Hanan Samet Data structures for quadtree approximation and compression . . . . . 973--993 James R. Slagle and Henry Hamburger An expert system for a resource allocation problem . . . . . . . . . . . 994--1004
David Chaum Security without identification: transaction systems to make big brother obsolete . . . . . . . . . . . . . . . . 1030--1044 Gad Ariav and Michael J. Ginzberg DSS design: a systemic view of decision support . . . . . . . . . . . . . . . . 1045--1052 Robert Mandl Orthogonal Latin squares: an application of experiment design to compiler testing 1054--1058 Bo Sanden Systems programming with JSP: example --- a VDU controller . . . . . . . . . . 1059--1067 R. M. Norton and D. P. Yeager A Probability Model for Overflow Sufficiency in Small Hash Tables . . . . 1068--1075 Raj Jain and Imrich Chlamtac The $P^2$ Algorithm for Dynamic Calculation of Quantiles and Histograms Without Storing Observations . . . . . . 1076--1085
Jon Louis Bentley Programming Pearls: Selection . . . . . 1121--1127 Peter J. Denning and Michael C. Mulder Computing in the Frontiers of Science and Engineering --- Introduction . . . . 1128--1129 Michael R. Raugh Modeling California earthquakes and earth structures . . . . . . . . . . . . 1130--1150 D. K. Cullers and Ivan R. Linscott and Bernard M. Oliver Signal processing in SETI . . . . . . . 1151--1163 Peter Friedland and Laurence H. Kedes Discovering the secrets of DNA . . . . . 1164--1186 Alan B. Chambers and David C. Nagel Pilots of the future: human or computer? 1187--1199 Leonard Kleinrock Distributed systems . . . . . . . . . . 1200--1213 Edward Balkovich and Steven Lerman and Richard P. Parmelee Computing in higher education: the Athena experience . . . . . . . . . . . 1214--1224 Joel S. Birnbaum Toward the domestication of microelectronics . . . . . . . . . . . . 1225--1235
Alain Colmerauer Prolog in 10 figures . . . . . . . . . . 1296--1310 Jacques Cohen Describing Prolog by its interpretation and compilation . . . . . . . . . . . . 1311--1324 David Lorge Parnas Software aspects of strategic defense systems . . . . . . . . . . . . . . . . 1326--1335 Gordon V. Cormack Data compression on a database system 1336--1342 J. D. McKeen and Tor Guimaraes Selecting MIS projects by steering committee . . . . . . . . . . . . . . . 1344--1352
Rosalie Steier Authors . . . . . . . . . . . . . . . . 1--2 Rosalie Steier From Washington . . . . . . . . . . . . 3--3 Kenneth C. Laudon Data quality and due process in large interorganizational record systems . . . 4--11 Jason L. Frand and Ephraim R. McLean Summary of the second annual UCLA survey of business school computer usage . . . 12--18 Jean-Pierre Banâtre and Michel Banâtre and Guy Lapalme and Florimond Ployette The design and building of Ench\`ere, a distributed electronic marketing system 19--29 Mike Heck and Martin Plaehn A workstation model for an interactive graphics system . . . . . . . . . . . . 30--37 Gordon B. Davis Selected papers from the sixth international conference on information systems . . . . . . . . . . . . . . . . 39--39 Gary W. Dickson and Gerardine DeSanctis and D. J. McBride Understanding the effectiveness of computer graphics for decision support: a cumulative experimental approach . . . 40--47 Iris Vessey and Ron Weber Structured tools and conditional logic: an empirical investigation . . . . . . . 48--57 Anonymous Technical correspondence . . . . . . . . 58--59
Rosalie Steier Authors . . . . . . . . . . . . . . . . 83--83 Adele Goldberg President's letter . . . . . . . . . . . 84--85 Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 87--90 Jon Louis Bentley Programming Pearls: Cutting the Gordian Knot . . . . . . . . . . . . . . . . . . 92--96 Richard M. Karp Combinatorics, complexity, and randomness . . . . . . . . . . . . . . . 98--109 Karen Frenkel Piecing together complexity . . . . . . 110--111 Karen A. Frenkel Complexity and parallel processing: an interview with Richard Karp . . . . . . 112--117 Simon L. Peyton Jones Parsing Distfix Operators . . . . . . . 118--122 Warren Harrison and Curtis R. Cook A note on the Berry-Meekings style metric . . . . . . . . . . . . . . . . . 123--125 K. A. Redish and W. F. Smyth Program style analysis: a natural by-product of program compilation . . . 126--133 D. Yun Yeh and Toshinori Munakata Dynamic initial allocation and local reallocation procedures for multiple stacks . . . . . . . . . . . . . . . . . 134--141 Carol S. Saunders and Richard W. Scamell Organizational power and the information services department: a reexamination . . 142--147
Rosalie Steier Authors . . . . . . . . . . . . . . . . 171--172 Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 173 J. L. Bentley Programming Pearls: The Envelope is Back 176--182 Rosalie Steir From Washington . . . . . . . . . . . . 183--183 James H. Morris and Mahadev Satyanarayanan and Michael H. Conner and John H. Howard and David S. Rosenthal and F. Donelson Smith Andrew: a Distributed Personal Computing Environment . . . . . . . . . . . . . . 184--201 Norman E. Gibbs and Allen B. Tucker A Model Curriculum for a Liberal Arts Degree in Computer Science . . . . . . . 202--210 Sumit Sircar and Dinesh Dave The relationship between benchmark tests and microcomputer price . . . . . . . . 212--217 Philip J. Fleming and John J. Wallace How not to lie with statistics: the correct way to summarize benchmark results . . . . . . . . . . . . . . . . 218--221 Donald Golden and Michael Pechura The structure of microcomputer file systems . . . . . . . . . . . . . . . . 222--230 Gary Lindstrom Elliott I. Organick (1925--1985) . . . . 231--231 Jack J. Baroudi and Margrethe H. Olson and Blake Ives An empirical study of the impact of user involvement on system usage and information satisfaction . . . . . . . . 232--238 H. E. Lü and P. S. P. Wang A Comment on ``A Fast Parallel Algorithm for Thinning Digital Patterns'' . . . . 239--242
Rosalie Steier Authors . . . . . . . . . . . . . . . . 259 Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 260--265 Rosalie Steier From Washington . . . . . . . . . . . . 266--ff. Alfred Spector and David Gifford A computer science perspective of bridge design . . . . . . . . . . . . . . . . . 267--283 Karen A. Frenkel Computers, complexity, and the Statue of Liberty restoration . . . . . . . . . . 284--296 John A. Lee and Gerald Segal and Rosalie Steier Positive alternatives: a report on an ACM panel on hacking . . . . . . . . . . 297--299 Douglas W. Jones An empirical comparison of priority-queue and event-set implementations . . . . . . . . . . . . 300--311 Larry Koved and Ben Scneiderman Embedded menus: selecting items in context . . . . . . . . . . . . . . . . 312--318 Jon Louis Bentley and Daniel D. Sleator and Robert E. Tarjan and Victor K. Wei A Locally Adaptive Data Compression Scheme . . . . . . . . . . . . . . . . . 320--330 Anonymous Technical correspondence . . . . . . . . 331--335 W. Richard Stark Comment on: ``Logic programming'' [Comm. ACM, 28, 1985, 9, 933--941] by M. R. Genesereth and M. L. Ginsberg. With a reply by the authors . . . . . . . . . . 331--331
