Last update:
Thu Apr 24 11:37:37 MDT 2025
K. Samelson and
Friedrich L. Bauer Sequential Formula Translation . . . . . 76--83
K. W. Ellenberger ACM Algorithm 30: Numerical Solution of
the Polynomial Equation . . . . . . . . 643
Edgar T. Irons A Syntax Directed Compiler for ALGOL 60 51--55
Edward H. Sussenguth, Jr. Use of Tree Structures for Processing
Files . . . . . . . . . . . . . . . . . 272--279
J. Boothroyd ACM Algorithm 246: Graycode . . . . . . 701
Edsger W. Dijkstra Solution of a Problem in Concurrent
Programming Control . . . . . . . . . . 569
J. Weizenbaum ELIZA --- a Computer Program for the
Study of Natural Language Communication
between Man and Machine . . . . . . . . 36--44
J. B. Dennis and
E. C. van Horn Programming Semantics for
Multiprogrammed Computations . . . . . . 143--155
I. D. Hill and
M. C. Pike ACM Algorithm 299: Chi-Squared Integral 243--244
Ward Douglas Maurer An Improved Hashcode for Scatter Storage 35--37
Robert Morris Scatter Storage Techniques . . . . . . . 38--44
Peter J. Denning The Working Set Model for Program
Behaviour . . . . . . . . . . . . . . . 323--333
Edsger W. Dijkstra The structure of the
``THE''-multiprogramming system . . . . 341--346
J. R. Bell ACM Algorithm 334: Normal Random
Deviates [G5] . . . . . . . . . . . . . 498
C. A. R. Hoare An Axiomatic Basis for Computer
Programming . . . . . . . . . . . . . . 576--580, 583
Jay Earley An Efficient Context-Free Parsing
Algorithm . . . . . . . . . . . . . . . 94--102
James R. Bell The Quadratic Quotient Method: a Hash
Code Eliminating Secondary Clustering 107--109
E. F. Codd A Relational Model of Data for Large
Shared Data Banks . . . . . . . . . . . 377--387
G. W. Hill ACM Algorithm 395: Student's
$t$-Distribution . . . . . . . . . . . . 617--619
G. W. Hill ACM Algorithm 396: Student's
$t$-Quantiles . . . . . . . . . . . . . 619--620
Niklaus Wirth Program Development by Stepwise
Refinement . . . . . . . . . . . . . . . 221--227
J. M. McNamee ACM Algorithm 408: a Sparse Matrix
Package (Part I) . . . . . . . . . . . . 265--273
M. C. Harrison Implementation of the Substring Test by
Hashing . . . . . . . . . . . . . . . . 777--779
David Lorge Parnas A technique for software module
specification with examples . . . . . . 330--336
H. Kuki and
W. J. Cody A Statistical Study of the Accuracy of
Floating Point Number Systems . . . . . 223--230
Dennis M. Ritchie and
Ken Thompson The UNIX Time-Sharing System . . . . . . 365--375
Dorothy E. Denning A Lattice Model of Secure Information
Flow . . . . . . . . . . . . . . . . . . 236--243
Robert M. Metcalfe and
David R. Boggs Ethernet: Distributed Packet Switching
for Local Computer Networks . . . . . . 395--404
Robert S. Boyer and
J. Strother Moore A Fast String Searching Algorithm . . . 762--772
C. A. R. Hoare Corrigendum: ``Communicating Sequential
Processes'' . . . . . . . . . . . . . . 958--958
Ronald L. Rivest and
Adi Shamir and
Leonard M. Adleman A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems 120--126
C. A. R. Hoare Communicating Sequential Processes . . . 666--677
Daniel Brélaz New Methods to Color Vertices of a Graph 251--256
P. O'Neill and
A. O'Neill Performance Statistics of a Time Sharing
Network at a Small University . . . . . 10--13
Lawrence J. Mazlack Identifying Potential to Acquire
Programming Skill . . . . . . . . . . . 14--17
R. J. Cichelli Minimal Perfect Hash Functions Made
Simple . . . . . . . . . . . . . . . . . 17--19
Harold Abelson and
Peter Andreae Information Transfer and Area-Time
Tradeoffs for VLSI Multiplication . . . 20--23
Jeffrey M. Lane and
Loren C. Carpenter and
J. Turner Whitted and
James F. Blinn Scan Line Methods for Displaying
Parametrically Defined Surfaces . . . . 23--34
Stephen T. Kent Technical Correspondence: On Secure
Personal Computing . . . . . . . . . . . 35--36
Dorothy E. Denning Technical Correspondence: On Secure
Personal Computing . . . . . . . . . . . 36--39
Doug Bates and
Ronald S. Lemos Technical Correspondence: On Statistical
Analysis . . . . . . . . . . . . . . . . 39--40
Anonymous Correction: List of Contributors to the
CS Report [Comm. ACM, March 1979] . . . 40--40
Anthony Ralston and
Mary Shaw Curriculum '78 --- Is Computer Science
Really that Unmathematical . . . . . . . 67--70
M. D. Canon and
D. H. Fritz and
John H. Howard and
T. D. Howell and
Michael F. Mitoma and
Juan Rodriguez-Rossel A Virtual Machine Emulator for
Performance Evaluation . . . . . . . . . 71--80
David Redell and
Yogen Dalal and
Thomas Horsley and
Hugh Lauer and
William Lynch and
Paul McJones and
Hal Murray and
Stephen Purcell Pilot: An Operating System for a
Personal Computer . . . . . . . . . . . 81--92
J. K. Ousterhout and
D. A. Scelza and
P. S. Sindhu Medusa: an experiment in distributed
operating system structure . . . . . . . 92--105
Butler W. Lampson and
David D. Redell Experience with Processes and Monitors
in Mesa . . . . . . . . . . . . . . . . 105--117
B. J. Walker and
R. A. Kemmerer and
G. J. Popek Specification and Verification of the
UCLA Unix Security Kernel . . . . . . . 118--131
Daniel D. McCracken John W. Mauchly: 1907--1980 . . . . . . 143--143
Isaac L. Auerbach A Tribute to John William Mauchly . . . 144
J. Presper Eckert Eulogy: Delivered in St. Anthony's
Church, Ambler, Pennsylvania, at funeral
services on January 11, 1980 . . . . . . 145--146
Robert F. Ling General Considerations on the Design of
an Interactive System for Data Analysis 147--154
C. W. Fraser A Generalized Text Editor . . . . . . . 154--158
K. P. Lee A Linear Algorithm for Copying Binary
Trees Using Bounded Workspace . . . . . 159--162
H. Samet Region representation: Quadtrees from
boundary codes . . . . . . . . . . . . . 163--170
C. R. Dyer and
A. Rosenfeld and
H. Samet Region representation: Boundary codes
from quadtrees . . . . . . . . . . . . . 171--179
Charles L. Gold and
Seymour E. Goodman and
Benjamin G. Walker Software: Recommendations for an Export
Control Policy . . . . . . . . . . . . . 199--207
R. E. Brooks Studying programming behavior
experimentally: The problems of proper
methodology . . . . . . . . . . . . . . 207--213
Jon Louis Bentley Multidimensional Divide-and-Conquer . . 214--229
Jean Vuillemin A Unifying Look at Data Structures . . . 229--239
Robert L. Glass Real-Time: The ``Lost World'' of
Software Debugging and Testing . . . . . 264--271
Joshua Turner The Structure of Modular Programs . . . 272--277
Ishwar K. Sethi and
B. Chatterjee Conversion of Decision Tables to
Efficient Sequential Testing Procedures 279--285
Rik Maes An Algorithmic Approach to the
Conversion of Decision Grid Charts into
Compressed Decision Tables . . . . . . . 286--293
Arthur Gill Hierarchical Binary Search . . . . . . . 294--300
Lionel E. Deimel, Jr. On a matrix chain product algorithm.
Correction to: ``An $O(n)$ algorithm for
determining a near-optimal computation
order of matrix chain products'' [Comm.