Rosalie Steier Authors . . . . . . . . . . . . . . . . 357--358 Alfred Bork Viewpoint . . . . . . . . . . . . . . . 360--ff. Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 362 Jon Bentley and Don Knuth Programming pearls: literate programming 384--369 M. J. Sergot and F. Sadri and R. A. Kowalski and F. Kriwaczek and P. Hammond and H. T. Cory The British Nationality Act as a logic program . . . . . . . . . . . . . . . . 370--386 John S. Gourlay A language for music printing . . . . . 388--401 Valdis Berzins and Michael Gray and David Naumann Abstraction-based software development 402--415 Richard Botting Novel security techniques for online systems . . . . . . . . . . . . . . . . 416--417 David S. Scott and S. Sitharama Iyengar TID --- a Translation Invariant Data Structure for Storing Images . . . . . . 418--429
Rosalie Steier Authors . . . . . . . . . . . . . . . . 465 Adele Goldberg President's letter . . . . . . . . . . . 466--467 Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 468--469 Rosalie Steier From Washington . . . . . . . . . . . . 470 Jon Bentley and Donald E. Knuth and M. Douglas McIlroy Programming Pearls: a Literate Program: a \tt WEB program for common words . . . 471--483 Herbert J. Bernstein Special Section on Factory Automation and Robotics . . . . . . . . . . . . . . 484--485 John E. Hopcroft The impact of robotics on computer science . . . . . . . . . . . . . . . . 486--498 Marc H. Raibert Legged robots . . . . . . . . . . . . . 499--514 David D. Grossman Opportunities for research on numerical control machining . . . . . . . . . . . 515--522 S. Ceri and G. Gottlob Normalization of relations and PROLOG 524--544 Jack J. Baroudi and Michael J. Ginzberg Impact of the technological environment on programmer/analyst job outcomes . . . 546--555 Anonymous Technical correspondence . . . . . . . . 556--558
Rosalie Steier Authors . . . . . . . . . . . . . . . . 577--579 Clark Thompson Military direction of academic CS research . . . . . . . . . . . . . . . . 583--585 Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 586--592 Henry F. Ledgard Special Section on The Human Aspects of Computing: a Note on This Collection . . 593--593 Avi Rushinek and Sara F. Rushinek What makes users happy? . . . . . . . . 594--598 Brian M. Slator and Matthew P. Anderson and Walt Conley Pygmalion at the Interface . . . . . . . 599--604 Richard E. Mayer and Jennifer L. Dyck and William Vilberg Learning to program and learning to think: what's the connection? . . . . . 605--610 Geoffry S. Howard and Robert D. Smith Computer anxiety in management: myth or reality? . . . . . . . . . . . . . . . . 611--615 J. D. Gannon and E. E. Katz and V. R. Basili Metrics for Ada packages: an initial study . . . . . . . . . . . . . . . . . 616--623 James C. Spohrer and Elliot Soloway Novice mistakes: are the folk wisdoms correct? . . . . . . . . . . . . . . . . 624--632 James L. Peterson A note on undetected typing errors . . . 633--637 Moira LeMay and Eric Hird Operator work load: when is enough enough? . . . . . . . . . . . . . . . . 638--642 Neal S. Coulter and Norman H. Kelly Computer instruction set usage by programmers: an empirical investigation 643--647 Gerard Salton Another look at automatic text-retrieval systems . . . . . . . . . . . . . . . . 648--656 Hassan Gomaa Software development of real-time systems . . . . . . . . . . . . . . . . 657--668 Neil Sarnak and Robert E. Tarjan Planar point location using persistent search trees . . . . . . . . . . . . . . 669--679 Anonymous Technical correspondence . . . . . . . . 680--682
Rosalie Steier Authors . . . . . . . . . . . . . . . . 705--706 Paul Abrahams President's letter . . . . . . . . . . . 707--708 Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 709--710 Jon Louis Bentley Programming Pearls: Little Languages . . 711--721 Jean E. Sammet Why Ada is Not Just Another Programming Language . . . . . . . . . . . . . . . . 722--732 Edward Lieblein The Department of Defense software initiative --- a status report . . . . . 734--744 Martin K. Solomon and Riva Wenig Bickel Self-assessment procedure XV: a self-assessment procedure dealing with file processing . . . . . . . . . . . . 745--751 Karen A. Frenkel Evaluating two massively parallel machines . . . . . . . . . . . . . . . . 752--758 Russell M. Clapp and Louis Duchesneau and Richard A. Volz and Trevor N. Mudge and Timothy Schultze Toward real-time performance benchmarks for Ada . . . . . . . . . . . . . . . . 760--778 Young Moo Kang and Robert B. Miller and Roger Alan Pick Comments on ``Grosch's law re-revisited: CPU power and the cost of computation'' 779--781 Jon Louis Bentley and Brian W. Kernighan GRAP --- a Language for Typesetting Graphs . . . . . . . . . . . . . . . . . 782--792 R. H. Irving and C. A. Higgins and F. R. Safayeni Computerized performance monitoring systems: use and abuse . . . . . . . . . 794--801 Raymond F. Koopman The orders of equidistribution of subsequences of some asymptotically random sequences . . . . . . . . . . . . 802--806
Rosalie Steier Authors . . . . . . . . . . . . . . . . 825--826 Paul Abrahams President's letter . . . . . . . . . . . 827--828 Robert L. Ashenhurst ACM Forum . . . . . . . . . . . . . . . 829--831 Jon Louis Bentley Programming Pearls: Document Design . . 832--839 Derek H. Sleeman Special Section on The Challenges of Teaching Computer Programming . . . . . 840--841 J. R. Anderson and E. Skwarecki The automated tutoring of introductory computer programming . . . . . . . . . . 842--849 E. Soloway Learning to program = learning to construct mechanisms and explanations 850--858 Andrea di Sessa and Harold Abelson Boxer: a reconstructible computational medium . . . . . . . . . . . . . . . . . 859--868 D. Gries and R. Miller and R. Ritchie and P. Young Imbalance between Growth and Funding in Academic Computer Science: Two Trends Colliding . . . . . . . . . . . . . . . 870--878 Daniel G. Bobrow and Sanjay Mittal and Mark J. Stefik Expert systems: perils and promise . . . 880--894 M. D. Janssens and J. K. Annot and A. J. Van De Goor Adapting UNIX for a multiprocessor environment . . . . . . . . . . . . . . 895--901 Q. F. Stout and B. L. Warren Tree rebalancing in optimal time and space . . . . . . . . . . . . . . . . . 902--908
Rosalie Steier Authors . . . . . . . . . . . . . . . . 927 Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 928--931 John S. Quarterman and Josiah C. Hoskins Notable Computer Networks . . . . . . . 932--971 David Gries The 1984--1985 Taulbee survey . . . . . 972--977 Niklaus Wirth Microprocessor architectures: a comparison based on code generation by compiler . . . . . . . . . . . . . . . . 978--990 Manny Hayes Accessing bit fields in FORTRAN-77 . . . 991--995 M. D. Atkinson and J.-R. Sack and B. Santoro and T. Strothotte Min-max heaps and generalized priority queues . . . . . . . . . . . . . . . . . 996--1000 Anonymous Technical correspondence . . . . . . . . 1001--1005