ACM, 21, 1978, 544--549, MR 80a:68037]
by F. Y. Chin. With a reply by Chin . . 301
Roger House Comments on Program Specification and
Testing . . . . . . . . . . . . . . . . 324--331
Jack A. Chambers and
Jerry W. Sprecher Computer Assisted Instruction: Current
Trends . . . . . . . . . . . . . . . . . 332--342
Turner Whitted An Improved Illumination Model for
Shaded Display . . . . . . . . . . . . . 343--349
John G. Fletcher A More General Algorithm for Computing
Closed Semiring Costs Between Vertices
of a Directed Graph . . . . . . . . . . 350--351
Y. Banno and
H. Hirose and
Y. Karita and
H. Mawatari and
H. Murakami and
H. Takahashi and
S. Yashiro and
H. Yoshiki and
N. Hagiwara and
Y. Sakurai KEKOPEN, An Open Batch Processing System
at KEK . . . . . . . . . . . . . . . . . 368--378
David Harel On Folk Theorems . . . . . . . . . . . . 379--389
R. C. H. Cheng and
G. M. Feast Gamma variate generators with increased
shape parameter range . . . . . . . . . 389--394
Fabrizio Luccio and
Linda Pagli Comment on Generalized AVL Trees . . . . 394--395
Stuart K. Card and
Thomas P. Moran and
Allen Newell The Keystroke-Level Model for User
Performance Time with Interactive
Systems . . . . . . . . . . . . . . . . 396--410
J. M. Triance and
J. F. S. Yow MCOBOL --- a Prototype Macro Facility
for Cobol . . . . . . . . . . . . . . . 432--439
Michael T. Compton Easing Fault Location in Large Systems 440--442
Kenneth E. Iverson Notation as a Tool of Thought . . . . . 444--465
G. Peterson and
A. B. Budgor The Computer Language Mathsy and
Applications to Solid State Physics . . 466--474
Maurice H. Halstead and
Victor B. Schneider Self-Assessment Procedure VII: a
Self-Assessment Procedure Dealing with
Software Science . . . . . . . . . . . . 475--480
Dennis E. Hall and
Deborah K. Scherrer and
Joseph S. Sventek A Virtual Operating System . . . . . . . 495--502
Hitohisa Asai An overrelaxation for a numerical
inverse of a constant . . . . . . . . . 503--510
B. Kumar and
E. S. Davidson Computer System Design Using a
Hierarchical Approach to Performance
Evaluation . . . . . . . . . . . . . . . 511--521
John L. Pfaltz and
William J. Berman and
Edgar M. Cagley Partial-Match Retrieval Using Indexed
Descriptor Files . . . . . . . . . . . . 522--528
Donald R. Chand and
Surya B. Yadav Logical Construction of Software . . . . 546--555
Henry F. Ledgard and
John A. Whiteside and
Andrew Singer and
William Seymour The Natural Language of Interactive
Systems . . . . . . . . . . . . . . . . 556--563
Y. Bard A Model of shared DASD and Multipathing 564--572
K. Mani Chandy and
Charles H. Sauer Computational algorithms for product
form queueing networks . . . . . . . . . 573--583
D. Potier and
P. LeBlanc Analysis of Locking Policies in Database
Management Systems . . . . . . . . . . . 584--593
Curtis R. Cook and
Do Jin Kim Best Sorting Algorithms for Nearly
Sorted Lists . . . . . . . . . . . . . . 620--624
M. L. V. Pitteway and
D. J. Watkinson Bresenham's algorithm with grey scale 625--626
D. S. Hirschberg and
J. B. Sinclair Decentralized Extrema-Finding in
Circular Configurations of Processors 627--628
Guy Lewis Steele, Jr. and
Gerald Jay Sussman Design of a Lisp-based Processor . . . . 628--645
M. Hofri Disk scheduling: FCFS vs. SSTF revisited 645--653
James Lyle Peterson Computer Programs for Detecting and
Correcting Spelling Errors . . . . . . . 676--687
Patrick H. Winston Learning and Reasoning by Analogy . . . 689--702
Hanan Samet Deletion in two-dimensional quad trees 703--710
John F. Shoch and
Jon A. Hupp Measured performance of an Ethernet
local network . . . . . . . . . . . . . 711--721
Anonymous 1980 Index by Subject to Algorithms . . 722--722
Anonymous Index to Communications of the ACM,
Volume 23, 1980 . . . . . . . . . . . . 723--727
G. Jaeschke and
G. Osterburg Technical Correspondence: On Cichelli's
Minimal Perfect Hash Functions Method 728--729
R. J. Cichelli Technical Correspondence: On Cichelli's
Minimal Perfect Hash Functions Method 728--729
John McClintock and
Paul Klint Technical Correspondence: Algol-W
Approach to Line Number Maintenance . . 729--729
Barry Dwyer One More Time --- How to Update a Master
File . . . . . . . . . . . . . . . . . . 3--8
Glenn Ricart and
Ashok K. Agrawala An Optimal Algorithm for Mutual
Exclusion in Computer Networks . . . . . 9--17
Paul Pritchard A sublinear additive sieve for finding
prime numbers . . . . . . . . . . . . . 18--23
Peter G. W. Keen Information Systems and Organizational
Change . . . . . . . . . . . . . . . . . 24--33
Fred N. Krull Experience With ILIAD: a High-Level
Process Control Language . . . . . . . . 66--72
E. J. Gauss Pracniques: Built-In Checklist Reduces
File Destruction . . . . . . . . . . . . 73
Charles Anthony Richard Hoare The Emperor's Old Clothes . . . . . . . 75--83
David Chaum Untraceable Electronic Mail, Return
Addresses, and Digital Pseudonyms . . . 84--88
M. L. V. Pitteway and
D. J. Watkinson Corrigendum: ``Bresenham's algorithm
with grey scale'' . . . . . . . . . . . 88--88
Arnold L. Rosenberg On Uniformly Inserting One Data
Structure into Another . . . . . . . . . 88--90
Marilyn M. Mantai The Effect of Programming Team
Structures on Programming Tasks . . . . 106--113
Kenneth I. Magel and
Richard H. Austing and
Alfs Berztiss and
Gerald L. Engel and
John W. Hamblen and
A. A. J. Hoffmann and
Robert Mathis Recommendations for Master's Level
Programs in Computer Science --- a
Report of the ACM Curriculum Committee
on Computer Science . . . . . . . . . . 115--123
Jay F. Nunamaker Educational Programs in Information
Systems . . . . . . . . . . . . . . . . 124--133
Jack Minker Computer Scientists Whose Scientific
Freedom and Human Rights Have Been
Violated: a Report of the ACM Committee
on Scientific Freedom and Human Rights 134--139
G. R. Andrews Parallel Programs: Proofs, Principles,
and Practice . . . . . . . . . . . . . . 140--146
Abbe Mowshowitz On Approaches to the Study of Social
Issues in Computing . . . . . . . . . . 146--155
Richard E. Nance The time and state relationships in
simulation modeling . . . . . . . . . . 173--179
Tuncer I. Ören Concepts and Criteria to Access
Acceptability of Simulation Studies: a
Frame of References . . . . . . . . . . 180--189
Osman Balci and
Robert G. Sargent A methodology for cost-risk analysis in
the statistical validation of simulation
models . . . . . . . . . . . . . . . . . 190--197
K. M. Chandy and
I. Misra Asynchronous Distributed Simulation via
a Sequence of Parallel Computations . . 198--206
Gordon M. Clark Use of Pólya distributions in approximate
solutions to nonstationary $M/M/s$
queues . . . . . . . . . . . . . . . . . 206--217
T. J. Schriber and
R. W. Andrews A conceptual framework for research in
the analysis of simulation output . . . 218--232
Philip Heidelberger and
Peter D. Welch A spectral method for confidence
interval generation and run length
control in simulations . . . . . . . . . 233--245
Lee W. Schruben Control of initialization bias in
multivariate simulation response . . . . 246--252
J. H. Donnelly and
R. E. Shannon Minimum mean-squared-error estimators
for simulation experiments . . . . . . . 253--259
P. Heidelberger and
P. A. W. Lewis Regression-adjusted estimates for
regenerative simulations, with graphics 260--273
Charles R. Litecky and
Larry E. Rittenberg The External Auditor's Review of
Computer Controls . . . . . . . . . . . 288--295
P. J. Robinson and
Dave Singer Another Spelling Correction Program . . 296--297
Robert P. Nix Experience With a Space Efficient Way to
Store a Dictionary . . . . . . . . . . . 297--298
J. Inglis Pracniques: Updating a Master File ---
Yet One More Time . . . . . . . . . . . 299
Franco P. Preparata and
Jean Vuillemin The Cube-Connected Cycles: a Versatile
Network for Parallel Computation . . . . 300--309
Dana H. Ballard Strip Trees, a Hierarchical
Representation for Curves . . . . . . . 310--321
Dan W. Crockett Triform Programs . . . . . . . . . . . . 344--350
Joseph Traub Quo Vadimus: Computer Science in a
Decade . . . . . . . . . . . . . . . . . 351--369
Peter J. Denning and
Edward A. Feigenbaum and
Paul Gilmore and
Anthony C. Hearn and
Robert W. Ritchie and
Joseph F. Traub The Snowbird Report: a Discipline in
Crisis . . . . . . . . . . . . . . . . . 370--374
John A. N. Lee Response to the Federal Trade
Commission's Proposed Ruling on
Standards and Certification . . . . . . 375--380
Martin A. Fischler and
Robert C. Bolles Random sample consensus: a paradigm for
model fitting with applications to image
analysis and automated cartography . . . 381--395
M. Stonebraker Operating System Support for Database
Management . . . . . . . . . . . . . . . 412--418
Anthony Ralston The Proposed New Computing Reviews
Classification Scheme, a Report of the
Computing Reviews Category Revision
Committee . . . . . . . . . . . . . . . 419--433
Peter J. Denning and
David H. Brandin Special Report: Report of the Public
Cryptography Study Group . . . . . . . . 434--434
Werner A. Baum and
David H. Brandin and
R. Creighton Buck and
George I. Davida and
George Handelman and
Martin E. Hellman and
Ira Michael Heyman and
Wilfred Kaplan and
Daniel C. Schwartz Report of the Public Cryptography Study
Group, prepared for American Council on
Education, One Dupont Circle,
Washington, DC 20036, February 7, 1981 435--445
George I. Davida The Case Against Restraints on
Non-Governmental Research in
Cryptography . . . . . . . . . . . . . . 445--450
Harvey J. Greenberg and
Richard P. O'Neill Representing super-sparse matrices with
perturbed values . . . . . . . . . . . . 451--456
Brian Billard Polynomial manipulation with APL . . . . 457--465
Ralph C. Merkle and
Martin E. Hellman On the security of multiple encryption 465--467
Richard A. Demers System Design for Usability . . . . . . 494--501
William L. Ash Mxec: Parallel Processing with an
Advanced Macro Facility . . . . . . . . 502--509
Richard E. Mayer and
Piraye Bayman Psychology of Calculator Languages: a
Framework for Describing Differences in
Users' Knowledge . . . . . . . . . . . . 511--520
Alan Jay Smith Long-Term File Migration: Development
and Evaluation of Algorithms . . . . . . 521--532
D. E. Denning and