Rosalie Steier Authors . . . . . . . . . . . . . . . . 1023--1025 Dennis Frailey Vice-president's letter . . . . . . . . 1026 Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 1027--1030 William K. McHenry and Seymour E. Goodman MIS in Soviet industrial enterprise: the limits of reform from above . . . . . . 1034--1043 Joseph P. Kearney and Robert L. Sedlmeyer and William B. Thompson and Michael A. Gray and Michael A. Adler Software complexity measurement . . . . 1044--1050 Glen G. Langdon, Jr. Self-assessment procedure XVI: a self-assessment procedure dealing with computer organization and logic design 1051--1060 Dorothy Deringer and David Brandin and Dexter Fletcher and Neil Jacobstein The report of the ACM Long-Range Planning Committee: a summary . . . . . 1061--1071 Pierre N. Robillard Schematic pseudocode for program constructs and its computer automation by SCHEMACODE . . . . . . . . . . . . . 1072--1089 Frank G. Landram and James R. Cook and Marvin Johnston Spreadsheet calculations of probabilities from the $F$, $t$, $\chi^2$, and normal distribution . . . 1090--1092 Izak Benbasat and Albert S. Dexter and Peter Todd An experimental program investigating color-enhanced and graphical information presentation: an integration of the findings . . . . . . . . . . . . . . . . 1094--1105
Rosalie Steier Authors . . . . . . . . . . . . . . . . 1127--1128 Paul Abrahams President's letter . . . . . . . . . . . 1129--1130 Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 1151--1154 Jon Louis Bentley Programming Pearls: Birth of a Cruncher 1155--1161 P. J. Denning Editorial: Parallel Computing and Its Evolution . . . . . . . . . . . . . . . 1163--1166 Karen A. Frenkel Introduction to the Special Issue on Parallelism . . . . . . . . . . . . . . 1168--1169 W. Daniel Hillis and Guy L. Steele, Jr. Data parallel algorithms . . . . . . . . 1170--1183 David A. Padua and Michael J. Wolfe Advanced Compiler Optimization for Supercomputers . . . . . . . . . . . . . 1184--1201 Randall Rettberg and Robert Thomas Contention is no obstacle to shared-memory multiprocessing . . . . . 1202--1212 Craig Stanfill and David Waltz Toward memory-based reasoning . . . . . 1213--1228 Craig Stanfill and Brewster Kahle Parallel Free Text Search on the Connection Machine System . . . . . . . 1229--1239 Anonymous Technical correspondence . . . . . . . . 1240--1242
Daniel D. McCracken Viewpoint: Ruminations on Computer Science Curricula . . . . . . . . . . . 3--5 John M. Carroll and Jean McKendree Interface design issues for advice-giving expert systems . . . . . . 14--32 Mark Stefik and Gregg Foster and Daniel G. Bobrow and Kenneth Kahn and Stan Lanning and Lucy Suchman Beyond the chalkboard: computer support for collaboration and problem solving in meetings . . . . . . . . . . . . . . . . 32--47 Daniel R. Dolk and Robert A. Kirsch, II A relational information resource dictionary system . . . . . . . . . . . 48--61 James P. Held and John V. Carlis MATCH: a new high-level relational operator for pattern matching . . . . . 62--75 W. Daniel Hillis and Guy L. Steele, Jr. Update to ``Data Parallel Algorithms'' 78--78
Alan Borning Computer system reliability and nuclear war . . . . . . . . . . . . . . . . . . 112--131 David Notkin and Norman Hutchinson and Jan Sanislo and Michael Schwartz Heterogeneous computing environments: report on the ACM SIGOPS workshop on accommodating heterogeneity . . . . . . 132--140 Paul J. Jalics COBOL on a PC: a new perspective on a language and its performance . . . . . . 142--154 Christopher M. Holt and Alan Stewart and Maurice Clint and Ronald H. Perrott An improved parallel thinning algorithm 156--160 Zen-Cheung Shih and Gen-Huey Chen and R. C. T. Lee Systolic algorithms to examine all pairs of elements . . . . . . . . . . . . . . 161--167
John E. Hopcroft Computer Science: The Emergence of a Discipline . . . . . . . . . . . . . . . 198--202 Robert E. Tarjan Algorithm Design . . . . . . . . . . . . 204--212 Karen A. Frenkel An interview with the 1986 A. M. Turing Award recipients --- John E. Hopcroft and Robert E. Tarjan . . . . . . . . . . 214--222 Michael Allen Bickel Automatic Correction to Misspelled Names: a Fourth generation Approach . . 224--228 Nancy C. Goodwin Functionality and usability . . . . . . 229--233 John T. Stasko and Jeffrey Scott Vitter Pairing Heaps: Experiments and Analysis 234--249 Farokh B. Bastani and S. Sitharama Iyengar The effect of data structures on the logical complexity of programs . . . . . 250--259
Jon L. Bentley and David Gries Programming Pearls: Abstract data types 284--290 David Gifford and Alfred Spector Case study: IBM's system/360--370 architecture . . . . . . . . . . . . . . 291--307 Phillip Ein-Dor and Jacob Feldmesser Attributes of the Performance of Central Processing Units: a Relative Performance Prediction Model . . . . . . . . . . . . 308--317 Jorge L. C. Sanz and Its'hak Dinstein and Dragutin Petkovic Computing multi-colored polygonal masks in pipeline architecture and its application to automated visual inspection . . . . . . . . . . . . . . . 318--329
Alfs Berztiss A mathematically focused curriculum for computer science . . . . . . . . . . . . 356--365 Carolynn Van Dyke Taking ``Computer Literacy'' Literally 366--374 Taylor Booth and Raymond E. Miller Computer Science Program Accreditation: the first-year activities of the computing sciences accreditation board 376--388 Thomas W. Malone and Kenneth R. Grant and Franklyn A. Turbak and Stephen A. Brobst and Michael D. Cohen Intelligent information-sharing systems 390--402 Jack J. Dongarra and Eric Grosse Distribution of mathematical software via electronic mail . . . . . . . . . . 403--407 S. A. Mamrak and M. J. Kaelbling and C. K. Nicholas and M. Share A Software Architecture for Supporting the Exchange of Electronic Manuscripts 408--414 Chris F. Kemerer An empirical validation of software cost estimation models . . . . . . . . . . . 416--429 Richard Nance and Robert Moose and Robert Foutz A statistical technique for comparing heuristics: an example from capacity assignment strategies in computer network design . . . . . . . . . . . . . 430--442
Jon Louis Bentley Programming Pearls: Self-Describing Data 479--483 Thomas W. Malone and Joanne Yates and Robert I. Benjamin Electronic markets and electronic hierarchies . . . . . . . . . . . . . . 484--497 M. Lynne Markus and Niels Bjòrn-Andersen Power over users: its exercise by system professionals . . . . . . . . . . . . . 498--504 Itzhak Shemer Systems Analysis: a Systemic Analysis of a Conceptual Model . . . . . . . . . . . 506--512 Jürgen Ebert A versatile data structure for edge-oriented graph algorithms . . . . . 513--519 Ian H. Witten and Radford M. Neal and John G. Cleary Arithmetic coding for data compression 520--540 Vasant Dhar and Harry E. Pople Rule-based versus structure-based models for explaining and generating expert behavior . . . . . . . . . . . . . . . . 542--555 Ananth Srinivasan and Kate M. Kaiser Relationships between selected organizational factors and systems development . . . . . . . . . . . . . . 556--562
J. L. Bentley Programming Pearls: Profilers . . . . . 587--592 Peter J. Denning Announcing Literate Programming, moderated by Christopher J. Van Wyk . . 593--593 Christopher J. Van Wyk and David R. Hanson and John Gilbert Literate Programming: Printing Common Words . . . . . . . . . . . . . . . . . 594--599 Joseph D. Becker Arabic word processing . . . . . . . . . 600--610 José A. Mañas Word division in Spanish . . . . . . . . 612--616 Georgia Griffiths and G. Carlyle Stones The tea-leaf reader algorithm: an efficient implementation of CRC-16 and CRC-32 . . . . . . . . . . . . . . . . . 617--620 Shu-Xiang Li and Murray H. Loew The quadcode and its arithmetic . . . . 621--626 Shu-Xiang Li and Murray H. Loew Adjacency Detection Using Quadcodes . . 627--631
Russell J. Abbott Knowledge abstraction . . . . . . . . . 664--671 C. A. R. Hoare and I. J. Hayes and He Jifeng and C. C. Morgan and A. W. Roscoe and J. W. Sanders and I. H. Sòrensen and J. M. Spivey and B. A. Sufrin Laws of programming . . . . . . . . . . 672--686 David Gries The 1985--1986 Taulbee survey . . . . . 688--694 Kjell W. Nielsen and Ken Shumate Designing large real-time systems with Ada . . . . . . . . . . . . . . . . . . 695--715 Lee W. Schruben and V. James Cogliano An experimental procedure for simulation response surface model identification 716--730 Shu Tezuka Walsh-spectral test for GFSR pseudorandom numbers . . . . . . . . . . 731--735
Jon Louis Bentley and R. W. Floyd Programming Pearls: a Sample of Brilliance . . . . . . . . . . . . . . . 754--757 John D. Gould and Stephen J. Boies and Stephen Levy and John T. Richards and Jim Schoonard The 1984 Olympic Message System: a test of behavioral principles of system design . . . . . . . . . . . . . . . . . 758--769 C. A. R. Hoare and I. J. Hayes and Jifeng He and C. C. Morgan and A. W. Roscoe and J. W. Sanders and I. H. Sorensen and J. M. Spivey and B. A. Sufrin Corrigenda: ``Laws of programming'' . . 770--770 Chris F. Kemerer Corrigenda: ``An Empirical Validation of Software Cost Estimation Models'' . . . 770--770 Jonathan P. Jacky and Ira J. Kalet An object-oriented programming discipline for standard Pascal . . . . . 772--776 Niv Ahituv and Yeheskel Lapid and Seev Neumann Processing encrypted data . . . . . . . 777--780 Niv Ahituv A metamodel of information flow: a tool to support information systems theory 781--791 B. Ya. Ryabko and R. Nigel Horspool and Gordon V. Cormack Comments to: ``A locally adaptive data compression scheme'' [Comm. ACM \bf 29, 1986, 4, 320--330, MR 87e:68020] by J. L. Bentley, D. D. Sleator, R. E. Tarjan and V. K. Wei . . . . . . . . . . . . . 792--794
Peter J. Denning Paradigms crossed . . . . . . . . . . . 808--809 Diane Crawford Public policy issues ripen with age . . 810--813 Karen A. Frenkel Profiles in Computing --- Introduction 815--828 Karen A. Frenkel Profiles in computing: Donald E. Knuth: scholar with a passion for the particular . . . . . . . . . . . . . . . 816--819 Karen A. Frenkel Profiles in computing: Brian K. Reid: a graphics tale of a hacker tracker . . . 820--823 Karen A. Frenkel Profiles in computing: Allan L. Scherr --- Big Blue's Time-Sharing Pioneer . . 824--828 Mina Rees The computing program of the Office of Naval Research, 1946--1953 . . . . . . . 830--848 Linda Feczko ACM --- Making Computing History for 40 Years --- Introduction . . . . . . . . . 849--849 Franz L. Alt Fifteen years ACM . . . . . . . . . . . 850--857 Lee Revens The first 25 years: ACM 1947--1962 . . . 860--865 Anita Cochran ACM: the past 15 years: 1972--1987 . . . 866--872 Eric A. Weiss Commentaries on the past 15 years . . . 880--883 Eric A. Weiss Self-assessment procedure XVII . . . . . 886--891
Richard H. Lathrop and Teresa A. Webster and Temple F. Smith ARIADNE: pattern-directed inference and hierarchical abstraction in protein structure recognition . . . . . . . . . 909--921 Ulises Agüero and Subrata Sasgupta A plausibility-driven approach to computer architecture design . . . . . . 922--932 James H. Coombs and Allen H. Renear and Steven J. DeRose Markup systems and the future of scholarly text processing . . . . . . . 933--947 Kemal Efe A proposed solution to the problem of levels in error-message generation . . . 948--955 Robert G. Reynolds The partial metrics system: modeling the stepwise refinement process using partial metrics . . . . . . . . . . . . 956--963 G. W. Furnas and T. K. Landauer and L. M. Gomez and S. T. Dumais The vocabulary problem in human-system communication . . . . . . . . . . . . . 964--971 William J. Doll and Golamreza Torkzadeh The relationship of MIS steering committees to size of firm and formalization of MIS planning . . . . . 972--978
Jon Louis Bentley Programming Pearls: The Furbelow Memorandum . . . . . . . . . . . . . . . 998--999, 1010 Christopher J. Van Wyk and Michael Jackson and David W. Wall Literate Programming: Processing Transactions . . . . . . . . . . . . . . 1000--1010 John McCarthy Generality in artificial intelligence 1030--1035 Jeff Shrager and Daniel S. Jordan and Thomas P. Moran and Gregor Kiczales and Daniel M. Russell Issues in the pragmatics of qualitative modeling: lessons learned from a xerographics project . . . . . . . . . . 1036--1047 Channing H. Russell and Pamela J. Waterman Variations on UNIX for parallel-processing computers . . . . . 1048--1055 Mark L. Gillenson The duality of database structures and design techniques . . . . . . . . . . . 1056--1065 Haim Mendelson Economies of scale in computing: Grosch's law revisited . . . . . . . . . 1066--1072 Kjell W. Nielsen and Ken Shumate Corrigenda: ``Designing large real-time systems with Ada'' . . . . . . . . . . . 1073--1073 J. H. Hester and D. H. Hirschberg Self-organizing search lists using probabilistic back-pointers . . . . . . 1074--1079
G. A. Ringwood Parlog86 and the dining logicians . . . 10--25 Jacques Cohen A view of the origins and development of Prolog . . . . . . . . . . . . . . . . . 26--36 Robert A. Kowalski The early years of logic programming . . 38--43 J. Kay and P. Lauder A Fair Share Scheduler . . . . . . . . . 44--55 Jack W. Stott and Jeffrey E. Kottemann Anatomy of a compact user interface development tool . . . . . . . . . . . . 56--66 Ron Weber Computer technology and jobs: an impact assessment model . . . . . . . . . . . . 68--77 Yehuda Kahane and Seev Neumann and Charles S. Tapiero Computer backup pools, disaster recovery, and default risk . . . . . . . 78--83