M. S. Sacco Timestamps in Key Distribution Protocols 533--536
P. J. Denning Computer Architecture: Some Old Ideas
that Haven'T Quite Made It Yet . . . . . 553--554
Barry Dwyer A User-Friendly Algorithm . . . . . . . 556--561
Tim Teitelbaum and
Thomas Reps The Cornell Program Synthesizer: a
Syntax-directed Programming Environment 563--573
J. O'Rourke An on-line algorithm for fitting
straight lines between data ranges . . . 574--578
P. Quittner and
S. Csoka and
S. Halasz and
D. Kotsis and
K. Varnai Comparison of Synonym Handling and
Bucket Organization Methods . . . . . . 579--582
R. J. McEliece and
D. V. Sarwate On sharing secrets and Reed--Solomon
codes . . . . . . . . . . . . . . . . . 583--584
Jane Fedorowicz Comments on Price/Performance Patterns
of U.S. Computer Systems . . . . . . . . 585--586
Gail E. Kaiser Automatic Extension of an ATN Knowledge
Base . . . . . . . . . . . . . . . . . . 587--593
Christopher E. Rothe An Abstract Programming Model . . . . . 594--596
Jay Gischer Shuffle Languages, Petri Nets, and
Context-Sensitive Grammars . . . . . . . 597--605
Michael R. Dunlavey Letter to the Editor: On Spelling
Correction and Beyond . . . . . . . . . 608--608
Lance A. Miller Letter to the Editor: On Spelling
Correction and Beyond . . . . . . . . . 608--609
James L. Peterson Letter to the Editor: On Spelling
Correction and Beyond . . . . . . . . . 609--609
Donald D. Chamberlin and
Morton M. Astrahan and
Michael W. Blasgen and
James N. Gray and
W. Frank King and
Bruce G. Lindsay and
Raymod Lorie and
James W. Mehl and
Thomas G. Price and
Franco Putzolo and
Patricia Griffiths Selinger and
Mario Schkolnick and
Donald R. Slutz and
Irving L. Traiger and
Bradford W. Wade and
Robert A. Yost A History and Evaluation of System R . . 632--646
Peter Wegner Self-Assessment Procedure VIII: a
Self-Assessment Procedure Dealing with
the Programming Language Ada . . . . . . 647--678
Daniel Robey Computer Information Systems and
Organization Structure . . . . . . . . . 679--687
Peter J. Denning and
T. Don Dennis and
Jeffrey A. Brumfield Low Contention Semaphores and Ready
Lists . . . . . . . . . . . . . . . . . 687--699
David A. Patterson An Experiment in High Level Language
Microprogramming and Verification . . . 699--709
P. Denning Performance Analysis: Experimental
computer science at its best . . . . . . 725--727
Saul I. Gass and
Karla L. Hoffman and
Richard H. F. Jackson and
Lambert S. Joel and
Patsy B. Saunders Documentation for a Model: a
Hierarchical Approach . . . . . . . . . 728--733
M. A. Pechura Microcomputers as remote nodes of a
distributed system . . . . . . . . . . . 734--738
Starr Roxanne Hiltz and
Murray Turoff The Evolution of User Behavior in a
Computerized Conference System . . . . . 739--751
Izak Benbasat and
Albert S. Dexter and
Paul S. Masulis An Experimental Study of the
Human/Computer Interface . . . . . . . . 752--762
Bennet P. Lientz and
E. Burton Swanson Problems in Application Software
Maintenance . . . . . . . . . . . . . . 763--769
Leslie Lamport Technical Note: Password Authentication
with Insecure Communication . . . . . . 770--772
Paul Pritchard Corrigendum: ``A sublinear additive
sieve for finding prime numbers'' . . . 772--772
K. S. Booth Authentication of Signatures Using
Public Key Encryption . . . . . . . . . 772--774
Leonard J. Bass and
Ralph E. Bunker A Generalized User Interface for
Applications Programs . . . . . . . . . 796--800
William M. McCormack and
Robert G. Sargent Analysis of future event set algorithms
for discrete event simulation . . . . . 801--812
Per Galle An Algorithm for Exhaustive Generation
of Building Floor Plans . . . . . . . . 813--825
John H. Blackstone, Jr. and
Gary L. Hogg and
Don T. Phillips A two-list synchronisation procedure for
discrete event simulation . . . . . . . 825--829
G. Jaeschke Reciprocal Hashing: a Method for
Generating Minimal Perfect Hashing
Functions . . . . . . . . . . . . . . . 829--833
F. A. Briggs and
M. Dubois Performance of cache-based
multiprocessors . . . . . . . . . . . . 181--190
G. G. Gustafson and
Roberta J. Kerr Some Practical Experience with a
Software Quality Assurance Program . . . 4--12
Jean E. Sammet and
Anthony Ralston The New (1982) Computing Reviews
Classification System --- Final Version 13--25
Jane J. Robinson DIAGRAM: a Grammar for Dialogues . . . . 27--47
J. H. Ahrens and
U. Dieter Generating Gamma variates by a modified
rejection technique . . . . . . . . . . 47--54
Ben Shneiderman Control Flow and Data Structure
Documentation: Two Experiments . . . . . 55--63
Jon Louis Bentley and
Mark G. Faust and
Franco P. Preparata Approximation algorithms for convex
hulls . . . . . . . . . . . . . . . . . 64--68
Howard Mozeico A Human/Computer Interface to
Accommodate User Learning Stages . . . . 100--104
L. A. Welsch Using electronic mail as a teaching tool 105--108
E. F. Codd Relational Database: a Practical
Foundation for Productivity . . . . . . 109--117
Patrick G. Skelly The ACM Position on Standardization of
the Ada Language . . . . . . . . . . . . 118--120
Henry F. Ledgard and
Andrew Singer Scaling Down Ada (Or Towards a Standard
Ada Subset) . . . . . . . . . . . . . . 121--125
K. M. Chandy and
D. Neuse Linearizer: a heuristic algorithm for
queueing network models of computing
systems . . . . . . . . . . . . . . . . 126--134
John Zahorjan and
Kenneth C. Sevcik and
Derek L. Eager and
Bruce Galler Balanced job bound analysis of queueing
networks . . . . . . . . . . . . . . . . 134--141
P. A. Jacobson and
E. D. Lazowska Analyzing queueing networks with
simultaneous resource possession . . . . 142--151
Peter J. Denning Electronic Junk . . . . . . . . . . . . 163--165
John F. Shoch and
Jon A. Hupp Computing Practices: The `Worm' Programs
--- Early Experience with a Distributed
Computation . . . . . . . . . . . . . . 172--180
Eric A. Weiss Self-Assessment Procedure IX: a
self-assessment procedure dealing with
ethics in computing . . . . . . . . . . 181--195
Anthony I. Wasserman and
Steven Gutz The Future of Programming . . . . . . . 196--206
Edward H. McCall Performance Results of the Simplex
Algorithm for a Set of Real-World Linear
Programming Models . . . . . . . . . . . 207--212
Brian Billard Corrigendum: ``Polynomial manipulation
with APL'' . . . . . . . . . . . . . . . 213--213
Marvin L. Watkins A Technique for Testing Command and
Control Software . . . . . . . . . . . . 228--232
James G. Mitchell and
Jeremy Dion A Comparison of Two Network-Based File
Servers . . . . . . . . . . . . . . . . 233--245
Alfred Z. Spector Performing remote operations efficiently
on a local computer network . . . . . . 246--260
Andrew D. Birrell and
Roy Levin and
Roger M. Needham and
Michael D. Schroeder Grapevine: an exercise in distributed
computing . . . . . . . . . . . . . . . 260--274
D. K. Gifford and
A. K. Jones Cryptographic Sealing for Information
Security and Authentication . . . . . . 274--286
William E. Howden Contemporary Software Development
Environments . . . . . . . . . . . . . . 318--329
Norihisa Suzuki Analysis of Pointer ``Rotation'' . . . . 330--335
Wm. Randolph Franklin On an Improved Algorithm for
Decentralized Extrema Finding in
Circular Configurations of Processors 336--337
Richard C. Morey Estimating and Improving the Quality of
Information in a MIS . . . . . . . . . . 337--342
Michael R. Levy Modularity and the Sequential File
Update Problem . . . . . . . . . . . . . 362--367
D. J. Dodds Pracniques: Reducing Dictionary Size by
Using a Hashing Technique . . . . . . . 368--370
A. Fournier and
D. Fussell and
L. Carpenter Computer Rendering of Stochastic Models 371--384
James W. Brown Controlling the Complexity of Menu
Networks . . . . . . . . . . . . . . . . 412--418
Bertrand Meyer Principles of Package Design . . . . . . 419--428
Greg Kearsley Authoring Systems in Computer Based
Education . . . . . . . . . . . . . . . 429--437
William Swartout and
Robert Balzer On the Inevitable Intertwining of
Specification and Implementation . . . . 438--440
Bruce Gilchrist and
Arlaana Shenkin The Impact of Scanners on Employment in
Supermarkets . . . . . . . . . . . . . . 441--445
Mark Weiser Programmers Use Slices When Debugging 446--452
Dennis Tsichritzis Form management . . . . . . . . . . . . 453--478
Om Vikas and
V. Rajaraman Searching in a Dynamic Memory with Fast
Sequential Access . . . . . . . . . . . 479--484
T-Y. Cheung Estimating Block Accesses and Number of
Records in File Management . . . . . . . 484--487
James L. Elshoff and
Michael Marcotty Improving Computer Program Readability
to Aid Modification . . . . . . . . . . 512--521
T. N. Turba Length-segmented lists . . . . . . . . . 522--526
Robert F. Simmons and
Daniel L. Chester Relating Sentences and Semantic Networks
with Procedural Logic . . . . . . . . . 527--547
T. Berk and
L. Brownston and
A. Kaufman A Human Factors Study of Color Notation
Systems for Computer Graphics . . . . . 547--550
M. S. Doyle and
J. W. Graham A Study of Superfluity in Storage
Hierarchies . . . . . . . . . . . . . . 550--555
Clement W. H. Lam and
Leonard H. Soicher Three New Combination Algorithms with
the Minimal Change Property . . . . . . 555--559
Judea Pearl The Solution for the Branching Factor of
the Alpha-Beta Pruning Algorithm and its
Optimality . . . . . . . . . . . . . . . 559--564
Hanan Samet Heuristics for the Line Division Problem
in Computer Justified Text . . . . . . . 564--571
Johannes J. Martin An Efficient Garbage Compaction
Algorithm . . . . . . . . . . . . . . . 571--581
B. B. Mandelbrot Comment on Computer Rendering of Fractal
Stochastic Models . . . . . . . . . . . 581--584
L. L. Gremillion Designing a Bloom Filter for
Differential File Access . . . . . . . . 600--604
Michael A. Pechura File Archival Techniques Using Data
Compression . . . . . . . . . . . . . . 605--609
Ben Shneiderman Pracniques: Designing Computer System
Messages . . . . . . . . . . . . . . . . 610--611
Seymour E. Goodman U.S. Computer Export Control Policies:
Value Conflicts and Policy Choices . . . 613--623
David Chapman A Program Testing Assistant . . . . . . 625--634
Yong Tsui Lee and
Aristides A. G. Requicha Algorithms for Computing the Volume and
Other Integral Properties of Solids. I.
Known Methods and Open Issues . . . . . 635--641
Y. T. Lee and
A. A. G. Requicha Algorithms for Computing the Volume and
Other Integral Properties of Solids. II.
A Family of Algorithms Based on
Representation Conversion and Cellular
Approximation . . . . . . . . . . . . . 642--650
Lubomir Bic A Protection Model and Its
Implementation in a Dataflow System . . 650--658
Francis Y. Chin and
John Lam and
I Ngo Chen Efficient parallel algorithms for some
graph problems . . . . . . . . . . . . . 659--665
J. F. Isner A Fortran Programming Methodology based
on Data Abstraction . . . . . . . . . . 686--698
Mark L. Gillenson The State of Practice of Data
Administration--1981 . . . . . . . . . . 699--706
Lester Lipsky and
Chee-Min Henry Lieu and
Abolfazl Tehranipour and
Appie van de Liefvoort On the Asymptotic Behavior of
Time-Sharing Systems . . . . . . . . . . 707--714
Leland L. Beck A Dynamic Storage Allocation Technique
Based on Memory Residence Time . . . . . 714--724
Jacques Cohen Computer-assisted microanalysis of
programs . . . . . . . . . . . . . . . . 724--733
William A. Kornfeld Combinatorially Implosive Algorithms . . 734--738
J. Nievergelt and
F. P. Preparata Plane-Sweep Algorithms for Intersecting
Geometric Figures . . . . . . . . . . . 739--747
P. A. Houle Comment on gamma deviate generation . . 747--748
Thomas L. Wicklund MINI-EXEC: a Portable Executive for
$8$-Bit Microcomputers . . . . . . . . . 772--780
E. J. Gauss Pracniques: The ``Wolf Fence'' Algorithm
for Debugging . . . . . . . . . . . . . 780
Jay F. Nunamaker, Jr. and
J. Daniel Couger and
Gordon B. Davis Information Systems Curriculum
Recommendations for the 80s:
Undergraduate and Graduate Programs . . 781--805
Theodor D. Sterling Unionization of Professionals in Data
Processing: An Assessment of Recent
Trends . . . . . . . . . . . . . . . . . 807--816
B. J. Lageweg and
J. K. Lenstra and
A. H. G. Rinnooy Kan Computer-Aided Complexity Classification
of Combinatorial Problems . . . . . . . 817--822
W. Y.-P. Lim HISDL: a structure description language 823--830
A. M. Langer and
A. W. Shum The Distribution of Granule Accesses
Made by Database Transactions . . . . . 831--832
K. M. Chandy and
J. Misra Distributed Computation on Graphs:
Shortest Path Algorithms . . . . . . . . 833--837
Margrethe H. Olson and
Henry C. Lucas, Jr. The Impact of Office Automation on the
Organization: Some Implications for
Research and Practice . . . . . . . . . 838--847
Michael Evans Software Engineering for the Cobol
Environment . . . . . . . . . . . . . . 874--882
Roger S. Gourd Self-Assessment Procedure X: a
Self-Assessment Procedure Dealing with
Software Project Management . . . . . . 883--887
Jack Minker Computer Professionals Whose Scientific
Freedom and Human Rights Have Been
Violated --- 1982 . . . . . . . . . . . 888--894
Art Lew On the Emulation of Flowcharts by
Decision Tables . . . . . . . . . . . . 895--905
I. Gargantini An Effective Way to Represent Quadtrees 905--910
J. S. Vitter Implementations for Coalesced Hashing 911--926
M. J. O'Donnell A Critique of the Foundations of Hoare
Style Programming Logics . . . . . . . . 927--934
M. Mor and
A. S. Fraenkel A Hash Code Method for Detecting and
Correcting Spelling Errors . . . . . . . 935--938
C. M. Eastman A Comment on English Neologisms and
Programming Language Keywords . . . . . 938--940
K. Samelson and
Friedrich L. Bauer Sequential Formula Translation (Reprint) 9--13
Edgar T. Irons A Syntax Directed Compiler for ALGOL 60
(Reprint) . . . . . . . . . . . . . . . 14--16
Edward H. Sussenguth, Jr. Use of Tree Structures for Processing
Files (Reprint) . . . . . . . . . . . . 17--20
Edsger W. Dijkstra Solution of a Problem in Concurrent
Programming Control (Reprint) . . . . . 21--22
Joseph Weizenbaum ELIZA --- a Computer Program For the
Study of Natural Language Communication
Between Man And Machine (Reprint) . . . 23--28
Jack B. Dennis and
Earl C. Van Horn Programming Semantics for
Multiprogrammed Computations (Reprint) 29--35
W. D. Maurer An Improved Hash Code for Scatter
Storage (Reprint) . . . . . . . . . . . 36--38
Robert Morris Scatter Storage Techniques (Reprint) . . 39--42
Peter J. Denning The Working Set Model for Program
Behaviour (Reprint) . . . . . . . . . . 43--48
Edsger W. Dijkstra The Structure of the
``THE''-Multiprogramming System
(Reprint) . . . . . . . . . . . . . . . 49--52
C. A. R. Hoare An Axiomatic Basis for Computer
Programming (Reprint) . . . . . . . . . 53--56
Jay Earley An Efficient Context-Free Parsing
Algorithm (Reprint) . . . . . . . . . . 57--61
James R. Bell The Quadratic Quotient Method: a Hash
Code Eliminating Secondary Clustering
(Reprint) . . . . . . . . . . . . . . . 62--63
E. F. Codd A Relational Model of Data for Large
Shared Data Banks (Reprint) . . . . . . 64--69
Niklaus Wirth Program Development by Stepwise
Refinement (Reprint) . . . . . . . . . . 70--74
David Lorge Parnas A Technique for Software Module
Specification with Examples (Reprint) 75--78
H. Kuki and
W. J. Cody A statistical study of the accuracy of
floating point number systems (Reprint) 79--83
Dennis M. Ritchie and
Ken Thompson The UNIX Time-Sharing System (Reprint) 84--89
Robert M. Metcalfe and
David R. Boggs Ethernet: Distributed Packet Switching
for Local Computer Networks . . . . . . 90--95
R. L. Rivest and
A. Shamir and
L. Adleman A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems
(Reprint) . . . . . . . . . . . . . . . 96--99
C. A. R. Hoare Communicating Sequential Processes
(Reprint) . . . . . . . . . . . . . . . 100--106
Ahmed S. Zaki Regulation of Electronic Funds Transfer:
Impact and Legal Issues . . . . . . . . 112--118
Gordon Bell The Computer Museum Member's First Field
Trip: The Northbay AN/FSQ7 Sage Site . . 118--119
W. Kent A Simple Guide to Five Normal Forms in
Relational Database Theory . . . . . . . 120--125
R. Charles Bell Monte Carlo Debugging: a Brief Tutorial 126--127
Iris Vessey and
Ron Weber Some Factors Affecting Program Repair
Maintenance: An Empirical Study . . . . 128--134
B. Srinivasan On the Synthesis of Decision Tables . . 135--136
Michael J. Mathey and
Bernard M. E. Moret The Computational Metaphor and Quantum
Physics . . . . . . . . . . . . . . . . 137--145
Arthur I. Schwarz On File Compression Techniques . . . . . 148--148
Michael Pechura On File Compression Techniques: Author's
Response . . . . . . . . . . . . . . . . 148--149
M. H. Olson Remote office work: changing work
patterns in space and time . . . . . . . 182--187
Michael A. Pechura Comparing Two Microcomputer Operating
Systems: CP/M and HDOS . . . . . . . . . 188--195
A. Chesnais and
Erol Gelenbe and
Isi Mitrani On the Modeling of Parallel Access to
Shared Data . . . . . . . . . . . . . . 196--202
Simon S. Lam and
Y. Luke Lien A tree convolution algorithm for the
solution of queueing networks . . . . . 203--215
Hitohisa Asai and
C. K. Cheng Speeding Up an Overrelaxation Method of
Division in Radix-$2^n$ Machine . . . . 216--220
P. Abrams Electronic islands . . . . . . . . . . . 241--242
P. J. Brown Error Messages: The Neglected Area of
the Man/Machine Interface? . . . . . . . 246--249
Dalia Motzkin Pracnique: MEANSORT . . . . . . . . . . 250--251
Michael L. Schneider and
John C. Thomas Introduction: The Humanization of
Computer Interfaces . . . . . . . . . . 252--253
Donald A. Norman Design Rules Based on Analyses of Human
Error . . . . . . . . . . . . . . . . . 254--258
Robert J. K. Jacob Using Formal Specifications in the
Design of a Human-Computer Interface . . 259--264
T. L. Roberts and
T. P. Moran The Evaluation of Text Editors,
Methodology and Empirical Results . . . 265--283
Steven L. Sauter and
Mark S. Gottlieb and
Karen C. Jones and
Vernon N. Dodson and
Kathryn M. Rohrer Job and Health Implications of VDT Use:
Initial results of the Wisconsin--NIOSH
Study . . . . . . . . . . . . . . . . . 284--294
J. D. Gould and
J. Conti and
T. Hovanyecz Composing Letters with a Simulated
Listening Typewriter . . . . . . . . . . 295--308
T. R. Girill and
Clement H. Luk Document: An Interactive, Online
Solution to Four Documentation Problems 328--337
Michael J. Ginzberg Introduction: Three Papers from the
Third International Conference on