Karen A. Frenkel The Art and Science of Visualizing Data 110--121 Donald P. Greenberg Coons Award Lecture . . . . . . . . . . 122--129 Paul S. Heckbert Ray Tracing Jell-O Brand Gelatin . . . . 130--134 Clifford A. Pickover Pattern Formation and Chaos in Networks 136--151 Stephen I. Gallant Connectionist Expert Systems . . . . . . 152--169 Jerome A. Feldman and Mark A. Fanty and Nigel H. Goddard and Kenton J. Lynne Computing with Structured Connectionist Networks . . . . . . . . . . . . . . . . 170--187 Brian A. Nejmeh NPATH: a Measure of Execution Path Complexity and its Applications . . . . 188--200 Gerard Salton and Chris Buckley Parallel Text Search Methods . . . . . . 202--215 Voratas Kachitvichyanukul and Bruce W. Schmeiser Binomial Random Variate Generation . . . 216--222
Abraham Peled John Cocke: The 1987 ACM A. M. Turing Award recipient . . . . . . . . . . . . 249--249 John Cocke The search for performance in scientific processors: the Turing Award Lecture . . 250--253 Alan Shaw Special section on operating systems . . 255--257 David Notkin and Andrew P. Black and Edward D. Lazowska and Henry M. Levy and Jan Sanislo and John Zahorjan Interconnecting heterogeneous computer systems . . . . . . . . . . . . . . . . 258--273 Stuart R. Faulk and David L. Parnas On Synchronization in Hard-Real-Time Systems . . . . . . . . . . . . . . . . 274--287 David K. Gifford and Roger M. Needham and Michael D. Schroeder The Cedar File System . . . . . . . . . 288--298 Barbara Liskov Distributed programming in Argus . . . . 300--312 David Cheriton The V distributed system . . . . . . . . 314--333 John C. Munson Self-assessment procedure XVIII: fundamentals of data communications . . 334--341 Jan L. Guynes Impact of system response time on state anxiety . . . . . . . . . . . . . . . . 342--347 Bing-Chao Huang and Michael A. Langston Practical In-Place Merging . . . . . . . 348--352
Robert E. Filman Reasoning with worlds and truth maintenance in a knowledge-based programming environment . . . . . . . . 382--401 Christopher Cherniak Undebuggability and cognitive science 402--412 Michael R. Blaha and William J. Premerlani and James E. Rumbaugh Relational database design using an object-oriented methodology . . . . . . 414--427 Marilyn M. Mantei and Toby J. Teorey Cost/benefit analysis for incorporating human factors in the software lifecycle 428--439 Bennett L. Fox and Peter W. Glynn Computing Poisson probabilities . . . . 440--445 Per-Åke Larson Dynamic Hash Tables . . . . . . . . . . 446--457
Clifford Stoll Stalking the wily hacker . . . . . . . . 484--497 Roger Clarke Information technology and dataveillance 498--512 David Harel On Visual Formalisms . . . . . . . . . . 514--530 John L. Gustafson Reevaluating Amdahl's law . . . . . . . 532--533 James M. Cupello and David J. Mishelevich Managing prototype knowledge/expert system projects . . . . . . . . . . . . 534--541 Sid L. Huff and Malcolm C. Munro and Barbara H. Martin Growth stages of end user computing . . 542--550 Suzanne Rivard and Sid L. Huff Factors of success for end-user computing . . . . . . . . . . . . . . . 552--561 Narayan S. Umanath and Richard W. Schmell An experimental evaluation of the impact of data display format on recall performance . . . . . . . . . . . . . . 562--570 Andrew W. Appel and Guy J. Jacobson The world's fastest Scrabble program . . 572--578 Thomas E. Gerasch An insertion algorithm for a minimal internal path length binary search tree 579--585 Michael J. Ginzberg and Jack J. Baroudi MIS Careers --- a Theoretical Perspective . . . . . . . . . . . . . . 586--594
Paul Abrahams The Strategic Defense Initiative --- President's Letter . . . . . . . . . . . 628--629 B. W. Mel and S. M. Omohundro and A. D. Robison and S. S. Skiena and K. H. Thearling Tablet: personal computer of the year 2000 . . . . . . . . . . . . . . . . . . 638--648 Michael J. Callahan and David Hoffman and James T. Hoffman Computer Graphics Tools for the Study of Minimal Surfaces . . . . . . . . . . . . 648--661 Richard G. Hamlet Introduction to special section on software testing . . . . . . . . . . . . 662--667 E. J. Weyuker The evaluation of program-based software test data adequacy criteria . . . . . . 668--675 T. J. Ostrand and M. J. Balcer The Category-Partition Method for Specifying and Generating Functional Tests . . . . . . . . . . . . . . . . . 676--686 D. Gelperin and B. Hetzel The Growth of Software Testing . . . . . 687--695 S. B. Guthery Self-timing programs and the quantum scheduler . . . . . . . . . . . . . . . 696--702 D. R. Dolk Model management and structured modeling: the role of an information resource dictionary system . . . . . . . 704--718 K. Appleby and M. Carllson and S. Haridi and D. Sawhlin Garbage collection for Prolog based on WAM . . . . . . . . . . . . . . . . . . 719--741 Pierre L'Ecuyer Efficient and portable combined random number generators . . . . . . . . . . . 742--749, 774 Sukhamay Kundu The Equivalence of the Subregion Representation and the Wall Representation for a Certain Class of Rectangular Dissections . . . . . . . . 752--763 S. L. Jarvenpaa and G. W. Dickson Graphics and managerial decision making: research-based guidelines . . . . . . . 764--774 Peter J. Denning Edmund C. Berkeley --- ACM founder . . . 781--782
John B. Smith and Stephen F. Weiss Hypertext: Introduction to the Special Issue . . . . . . . . . . . . . . . . . 816--819 Robert M. Akscyn and Donald L. McCracken and Elise A. Yoder KMS: a Distributed Hypermedia System for Managing Knowledge in Organizations . . 820--835 Frank G. Halasz Reflections on NoteCards: seven issues for the next generation of hypermedia systems . . . . . . . . . . . . . . . . 836--855 Brad Campbell and Joseph M. Goodman HAM: a General Purpose Hypertext Abstract Machine . . . . . . . . . . . . 856--861 Pankaj K. Garg Abstraction mechanisms in hypertext . . 862--870 Darrell R. Raymond and Frank Wm. Tompa Hypertext and the Oxford English Dictionary . . . . . . . . . . . . . . . 871--879 Mark E. Frisse Searching for information in a hypertext medical handbook . . . . . . . . . . . . 880--886 Andries van Dam Hypertext '87: Keynote Address . . . . . 887--895 Jason L. Frand and Ephraim R. McLean and Julia A. Britt Fourth annual UCLA survey of business school computer usage . . . . . . . . . 896--910 James L. Poirot and Harriet G. Taylor and Cathleen A. Norris Retraining teachers to teach high school computer science . . . . . . . . . . . . 912--917
Edward A. Fox ACM Press Database and Electronic Products --- New Services for the Information Age . . . . . . . . . . . . 948--951 J. D. Wilson and E. S. Adams and H. P. Baouendi and W. A. Marion and G. J. Yaverbaum Computer science education in the People's Republic of China in the late 1980s . . . . . . . . . . . . . . . . . 956--964 S. F. Lam An empirical study of computer capacity planning in Japan . . . . . . . . . . . 965--976 N. P. Archer and M. W. L. Chan and S. J. Huang and R. T. Liu A Chinese-English microcomputer system 977--982 D. Gries and D. Marsh The 1986--1987 Taulbee survey . . . . . 984--991 Monty Newborn and Danny Kopec Results of ACM's Eighteenth Computer Chess Championship . . . . . . . . . . . 992--995 Douglas W. Jones Application of Splay Trees to Data Compression . . . . . . . . . . . . . . 996--1007 D. V. Sarwate Computation of cyclic redundancy checks via table look-up . . . . . . . . . . . 1008--1013 L. Press Benchmarks for LAN performance evaluation . . . . . . . . . . . . . . . 1014--1017