Information Systems . . . . . . . . . . 339
Tarek K. Abdel-Hamid and
Stuart E. Madnick The Dynamics of Software Project
Scheduling . . . . . . . . . . . . . . . 340--346
R. E. A. Mason and
T. T. Carey Prototyping Interactive Information
Systems . . . . . . . . . . . . . . . . 347--354
H. J. Will ACL: a Language Specific for Auditors 356--361
Richard N. Taylor A General-Purpose Algorithm for
Analyzing Concurrent Programs . . . . . 362--376
John Konvalina and
Stanley A. Wileman and
Larry J. Stephens Math Proficiency: a Key to Success for
Computer Science Students . . . . . . . 377--381
Stephen C. Hora Estimation of the inverse function for
random variate generation . . . . . . . 590--594
Stephen A. Cook An Overview of Computational Complexity 400--408
Jonathan Jacky and
Ira Kalet A General Purpose Data Entry Program . . 409--417
Robert W. Bemer Coordinated Text and Transparencies . . 418
Henry Lieberman and
Carl Hewitt A Real-Time Garbage Collector Based on
the Lifetimes of Objects . . . . . . . . 419--429
M. Lynne Markus Power, Politics, and MIS Implementation 430--444
H. Rudy Ramsey and
Michael E. Atwood and
James R. Van Doren Flowcharts Versus Program Design
Languages: An Experimental Comparison 445--449
David P. Gardner and
Yvonne W. Larsen A Nation At Risk: The Imperative for
Educational Reform, Report by The
National Commission on Excellence in
Education . . . . . . . . . . . . . . . 467--478
Eric A. Weiss Self-Assessment Procedure XI: a
Self-Assessment Procedure Dealing with
One Part of Early Computing History . . 479--482
D. V. Morland Human factors guidelines for terminal
interface design . . . . . . . . . . . . 484--494
Thomas K. Landauer and
Kathleen M. Galotti and
S. Hartwell Natural Command Names and Initial
Learning: a Study of Text-Editing Terms 495--503
M.-M. Yau and
S. N. Srihari A Hierarchical Data Structure for
Multidimensional Digital Images . . . . 504--515
M. Fushimi and
S. Tezuka The $k$-distribution of Generalized
Feedback Shift Register Pseudorandom
Numbers . . . . . . . . . . . . . . . . 516--523
Mark J. Cloutier and
Matthew J. Friedman Precision Averaging for Real-Time
Analysis . . . . . . . . . . . . . . . . 525--529
Jon Louis Bentley Programming Pearls: Cracking the Oyster 549--552
William E. Burr An overview of the proposed American
National Standard for Local Distributed
Data Interfaces . . . . . . . . . . . . 554--561
James V. Hansen Audit Considerations in Distributed
Processing Systems . . . . . . . . . . . 562--569
James K. Mullin A Second Look at Bloom Filters . . . . . 570--571
David Lorge Parnas A Generalized Control Structure and Its
Formal Definition . . . . . . . . . . . 572--581
Frank Milne and
Ron Weber The Economics of Designing Generalized
Software . . . . . . . . . . . . . . . . 582--589
Jürgen Peemöller A correction to Brélaz's modification of
Brown's coloring algorithm . . . . . . . 595--597
Jon Louis Bentley Programming Pearls: Aha! Algorithms . . 623--628
P. McCorduck Introduction to the Fifth Generation . . 629--630
Paul S. Licker The Japanese Approach: a Better Way to
Manage Programmers? . . . . . . . . . . 631--636
E. Y. Shapiro The Fifth Generation Project --- a Trip
Report . . . . . . . . . . . . . . . . . 637--641
Rosalie Steier Cooperation is the Key: An Interview
with B. R. Inman . . . . . . . . . . . . 642--645
T. Watanabe and
T. Ohsawa and
T. Suzuki A Simple Database Language for Personal
Computers . . . . . . . . . . . . . . . 646--653
Andrew S. Tanenbaum and
Hans van Staveren and
E. G. Keizer and
J. W. Stevenson A Practical Tool Kit for Making Portable
Compilers . . . . . . . . . . . . . . . 654--660
Jeffrey L. Eppinger An Empirical Study of Insertion and
Deletion in Binary Search Trees . . . . 663--669
Ronald Prescott Loui Optimal Paths in Graphs with Stochastic
or Multidimensional Weights . . . . . . 670--676
Piraye Bayman and
Richard E. Mayer A Diagnosis of Beginning Programmers'
Misconceptions of BASIC Programming
Statements . . . . . . . . . . . . . . . 677--679
H. Samet A Quadtree Medial Axis Transform . . . . 680--693
Jon Louis Bentley Programming Pearls: Data Structures
Programs . . . . . . . . . . . . . . . . 726--730
Gerardine DeSanctis and
James F. Courtney Toward Friendly User MIS Implementation 732--738
Tor Guimaraes Managing Application Program Maintenance
Expenditures . . . . . . . . . . . . . . 739--746
D. A. Comer A Computer Science Research Network
CSNET: a History and Status Report . . . 747--753
M. A. Pechura and
J. D. Schoeffler Estimating File Access Time of Floppy
Disks . . . . . . . . . . . . . . . . . 754--763
I. Durham and
D. Lamb and
J. Saxe Spelling correction in user interfaces 764--773
Gordon B. Davis and
M. H. Schwartz Introduction to the Special Section on
Information Systems Management . . . . . 775
J. F. Rockart and
L. S. Flannery The Management of End-User Computing . . 776--784
Blake Ives and
Margrethe H. Olson and
Jack J. Baroudi The Measurement of User Information
Satisfaction . . . . . . . . . . . . . . 785--793
Beverly K. Kahn Some Realities of Data Administration 794--799
John M. Ivancevich and
H. Albert Napier and
James C. Wetherbe Occupational Stress, Attitudes, and
Health Problems in the Information
Systems Professionals . . . . . . . . . 800--806
Kathryn M. Bartol Turnover Among DP Personnel: a Causal
Analysis . . . . . . . . . . . . . . . . 807--811
J. F. Allen Maintaining Knowledge about Temporal
Intervals . . . . . . . . . . . . . . . 832--843
Wolfgang Bibel Matings in matrices . . . . . . . . . . 844--852
Elliot Soloway and
Jeffrey Bonar and
Kate Ehrlich Cognitive Strategies and Looping
Constructs: An Empirical Study . . . . . 853--860
Richard J. Miara and
Joyce A. Musselman and
Juan A. Navarro and
Ben Shneiderman Program Indentation and
Comprehensibility . . . . . . . . . . . 861--867
You Dong Liang and
Brian A. Barsky An analysis and algorithm for polygon
clipping . . . . . . . . . . . . . . . . 868--877
J. T. Postmus and
A. H. G. Rinnooy Kan and
G. T. Timmer An efficient dynamic selection method 878--881
Russel J. Abbott Program design by Informal English
Descriptions . . . . . . . . . . . . . . 882--894
Joep L. W. Kessels On-the-Fly Optimization of Data
Structures . . . . . . . . . . . . . . . 895--901
D. Wile Program developments: formal
explanations of implementations . . . . 902--911
G. Gonnet and
F. W. Tompa A constructive approach to the design of
algorithms and their data structures . . 912--920
James F. Korsh and
Gary Laison A Multiple-Stack Manipulation Procedure 921--923
R. Charles Bell and
Bryan Floyd A Monte Carlo Study of Cichelli
Hash-Function Solvability . . . . . . . 924--925
Jack P. C. Kleijnen and
Anton J. Van Reeken Principles of Computer Charging in a
University-Type Organization . . . . . . 926--932
Antoni Olivé i Ramon Information Derivability Analysis in
Logical Information Systems . . . . . . 933--938
Kyu Young Whang and
Gio Wiederhold and
Daniel Sagalowicz Estimating Block Accesses in Database
Organizations: a Closed Noniterative
Formula . . . . . . . . . . . . . . . . 940--944
W. S. Luk On Estimating Block Accesses in Database
Organizations . . . . . . . . . . . . . 945--947
N. Vitalari and
G. Dickson Problem Solving for Effective Systems
Analysis: An Experimental Exploration 948--956
Lee Schruben Simulation Modeling with Event Graphs 957--963
George S. Fishman and
Bao Sheng D. Huang Antithetic variates revisited . . . . . 964--971
Raymond E. Barber and
Henry C. Lucas, Jr. System Response Time, Operator
Productivity, and Job Satisfaction . . . 972--986
Ron Dagwell and
Ron Weber System Designers' User Models: a
Comparative Study and Methodological
Critique . . . . . . . . . . . . . . . . 987--997
Gabriel M. Silberman Stack Processing Techniques in
Delayed-Staging Storage Hierarchies . . 999--1007
W. P. Petersen Vector Fortran for Numerical Problems on
CRAY-1 . . . . . . . . . . . . . . . . . 1008--1021
Gerard Salton and
Edward A. Fox and
Harry Wu Extended Boolean information retrieval 1022--1036
Jon Louis Bentley Programming Pearls: Writing Correct
Programs . . . . . . . . . . . . . . . . 1040--1045
S. S. Yau and
R. W. Ritchie and
W. Semon and
J. Traub and
A. Van Dam and
S. Winkler Meeting the Crisis in Computer Science 1046--1050
Perry R. Morrison A Survey of Attitudes Toward Computers 1051--1057
Marc Eisenstadt A User-Friendly Software Environment for
the Novice Programmer . . . . . . . . . 1058--1064
Paul J. Jalics and
Thomas S. Heines Transporting a Portable Operating
System: UNIX to an IBM Minicomputer . . 1066--1072
Gaston H. Gonnet Balancing Binary Trees by Internal Path
Reduction . . . . . . . . . . . . . . . 1074--1081
Seiichi Nishihara and
Katsuo Ikeda Reducing the retrieval time of hashing
method by using predictors . . . . . . . 1082--1088
J. Bentley Programming Pearls: Algorithm Design
Techniques . . . . . . . . . . . . . . . 865--871
J. L. Bentley Programming Pearls: About the Column . . 12--13
Gerald M. Berns Assessing Software Maintainability . . . 14--23
John W. Geils Why Students Reject Engineering Teching
Careers . . . . . . . . . . . . . . . . 25--27
Robert I. Winner and
Edward M. Carter Self-Assessment Procedure XII: a
Self-Assessment Procedure Dealing with
Computer Architecture . . . . . . . . . 29--36
Peter J. L. Wallis and
Brian A. Wichmann Requirements Analysis for Ada Compilers 37--41
Victor R. Basili and
Barry T. Perricone Software Errors and Complexity: An
Empirical Investigation . . . . . . . . 42--52
Paul Pritchard Some Negative Results Concerning Prime
Number Generators . . . . . . . . . . . 53--57
Henry C. Lucas, Jr. Organizational Power and the Information
Services Department . . . . . . . . . . 58--65
Jon Louis Bentley Programming Pearls: Code Tuning . . . . 91--96
Brian A. Wichmann Is Ada Too Big? A Designer Answers the
Critics . . . . . . . . . . . . . . . . 98--103
Pamela Zave The operational versus the conventional
approach to software development . . . . 104--118
G. E. Anderson The Coordinated Use of Five Performance
Evaluation Methodologies . . . . . . . . 119--125
R. C. Houghton, Jr. Online Help Systems: a Conspectus . . . 126--133
Eric C. R. Hehner Predicative Programming, Part I . . . . 134--143
Eric C. R. Hehner Predicative Programming, Part II . . . . 144--151
You Dong Liang and
Brian A. Barsky Corrigendum: ``An analysis and algorithm
for polygon clipping'' . . . . . . . . . 151--151
Nicola Santoro Chain multiplication of matrices of
approximately or exactly the same size 152--156
Jon Louis Bentley Programming Pearls: The Back of the
Envelope . . . . . . . . . . . . . . . . 180--184
Gene Dallaire and
Fortney H. Stark and
Hal Berghel Should Congress Provide Special Tax
Incentives for Firms Donating Computers
to Schools? . . . . . . . . . . . . . . 185--194
Jean B. Rogers and
David G. Moursund and
Gerald L. Engel Preparing Precollege Teachers for the
Computer Age . . . . . . . . . . . . . . 195--200
Robert W. Blanning Conversing with Management Information
Systems in Natural Language . . . . . . 201--207
Thomas A. D'Auria ACM's Visit to the People's Republic of
China . . . . . . . . . . . . . . . . . 208--214
Paul J. Jalics COBOL vs. PL/1: Some Performance
Comparisons . . . . . . . . . . . . . . 216--221
Gerald Bozman The Software Lookaside Buffer Reduces
Search Overhead with Linked Lists . . . 222--227
Dov Dori and
Moshe Ben-Bassat Efficient nesting of congruent convex
figures . . . . . . . . . . . . . . . . 228--235
T. Y. Zhang and
C. Y. Suen A Fast Parallel Algorithm for Thinning
Digital Patterns . . . . . . . . . . . . 236--239
George Diehr and
Bruce Faaland Optimal pagination of B-trees with
variable-length items . . . . . . . . . 241--247
Markku Tamminen Comments on quad- and octtrees . . . . . 248--249
Jon Louis Bentley Programming Pearls: How to Sort . . . . 287--291
Gene Dallaire American Universities Need Greater
Access to Supercomputers . . . . . . . . 293--298
Edward F. Hayes Access to Supercomputers: An NSF
Perspective (Interview) . . . . . . . . 299--303
Anonymous Coping with the imprecision of the real
world. An interview with Lotfi A. Zadeh 304--311
Peter J. Denning and
Donn B. Parker and
Susan H. Nycum and
Willis H. Ware Computers, Crime and Privacy --- a
National Dilema, Congressional Testimony
from the Industry . . . . . . . . . . . 312--321
Allen B. Tucker A Perspective on Machine Translation:
Theory and Practice . . . . . . . . . . 322--329
Michael C. Mulder and
John F. Dalphin Computer Science Program Requirements
and Accreditation, An Interim Report of
the ACM/IEEE Computer Society Joint Task
Force . . . . . . . . . . . . . . . . . 330--335
Jean E. Sammet and
Bernard Rous Special Report: Progress Report on the
ACM Guide to Computing Literature . . . 336--341
Peter G. Neumann A Further View of the First Quarter
Century: Introduction to the April 1984
Special Section . . . . . . . . . . . . 343
Donald E. Knuth The Complexity of Songs (April 1984
Special Section) . . . . . . . . . . . . 344--348
R. Lawrence Clark A Linuistic Contribution to Goto-Less
Programming (April 1984 Special Section) 349--350
Preet J. Nedginn and
Trebor L. Bworn CLOG: An Ada Package for Automatic
Footnote Generation in UNIX (April 1984
Special Section) . . . . . . . . . . . . 351
P. J. Brown Languages: Three Interviews (April 1984
Special Section) . . . . . . . . . . . . 352--355
J. B. Cadwallader-Cohen and
W. W. Zysic and
R. B. Donnelly The Chaostron: An Important Advance in
Learning Machines (April 1984 Special
Section) . . . . . . . . . . . . . . . . 356--357
J. J. Pollock and
A. Zamora Automatic spelling correction in
scientific and scholarly text . . . . . 358--368
David C. Blair The Data-Document Distinction in
Information Retrieval . . . . . . . . . 369--374
Izak Benbasat and
Yair Wand Command abbreviation behavior in
human-computer interaction . . . . . . . 376--383
You Dong Liang and
Brian A. Barsky Corrigendum: ``An analysis and algorithm
for polygon clipping'' . . . . . . . . . 383
C. C. Chang The Study of an Ordered Minimal Perfect
Hashing Scheme . . . . . . . . . . . . . 384--387
Dorothy E. Denning Digital Signatures with RSA and Other
Public-Key Cryptosystems . . . . . . . . 388--392
Ronald L. Rivest and
Adi Shamir How to Expose an Eavesdropper . . . . . 393--395
Jon Louis Bentley Programming Pearls: Squeezing Space . . 416--421
Robert L. Graham The Legal Protection of Computer
Software . . . . . . . . . . . . . . . . 422--426
Richard V. Giddings Accommodating Uncertainty in Software
Design . . . . . . . . . . . . . . . . . 428--434
Gopal K. Gupta Self-Assessment Procedure XIII: a
Self-Assessment Procedure Dealing with
Binary Trees and B-Trees . . . . . . . . 435--443
Ben Tsutom Wada A Virtual Memory System for Picture
Processing . . . . . . . . . . . . . . . 444--454
Gerard D. Finn An Algorithm for Optimized Boolean
Evaluation in Information Management
Systems . . . . . . . . . . . . . . . . 455--464
John Leslie King and
Kenneth L. Kraemer Evolution and Organizational Information
Systems: An Assessment of Nolan's Stage
Model . . . . . . . . . . . . . . . . . 466--475
Izak Benbasat and
Albert S. Dexter and
Donald H. Drury and
Robert C. Goldstein A Critique of the Stage Hypothesis:
Theory and Empirical Evidence . . . . . 476--485
R. A. Becker and
J. M. Chambers Design of the S System for Data Analysis 486--495
Jon Louis Bentley Programming Pearls: Graphic Output . . . 529--536
Gene Dallaire and
John Shattuck and
Richard P. Kusserow Computer Matching: Should It Be Banned? 537--545
J. Shattuck Computer Matching is a Serious Threat to
Individual Rights . . . . . . . . . . . 538
R. P. Kusserow The Government Needs Computer Matching
to Root Out Waste and Fraud . . . . . . 542
Larry Fujitani Laser Optical Disk: The Coming
Revolution in On-Line Storage . . . . . 546--554
M. Alavi An Assessment of the Prototyping
Approach to Information Systems
Development . . . . . . . . . . . . . . 556--563
Anthony I. Hinxman Updating a Database in an Unsafe
Environment . . . . . . . . . . . . . . 564--566
E. P. Glinert and
R. E. Ladner A large font virtual terminal interface:
a software prosthesis for the visually
impaired . . . . . . . . . . . . . . . . 567--572
Robert Wilensky and
Yigal Arens and
David N. Chin Talking to UNIX in English: An Overview
of UC . . . . . . . . . . . . . . . . . 574--593
Eric C. R. Hehner Corrigendum: ``Predicative programming.