James H. Fetzer Program verification: the very idea . . 1048--1063 John M. Carroll and Amy P. Aaronson Learning by doing with simulated intelligent help . . . . . . . . . . . . 1064--1079 Wilfred J. Hansen and Christina Haas Reading and Writing with Computers: a Framework for Explaining Differences in Performance . . . . . . . . . . . . . . 1080--1089 Surya B. Yadav and Ralph R. Bravoco and Akemi T. Chatfield and T. M. Rajkumar Comparison of analysis techniques for information requirement determination 1090--1097 Alan M. Davis A Comparison of Techniques for the Specification of External System Behavior . . . . . . . . . . . . . . . . 1098--1115 Alok Aggarwal and Jeffrey Scott Vitter The Input/Output Complexity of Sorting and Related Problems . . . . . . . . . . 1116--1127 Robert Courts Improving locality of reference in a garbage-collecting memory management system . . . . . . . . . . . . . . . . . 1128--1138 David W. Hamaker and Ian H. Witten and Radford M. Neal and John G. Cleary Compress and Compact Discussed Further (letters) . . . . . . . . . . . . . . . 1139, 1140, 1145
K. A. Frenkel Computers and elections . . . . . . . . 1176--1183 R. G. Saltman Accuracy, integrity and security in computerized vote-tallying . . . . . . . 1184--1191 Stephen K. Park and Keith W. Miller Random Number Generators: Good Ones are Hard to Find . . . . . . . . . . . . . . 1192--1201 J. E. Smith Characterizing computer performance with a single number . . . . . . . . . . . . 1202--1206 M. Gordon Probabilistic and genetic algorithms in document retrieval . . . . . . . . . . . 1208--1218 R. Brown Calendar Queues: a Fast ${O}(1)$ Priority Queue Implementation for the Simulation Event Set Problem . . . . . . 1220--1227 D. Rubinstein and J. Shallit and M. Szegedy A subset coloring algorithm and its applications to computer graphics . . . 1228--1232
Ben Shneiderman and John M. Carroll Ecological Studies of Professional Programmers: An Overview . . . . . . . . 1256--1258 Elliot Soloway and Robin Lampert and Stan Letovsky and David Littman and Jeannine Pinto Designing documentation to compensate for delocalized plans . . . . . . . . . 1259--1267 Bill Curtis and Herb Krasner and Neil Iscoe A field study of the software design process for large systems . . . . . . . 1268--1287 Mary Beth Rosson and Wendy Kellogg and Susanne Maass The designer as user: building requirements for design tools from design practice . . . . . . . . . . . . 1288--1298 Udi Manber Using induction to design algorithms . . 1300--1313 Paul C. K. Kwok A thinning algorithm by contour generation . . . . . . . . . . . . . . . 1314--1324 Clifford A. Pickover A Note on Chaos and Halley's Method . . 1326--1329 Joachim H. Ahrens and Ulrich Dieter Efficient table-free sampling methods for the exponential, Cauchy, and normal distributions . . . . . . . . . . . . . 1330--1337 Alon Itai and Yoav Raz The Number of Buffers Required for Sequential Processing of a Disk File . . 1338--1342 James R. Driscoll and Harold N. Gabow and Ruth Shrairman and Robert E. Tarjan Relaxed Heaps: An Alternative to Fibonacci Heaps with Applications to Parallel Computation . . . . . . . . . . 1343--1354
Christopher J. Van Wyk and Eric Hamilton and Don Colner Literate Programming: Expanding Generalized Regular Expressions . . . . 1376--1385 Richard C. Holt and James R. Cordy The Turing programming language . . . . 1410--1423 Tore Risch and René Reboh and Peter E. Hart and Richard O. Duda A functional approach to integrating database and expert systems . . . . . . 1424--1437 Starr Roxanne Hiltz Productivity Enhancement from Computer-Mediated Communication: a Systems Contingency Approach . . . . . . 1438--1454 Feng-Yang Kuo and Jahangir Karimi User interface design from a real time perspective . . . . . . . . . . . . . . 1456--1466 Niv Ahituv and Magid Igbaria A model for predicting and evaluating computer resource consumption . . . . . 1467--1473 Gautam Mitra and Mehrdad Tamiz and Joseph Yadegar Experimental Investigation of an Interior Search Method within a Simplex Framework . . . . . . . . . . . . . . . 1474--1482 Michael Lebowitz The use of memory in text processing . . 1483--1502 S. L. Jarvenpaa The Importance of Laboratory Experimentation in IS Research . . . . . 1502--1504
John R. Weitzel and Larry Kerschberg Developing Knowledge-Based Systems: Reorganizing the System Development Life Cycle . . . . . . . . . . . . . . . . . 482--488
Bryan Kocher A Hygiene Lesson . . . . . . . . . . . . 3 Peter J. Denning and D. E. Comer and David Gries and Michael C. Mulder and Allen Tucker and A. Joe Turner and Paul R. Young Computing as a discipline . . . . . . . 9--23 Karen A. Frenkel The computer bowl . . . . . . . . . . . 24--31 Leslie Lamport A Simple Approach to Specifying Concurrent Systems . . . . . . . . . . . 32--45 Claude Banville and Maurice Landry Can the field of MIS be disciplined? . . 48--60 Jason L. Frand and Julia A. Britt Fifth annual UCLA survey of business school computer usage . . . . . . . . . 62--76 David M. Abrahamson An Adaptive Dependency Source Model for Data Compression . . . . . . . . . . . . 77--83 Boaz Ronen and Michael A. Palley and Henry C. Lucas, Jr. Spreadsheet analysis and design . . . . 84--93 David M. DeJean and George W. Zobrist A definition optimization technique used in a code translation algorithm . . . . 94--105 Neal R. Wagner and Paul Putter Error detecting decimal digits . . . . . 106--110 Boris D. Lubachevsky Efficient Distributed Event-Driven Simulations of Multiple-Loop Networks 111--123, 131 R. W. Hall Fast Parallel Thinning Algorithms: Parallel Speed and Connectivity Preservation . . . . . . . . . . . . . . 124--131 Douglas W. Jones Concurrent Operations on Priority Queues 132--137
E. Robert Yoche Legal Protection for Computer Software 169--171 L. Earnest Can computers cope with human races? . . 173--182 S. L. Young and A. G. Hauptmann and W. H. Ward and E. T. Smith and P. Werner High level knowledge sources in usable speech recognition systems . . . . . . . 183--194 Y. Bengio and R. Cardin and R. De Mori and E. Merlo Programmable execution of multi-layered networks for automatic speech recognition . . . . . . . . . . . . . . 195--199 Walter Hollingsworth and Howard Sachs and Alan Jay Smith The Clipper Processor: Instruction Set Architecture and Implementation . . . . 200--219 Robert E. Kraut and Susan T. Dumais and Susan Koch Computerization, productivity, and quality of work-life . . . . . . . . . . 220--238 John Tillquist and Feng-Yang Kuo An approach to the recursive retrieval problem in the relational database . . . 239--245 P. J. Jalics and D. R. McIntyre Caching and other disk access avoidance techniques on personal computers . . . . 246--255