I, II'' . . . . . . . . . . . . . . . . 593--593
Donald E. Knuth Corrigendum: ``The complexity of songs'' 593--593
Ten Hwang Lai and
Sartaj Sahni Anomalies in Parallel Branch-and-Bound
Algorithms . . . . . . . . . . . . . . . 594--602
Jon Louis Bentley Programming Pearls: Updates . . . . . . 630--636
Rosalie Steier An MCC Update . . . . . . . . . . . . . 636--637
Anonymous Computer Graphics Comes of Age, An
Interview with Andries van Dam . . . . . 638--648
D. Gifford and
A. Spector The TWA Reservation System . . . . . . . 649--669
Per-Åke Larson and
Ajay Kajla File Organization: Implementation of a
Method Guaranteeing Retrieval in One
Access . . . . . . . . . . . . . . . . . 670--677
John Kaunitz and
Louis van Ekert Audit Trail Compaction for Database
Recovery . . . . . . . . . . . . . . . . 678--683
R. B. Tilove A Null-Object Detection Algorithm for
Constructive Solid Geometry . . . . . . 684--694
Hsi Chang and
S. Sitharama Iyengar Efficient Algorithms to Globally Balance
a Binary Search Tree . . . . . . . . . . 695--702
Jeffrey Scott Vitter Faster Methods for Random Sampling . . . 703--718
Y. M. Babad and
J. F. Hoffer Even No Data Has a Value . . . . . . . . 748--756
Dennis M. Ritchie Reflections on Software Research . . . . 758--760
Ken Thompson Reflections on Trusting Trust . . . . . 761--763
Nazim H. Madhavji Visibility Aspects of Programmed Dyamic
Data Structures . . . . . . . . . . . . 764--776
James A. Haskett Pass-Algorithms: a User Validation
Scheme Based on Knowledge of Secret
Algorithms . . . . . . . . . . . . . . . 777--781
Douglas W. Jones Improved Interpretation of UNIX-Like
File Names Embedded in Data . . . . . . 782--784
H. M. Markowitz and
A. Malhotra and
D. P. Pazel The EAS-E Application Development
System: Principles and Language Summary 785--799
John M. Carroll and
Caroline Carrithers Training Wheels in a User Interface . . 800--806
D. R. K. Brownrigg The Weighted Median Filter . . . . . . . 807--818
D. Julian M. Davies Memory Occupancy Patterns in Garbage
Collection Systems . . . . . . . . . . . 819--825
Lee L. Gremillion Determinants of Program Repair
Maintenance Requirements . . . . . . . . 826--832
Jon Louis Bentley Programming Pearls: Algorithm Design
Techniques . . . . . . . . . . . . . . . 865--871
David K. Gifford and
Alfred Z. Spector The Space Shuttle Primary Computer
System . . . . . . . . . . . . . . . . . 872--900
A. Spector and
D. Gifford The Space Shuttle Primary Computer
System . . . . . . . . . . . . . . . . . 874--900
Edward Ng and
Paul B. Schneck Introduction to the Special Section on
Computing in Space . . . . . . . . . . . 901
Charles E. Trevathan and
Thomas D. Taylor and
Raymond G. Hartenstein and
Ann. C. Merwarth and
William N. Stewart Development and Application of NASA's
First Standard Spacecraft Computer . . . 902--913
William A. Madden and
Kyle Y. Rone Design, Development, Integration: Space
Shuttle Primary Flight Software System 914--925
G. D. Carlow Architecture of the Space Shuttle
Primary Avionics Software System . . . . 926--937
Hassan Gomaa A Software Design Method for Real-Time
Systems . . . . . . . . . . . . . . . . 938--949
Tim Maude and
Derwent Maude Hardware Protection Against Software
Piracy . . . . . . . . . . . . . . . . . 950--959
M. D. Good and
J. A. Whiteside and
D. R. Wixon and
S. J. Jones Building a user-derived interface . . . 1032--1043
Jean Ichbiah Ada: Past, Present, Future, An Interview
with Jean Ichbiah, the Principle
Designer of Ada . . . . . . . . . . . . 990--997
Elliot B. Koffman and
Philip L. Miller and
Caroline E. Wardle Recommended Curriculum for CS1, 1984 . . 998--1001
Anthony Ralston The First Course in Computer Science
Needs a Mathematical Corequisite . . . . 1002--1009
Robert L. Ashenhurst A Conference on Information Law and
Ethics . . . . . . . . . . . . . . . . . 1006--1007
C. M. Krishna and
Kang G. Shin and
Yann-Hang Lee Optimization Criteria for Checkpoint
Placement . . . . . . . . . . . . . . . 1008--1012
Reinhold Weicker DHRYSTONE: a Synthetic Systems
Programming Benchmark . . . . . . . . . 1013--1030
Robert Marcus An Application of Artificial
Intelligence to Operations Research . . 1044--1047
Jon Louis Bentley Programming Pearls: Perspective on
Performance . . . . . . . . . . . . . . 1087--1092
Patricia F. Campbell and
George P. McCabe Predicting the Success of Freshmen in a
Computer Science Major . . . . . . . . . 1108--1113
Walter M. Mathews and
Kaye Reifers The Computer in Cartoons: a
Retrospective from the Saturday Review 1114--1119
Robert S. Arnold and
Norman F. Schneidewind and
Nicholas Zvegintzov A Software Maintenance Workshop . . . . 1120--1121
Larry R. Medsker An Interactive Decision Support System
for Energy Policy Analysis . . . . . . . 1122--1128
James V. Hansen and
William F. Messier A Relational Approach to Decision
Support for EDP Auditing . . . . . . . . 1129--1133
Leslie G. Valiant A Theory of the Learnable . . . . . . . 1134--1142
Tim Hickey and
Jacques Cohen Performance Analysis of On-the-Fly
Garbage Collection . . . . . . . . . . . 1143--1154
Jon Louis Bentley Programming Pearls: a Little Program, a
Lot of Fun . . . . . . . . . . . . . . . 1179--1182
Gordon B. Davis Selected Papers from the Fifth
International Conference on Information
Systems --- Introduction . . . . . . . . 1183
Paul Attewell and
James Rule Computing and Organizations: What We
Know and What We Don't Know . . . . . . 1184--1192
Blake Ives and
Gerard P. Learmonth The Information System as a Competitive
Weapon . . . . . . . . . . . . . . . . . 1193--1201
Charles R. Franz and
Daniel Robey An Investigation of User-Led System
Design: Rational and Political
Perspectives . . . . . . . . . . . . . . 1202--1209
Jon Turner Computer Mediated Work: The Interplay
Between Technology and Structured Jobs 1210--1217
Rob Kling and
Suzanne Iacono The Control of Information Systems
Developments after Implementation . . . 1218--1226
J. D. Litke An improved solution to the traveling
salesman problem with thousands of nodes 1227--1236
Richard B. Wilmot Foreign Keys Decrease Adaptability of
Database Designs . . . . . . . . . . . . 1237--1243
Stephen Wolfram Special Section on Computing at the
Frontiers of Theoretical Physics ---
Introduction . . . . . . . . . . . . . . 352--353
W. David Arnett Computational Astrophysics . . . . . . . 354--357
B. Lautrup Monte Carlo Methods in Theoretical
High-Energy Physics . . . . . . . . . . 358--362
Scott Kirkpatrick and
Robert H. Swendsen Statistical Mechanics and Disordered
Systems . . . . . . . . . . . . . . . . 363--373
David Campbell and
Jim Crutchfield and
Doyne Farmer and
Erica Jen Experimental Mathematics: The Role of
Computation in Nonlinear Science . . . . 374--384
Robert B. Pearson and
John L. Richardson and
Doug Toussaint Special-Purpose Processors in
Theoretical Physics . . . . . . . . . . 385--389
Stephen Wolfram Symbolic Mathematical Computation . . . 390--394
Roger L. Wainwright A Class of Sorting Algorithms Based on
Quicksort . . . . . . . . . . . . . . . 396--403
Jon Louis Bentley and
Catherine C. McGeoch Amortized Analyses of Self-Organizing
Sequential Search Heuristics . . . . . . 404--411
Marek Kubale and
Boguslaw Jackowski A Generalized Implicit Enumeration
Algorithm for Graph Coloring . . . . . . 412--418
Jon Louis Bentley and
David Gries (special guest oyster) Programming Pearls: Abstract Data Types 284--290
Alfred Z. Spector and
David K. Gifford Case Study: IBM's System/360--370
Architecture . . . . . . . . . . . . . . 291--307
Phillip Ein-Dor and
Jacob Feldmesser Attributes of the Performance of Central
Processing Units: a Relative Performance
Prediction Model . . . . . . . . . . . . 308--317
Jorge L. C. Sanz and
Irs'hak Dinstein and
Dragutin Petkovic Computing Multi-Colored Polygonal Masks
in Pipeline Architectures and Its
Application to Automated Visual
Inspection . . . . . . . . . . . . . . . 318--329
Peter J. Denning Special Section on Computer Architecture
--- Introduction . . . . . . . . . . . . 6--7
David A. Patterson Reduced instruction set computers . . . 8--21
Charles L. Seitz The cosmic cube . . . . . . . . . . . . 22--33
J. R. Gurd and
C. C. Kirkham and
I. Watson The Manchester Prototype Dataflow
Computer . . . . . . . . . . . . . . . . 34--52
Jean E. Sammet and
Robert W. Rector In recognition of the 25th anniversary
of Computing Reviews: selected reviews
1960--1984 . . . . . . . . . . . . . . . 53--68
Jack Minker Computer professionals whose scientific
freedom and human rights have been
violated --- 1984: a report of the ACM
committee on scientific freedom and
human rights . . . . . . . . . . . . . . 69--78
R. E. Berry and
B. A. E. Meekings A style analysis of C programs . . . . . 80--88
John C. Nash Design and implementation of a very
small linear algebra program package . . 89--94
Susan M. Merritt An inverted taxonomy of sorting
algorithms . . . . . . . . . . . . . . . 96--99
Jon Louis Bentley Programming Pearls: Tricks of the Trade 138--141