Rosalie Steier News track . . . . . . . . . . . . . . . 285--286 Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 287--ff. Bryan Kocher President's letter . . . . . . . . . . . 292--293 David Gries and Terry M. Walker and Paul Young The 1988 Snowbird Report: a Discipline Matures . . . . . . . . . . . . . . . . 294--297 Virginia E. Barker and Dennis E. O'Connor and Judith Bachant and Elliot Soloway Expert systems for configuration at Digital: XCON and beyond . . . . . . . . 298--318 Donald P. Ballou and Giri Kumar.Tayi Methodology for allocating resources for data quality enhancement . . . . . . . . 320--329 Bo Sanden An Entity-Life Modeling Approach to the Design of Concurrent Software . . . . . 330--343 Xue Dong Luo A practical sieve algorithm for finding prime numbers . . . . . . . . . . . . . 344--346 Virginia R. Gibson and James A. Senn System structure and software maintenance performance . . . . . . . . 347--358 Zicheng Guo and Richard W. Hall Parallel Thinning with Two-Subiteration Algorithms . . . . . . . . . . . . . . . 359--373 James C. Pleasant and Lawrence Paulson and Avra Cohen and Michael Gordon Bevier and Michael K. Smith and William D. Young and Thomas R. Clune and Stephen Savitzky and James H. Fetzer Correspondence on Fetzer, Program Verification: The Very Idea . . . . . . 374--381
John Dobson and Brian Randell Program Verification: Public Image And Private Reality . . . . . . . . . . . . 420--422 Karen A. Frenkel Volume rendering . . . . . . . . . . . . 426--435 Peter J. Denning and Karen A. Frenkel A conversation with Steve Jobs . . . . . 436--443 Nicholas Carriero and David Gelernter Linda in context . . . . . . . . . . . . 444--458 L. Bailyn Toward the perfect workplace? . . . . . 460--471 R. Wenig Bickel Self-assessment procedure XIX . . . . . 472--480 John R. Weitzel and Larry Kerschberg Developing knowledge-based systems: reorganizing the system development life cycle . . . . . . . . . . . . . . . . . 482--488 E. R. Fiala and D. H. Greene Data compression with finite windows . . 490--505 Harald M. Müller and Christopher M. Holt and Aaron Watters and James H. Fetzer More on the Very Idea (letters) . . . . 506--512
E. Robert Yoche and Arthur J. Levine Basic Principles of Copyright Protection for Computer Software . . . . . . . . . 544--545 Harold Abelson and Michael Eisenberg and Matthew Halfant and Jacob Katzenelson and Elisha Sacks and Gerald J. Sussman and Jack Wisdom and Kenneth Yip Intelligence in Scientific Computing . . 546--562 P. Samuelson Why the look and feel of software user interfaces should not be protected by copyright law . . . . . . . . . . . . . 563--572 John Yen GERTIS: a Dempster-Shafer Approach to Diagnosing Hierarchical Hypotheses . . . 573--585 Y. M. Kang Computer hardware performance: production and cost function analyses 586--593 N. E. Gibbs The SEI education program: the challenge of teaching future software engineers 594--605 Sidney C. Bailin An Object-Oriented Requirements Specifications Method . . . . . . . . . 608--623
Pamela Samuelson Can Hackers Be Sued for Damages Caused by Computer Viruses? . . . . . . . . . . 666--669 Michael Gemignani Viruses and Criminal Law . . . . . . . . 669--671 Anonymous The Worm Story . . . . . . . . . . . . . 677--677 Eugene H. Spafford The Internet Worm: Crisis and Aftermath 678--687 Jon A. Rochlis and Mark W. Eichin With microscope and tweezers: the worm from MIT's perspective . . . . . . . . . 689--698 Donn Seeley Password cracking: a game of wits . . . 700--703 T. Eisenberg and D. Gries and J. Hartmanis and D. Holcomb and M. Stuart Lynn and T. Santoro The Cornell commission: on Morris and the worm . . . . . . . . . . . . . . . . 706--709 Karen A. Frenkel An interview with Ivan Sutherland . . . 712--718 I. E. Sutherland Micropipelines . . . . . . . . . . . . . 720--738 Christopher J. Van Wyk and Donald C. Lindsay Literate Programming: a File Difference Program . . . . . . . . . . . . . . . . 740--754 Harold Thimbleby A Review of Donald C. Lindsay's Text File Difference Utility, \em diff . . . 754--755 Zicheng Guo and Richard W. Hall Corrigenda: ``Parallel Thinning with Two-Sub-Iteration Algorithms'' . . . . . 759--759 Richard W. Hall Corrigenda: ``Fast Parallel Thinning Algorithms: Parallel Speed and Connectivity Preservation'' . . . . . . 759--760
Larry Press Thoughts and Observations at the Microsoft CD-ROM Conference . . . . . . 784--788 Edward A. Fox The coming revolution in interactive digital video . . . . . . . . . . . . . 794--801 Wendy E. Mackay and Glorianna Davenport Virtual video editing in interactive multimedia applications . . . . . . . . 802--810 G. David Ripley DVI --- a Digital Multimedia Technology 811--822 Douglas F. Dixon Life Before the Chips: Simulating Digital Video Interactive Technology . . 824--831 Scott M. Stevens Intelligent interactive video simulation of a code inspection . . . . . . . . . . 832--843 Michael Tinker DVI parallel image compression . . . . . 844--851 Andrew Lippman and William Butera Coding image sequences for interactive retrieval . . . . . . . . . . . . . . . 852--860 Clement Yu and Wei Sun and Dina Bitton and Qi Yang and Richard Bruno and John Tullis Efficient placement of audio data on optical disks for real-time applications 862--871 Karen A. Frenkel The next generation of interactive technologies . . . . . . . . . . . . . . 872--881
J. Michael Jakes and E. Robert Yoche Basic Principles of Patent Protection for Computer Software . . . . . . . . . 922--924 Douglas Schuler and Jonathan Jacky Introduction --- computing and social responsibilities . . . . . . . . . . . . 925--927 Donald H. Berman and Carole D. Hafner The potential of artificial intelligence to help solve the crisis in our legal system . . . . . . . . . . . . . . . . . 928--938 Jack Beusmans and Karen Wieckert Computing, research, and war: if knowledge is power, where is responsibility? . . . . . . . . . . . . 939--951 Richard E. Ladner Computer accessibility for federal workers with disabilities: it's the law 952--956 Jack Minker Scientific Freedom and Human Rights of Computer Professionals --- 1989 . . . . 957--974 Toby J. Teorey and Guangping Wei and Deborah L. Bolton and John A. Koenig ER model clustering as an aid for user communication and documentation in database design . . . . . . . . . . . . 975--987 Steve Rozen and Dennis Shasha Using a relational system on Wall Street: the good, the bad, the ugly, and the ideal . . . . . . . . . . . . . . . 988--994 Pai-Chun Ma and Frederic H. Murphy and Edward A. Stohr A Graphics Interface for Linear Programming . . . . . . . . . . . . . . 996--1012 Fatin Sezgin On efficient and portable combined random number generators . . . . . . . . 1019--1020 Rick L. Edgeman and Paul W. Abrahams and Francis M. Sand and James Crawford, Jr. Random Number Generators and the Minimal Standard . . . . . . . . . . . . . . . . 1020--1024
Christopher J. Van Wyk and Norman Ramsey Literate Programming: Waving a Language-Independent WEB . . . . . . . . 1051--1055 John Sculley The Relationship Between Business and Higher Education: a Perspective on the 21st Century . . . . . . . . . . . . . . 1056--1061 John D. McGregor and Arthur M. Riehl Support for Multiprocessing (Introduction to the Special Section) 1062--1064 Anthony E. Terrano and Stanley M. Dunn and Joseph E. Peters Using an architectural knowledge base to generate code for parallel computers . . 1065--1072 Carolyn McCreary and Helen Gill Automatic determination of grain size for efficient parallel processing . . . 1073--1078 Wan-Hong S. Cheng and Virgil E. Wallentine DEBL: a Knowledge-Based Language for Specifying and Debugging Distributed Programs . . . . . . . . . . . . . . . . 1079--1084 Charles J. Fleckenstein and David Hemmendinger Using a global name space for parallel execution of UNIX tools . . . . . . . . 1085--1090 C. Gordon Bell The future of high performance computers in science and engineering . . . . . . . 1091--1101 Ronald J. Norman and Jay F. Nunamaker, Jr. CASE productivity perceptions of software engineering professionals . . . 1102--1108 Rui Feng Zhu and Tadao Takaoka A Technique for Two-Dimensional Pattern Matching . . . . . . . . . . . . . . . . 1110--1120
Jonathan Grudin The case against user interface consistency . . . . . . . . . . . . . . 1164--1173 Glenn D. Blank A Finite and Real-Time Processor for Natural Language . . . . . . . . . . . . 1174--1189 H. Albert Napier and Richard R. Batsell and Norman S. Guadango and David M. Lane Impact of a restricted natural language interface on ease of learning and productivity . . . . . . . . . . . . . . 1190--1198 Rudy Hirschheim and Heinz K. Klein Four paradigms of information systems development . . . . . . . . . . . . . . 1199--1216 David Gries and Dorothy Marsh The 1987 --- 1988 Taulbee survey . . . . 1217--1224 Monty Newborn and Danny Kopec Results of the nineteenth ACM North American computer chess championship . . 1225--1230 Carol B. MacKnight and Santosh Balagopalan An evaluation tool for measuring authoring system performance . . . . . . 1231--1236 M. V. Ramakrishna Practical performance of Bloom filters and parallel free-text searching . . . . 1237--1239
Larry Press The Toshiba T1000, IBM's Academic Computing Conference and SPARC PCs . . . 1292--1298 Karen A. Frenkel HDTV and the computer industry . . . . . 1300--1312 William W. Cotterman and Kuldeep Kumar User cube: a taxonomy of end users . . . 1313--1320 Gerald E. Evans and Mark G. Simkin What best predicts computer proficiency? 1322--1327 Detmar W. Straub, Jr. and James C. Wetherbe Information Technologies for the 1990's: An Organizational Impact Perspective . . 1328--1339 Victor M. Matos and Paul J. Jalics An Experimental Analysis of the Performance of Fourth Generation Tools on PCs . . . . . . . . . . . . . . . . . 1340--1351 Eliezer Kantorowitz and Oded Sudarsky The adaptable user interface . . . . . . 1352--1358 Jayaram K. Udupa and Gabor T. Herman Volume Rendering Versus Surface Rendering . . . . . . . . . . . . . . . 1364--1367
John McCarthy Networks Considered Harmful for Electronic Mail . . . . . . . . . . . . 1389--1390 Saul Lefkowitz and E. Robert Yoche The Role of Trademarks in the Protection of Computer Software . . . . . . . . . . 1391--1393, 1396 Peter J. Denning A debate on teaching computing science 1397--1397 Edsger W. Dijkstra On the Cruelty of Really Teaching Computer Science . . . . . . . . . . . . 1398--1404 David L. Parnas and W. L. Scherlis and M. H. van Emden and Jacques Cohen and R. W. Hamming and Richard M. Karp and Terry Winograd Colleagues Respond to Dijkstra's Comments . . . . . . . . . . . . . . . . 1405--1413 Edsger W. Dijkstra Dijkstra's Reply To Comments . . . . . . 1414--1414 Thomas J. McCabe and Charles W. Butler Design complexity measurement and testing . . . . . . . . . . . . . . . . 1415--1425 Tarek K. Abdel-Hamid and Stuart E. Madnick Lessons learned from modeling the dynamics of software development . . . . 1426--1438 Samson W. Tu and Michael G. Kahn and Mark A. Musen and Lawrence M. Fagan and Jay C. Ferguson Episodic Skeletal-Plan Refinement Based on Temporal Data . . . . . . . . . . . . 1439--1455 Eugene Levin Grand challenges to computation science 1456--1457 Bo Sanden Entity-life modeling and structured analysis in real-time software design --- a comparison . . . . . . . . . . . . 1458--1466 James J. Purtilo and John R. Callahan Parse tree annotations . . . . . . . . . 1467--1477
Libes Choosing a Name for Your Computer . . . 1289--1291
Danielle R. Bernstein and Joshua Stern and William Ehrich and Michael R. Dunlavey and Leonard Zettel and Bruce B. Herbert and Mark Nelson and W. F. Smyth and Bruce W. Walker and Robert M. Gordon and Stephen N. Cole and David B. Lightstone ACM Forum: Debatable . . . . . . . . . . 264--271
Martin Wielgus and Marvin L. Watkins and Edward Sacharuk and Srinivasarao Damerla ACM Forum: More Debatable . . . . . . . 396--397
Daniel M. Sunday A Very Fast Substring Search Algorithm 132--142
Ricardo Baeza-Yates and Gaston H. Gonnet A new approach to text searching . . . . 74--82 Sun Wu and Udi Manber Fast text searching allowing errors . . 83--91
R. J. Brown Chromatic scheduling and the chromatic number problem . . . . . . . . . . . . . 451--463
Jayadev Misra Remark on ``Algorithm 246: Graycode [Z]'' . . . . . . . . . . . . . . . . . 285--285
Mohamed el Lozy Remark on ``Algorithm 299: Chi-Squared Integral [S15]'' . . . . . . . . . . . . 393--395
Donald E. Knuth and J. H. Morris and V. R. Pratt Fast pattern matching in strings . . . . 323--350
Paolo Sipala Remark on ``Algorithm 408: A Sparse Matrix Package (Part I) [F4]'' . . . . . 303--303
Fred G. Gustavson Remark on ``Algorithm 408: A Sparse Matrix Package (Part I) [F4]'' . . . . . 295--295
Mohamed el Lozy Remark on ``Algorithm 395: Student's $t$-Distribution'' and Remark on ``Algorithm 396: Student's Quantiles [S14]'' . . . . . . . . . . . . . . . . 238--239
U. Harms and H. Kollakowski and G. Möller Remark on ``Algorithm 408: A Sparse Matrix Package (Part 1) [F4]'' . . . . . 456--457
G. W. Hill Remark on ``Algorithm 395: Student's $t$-Distribution'' . . . . . . . . . . . 247--249 G. W. Hill Remark on ``Algorithm 396: Student's $t$-Quantiles'' . . . . . . . . . . . . 250--251
A. L. Tharp and K.-C. Tai The practicality of text signatures for accelerating string searching . . . . . 35--44
Allen E. Tracht Remark on ``Algorithm 334: Normal Random Deviates'' . . . . . . . . . . . . . . . 89--89
M. C. Er Remark on ``Algorithm 246: Graycode [Z]'' . . . . . . . . . . . . . . . . . 441--443
I. D. Hill and M. C. Pike Remark on ``Algorithm 299: Chi-Squared Integral'' . . . . . . . . . . . . . . . 185--185 Milan Novotny Remark on ``Algorithm 30: Numerical Solution of the Polynomial Equation'' 183--184