Phillip Ein-Dor Grosch's law re-revisited: CPU power and
the cost of computation . . . . . . . . 142--151
Ronald S. Lemos Rating the major computing periodicals
on readability . . . . . . . . . . . . . 152--157
Niklaus Wirth From programming language design to
computer construction . . . . . . . . . 160--164
Bernard C. Reimann and
Allan D. Waren User-oriented criteria for the selection
of DSS software . . . . . . . . . . . . 166--179
Stephen José Hanson and
Richard R. Rosinski Programmer perceptions of productivity
and programming tools . . . . . . . . . 180--189
C. Michael Overstreet and
Richard E. Nance A specification language to assist in
analysis of discrete event simulation
models . . . . . . . . . . . . . . . . . 190--201
Daniel D. Sleator and
Robert E. Tarjan Amortized Efficiency of List Update and
Paging Rules . . . . . . . . . . . . . . 202--208
Jon Louis Bentley Programming Pearls: Thanks, Heaps . . . 245--250
James Martin and
Philip A. Bernstein and
Peter J. Denning and
Michael L. Dertouzos and
Leonard Kleinrock Computer Science Education Today: a
Dialogue . . . . . . . . . . . . . . . . 251--262
James Martin and
Leonard Kleinrock Excerpts from: An Information Systems
Manifesto . . . . . . . . . . . . . . . 252--255
D. F. Butcher and
W. A. Muth Predicting performance in an
introductory computer science course . . 263--268
A. J. Turner Computer science in secondary schools:
curriculum and teacher certification . . 269--279
Ian H. Witten and
Bob Bramwell A system for interactive viewing of
structured documents . . . . . . . . . . 280--288
David C. Blair and
M. E. Maron An Evaluation of Retrieval Effectiveness
for a Full-Text Document-Retrieval
System . . . . . . . . . . . . . . . . . 285--299
John D. Gould and
Clayton Lewis Designing for usability: key principles
and what designers think . . . . . . . . 300--311
Haim Mendelson Pricing computer services: queueing
effects . . . . . . . . . . . . . . . . 312--321
W. D. Arnett Computational astrophysics . . . . . . . 354--357
B. Lautrup Monte Carlo methods in theoretical
high-energy physics . . . . . . . . . . 358--362
Scott Kirkpatrick and
Robert H. Swendsen Statistical Mechanics and Disordered
Systems . . . . . . . . . . . . . . . . 363--373
David Campbell and
Jim Crutchfield and
Doyne Farmer and
Erica Jen Experimental mathematics: the role of
computation in nonlinear science . . . . 374--384
Robert B. Pearson and
John L. Richardson and
Doug Toussaint Special-purpose processors in
theoretical physics . . . . . . . . . . 385--389
Stephen Wolfram Symbolic Mathematical Computation . . . 390--394
Roger L. Wainwright A class of sorting algorithms based on
Quicksort . . . . . . . . . . . . . . . 396--402
Jon L. Bentley and
Catherine C. McGeoch Amortized analyses of self-organizing
sequential search heuristics . . . . . . 404--411
Marek Kubale and
Boguslaw Jackowski A generalized implicit enumeration
algorithm for graph coloring . . . . . . 412--418
Jon Louis Bentley Programming Pearls: a Spelling Checker 456--462
Michael Conrad On design principles for a molecular
computer . . . . . . . . . . . . . . . . 464--480
Jane P. Devlin and
William A. Lowell and
Anne E. Alger Self-Assessment Procedure XIV: a
self-assessment procedure dealing with
the legal issues of computing . . . . . 481--488
John Tartar and
Bruce Arden and
Taylor Booth and
Peter Denning and
Ray Miller and
Andries van Dam The 1984 Snowbird Report: future issues
in computer science . . . . . . . . . . 490--493
Tor Guimaraes A study of application program
development techniques . . . . . . . . . 494--499
Jack Gostl and
Irwin Greenberg An application of queueing theory to the
design of a message-switching computer
system . . . . . . . . . . . . . . . . . 500--505
Rodney R. Oldehoeft and
Stephen J. Allan Adaptive exact-fit storage management 506--511
Nicholas P. Vitalari and
Alladi Venkatesh and
Kjell Gronhaug Computing in the home: shifts in the
time allocation patterns of households 512--522
Thomas J. Sager A Polynomial Time Generator for Minimal
Perfect Hash Functions . . . . . . . . . 523--532
Jon Louis Bentley Programming Pearls: Associative Arrays 570--576
Karen A. Frenkel Toward automating the
software-development cycle . . . . . . . 578--589
P.-J. Courtois On time and space decomposition of
complex structures . . . . . . . . . . . 590--603
John Beidler and
Richard H. Austing and
Lillian N. Cassel Computing programs in small colleges . . 605--611
David R. McIntyre and
Michael A. Pechura Data compression using static Huffman
code-decode tables . . . . . . . . . . . 612--616
Leonard J. Bass A generalized user interface for
applications programs (II) . . . . . . . 617--627
Alan W. Biermann and
Robert D. Rodman and
David C. Rubin and
J. Francis Heidlage Natural language with discrete speech as
a mode for human-to-machine . . . . . . 628--636
Shimon Even and
Oded Goldreich and
Abraham Lempel A randomized protocol for signing
contracts . . . . . . . . . . . . . . . 637--647
Jon Louis Bentley Programming Pearls: Confessions of a
Coder . . . . . . . . . . . . . . . . . 671--679
Starr Roxanne Hiltz and
Murray Turoff Structuring Computer-Mediated
Communication Systems to Avoid
Information Overload . . . . . . . . . . 680--689
Mark Stefik Strategic computing at DARPA: overview
and assessment . . . . . . . . . . . . . 690--704
Robert Papsdorf A Prescription for Computer Anxiety ---
Review of John Shore's ``The Sachertorte
Algorithm'' . . . . . . . . . . . . . . 704--706
John A. Mills A pragmatic view of the system architect 708--717
Václav Rajlich Paradigms for design and implementation
in ADA . . . . . . . . . . . . . . . . . 718--727
Kenneth C. Laudon Environmental and institutional models
of system development: a national
criminal history system . . . . . . . . 728--740
W. David Kelton Transient exponential-Erlang queues and
steady-state simulation . . . . . . . . 741--749
Mark Stefik Corrigendum: ``Strategic Computing at
DARPA: Overview and Assessment'' . . . . 788--788
David Gifford and
Alfred Spector The CIRRUS banking network . . . . . . . 798--807
Karen A. Frenkel Report on the microelectronics and
computer technology corporation
conference . . . . . . . . . . . . . . . 808--813
Elliot B. Koffman and
David Stemple and
Caroline E. Wardle Recommended curriculum for CS2, 1984: a
report of the ACM curriculum task force
for CS2 . . . . . . . . . . . . . . . . 815--818
J. M. Shearer and
M. A. Wolfe ALGLIB, a simple symbol-manipulation
package . . . . . . . . . . . . . . . . 820--825
Henry C. Smith Database design: composing fully
normalized tables from a rigorous
dependency diagram . . . . . . . . . . . 826--838
Dianne P. O'Leary and
G. W. Stewart Data-flow algorithms for parallel matrix
computation . . . . . . . . . . . . . . 840--853
L. L. Larmore and
D. S. Hirschberg Efficient optimal pagination of scrolls 854--856
Jon Louis Bentley Programming Pearls: Bumper-Sticker
Computer Science . . . . . . . . . . . . 896--901
Peter Friedland Special section on architectures for
knowledge-based systems . . . . . . . . 902--903
Richard Fikes and
Tom Kehler The Role of Frame-Based Representation
in Reasoning . . . . . . . . . . . . . . 904--920
Frederick Hayes-Roth Rule-based systems . . . . . . . . . . . 921--932
Michael R. Genesereth and
Matthew L. Ginsberg Logic programming . . . . . . . . . . . 933--941
J. Gutknecht Concepts of the text editor Lara . . . . 942--960
Gerard D. Finn Extended use of null productions in
LR(1) parser applications . . . . . . . 961--972
Hanan Samet Data structures for quadtree
approximation and compression . . . . . 973--993
James R. Slagle and
Henry Hamburger An expert system for a resource
allocation problem . . . . . . . . . . . 994--1004
David Chaum Security without identification:
transaction systems to make big brother
obsolete . . . . . . . . . . . . . . . . 1030--1044
Gad Ariav and
Michael J. Ginzberg DSS design: a systemic view of decision
support . . . . . . . . . . . . . . . . 1045--1052
Robert Mandl Orthogonal Latin squares: an application
of experiment design to compiler testing 1054--1058
Bo Sanden Systems programming with JSP: example
--- a VDU controller . . . . . . . . . . 1059--1067
R. M. Norton and
D. P. Yeager A Probability Model for Overflow
Sufficiency in Small Hash Tables . . . . 1068--1075
Raj Jain and
Imrich Chlamtac The $P^2$ Algorithm for Dynamic
Calculation of Quantiles and Histograms
Without Storing Observations . . . . . . 1076--1085
Jon Louis Bentley Programming Pearls: Selection . . . . . 1121--1127
Peter J. Denning and
Michael C. Mulder Computing in the Frontiers of Science
and Engineering --- Introduction . . . . 1128--1129
Michael R. Raugh Modeling California earthquakes and
earth structures . . . . . . . . . . . . 1130--1150
D. K. Cullers and
Ivan R. Linscott and
Bernard M. Oliver Signal processing in SETI . . . . . . . 1151--1163
Peter Friedland and
Laurence H. Kedes Discovering the secrets of DNA . . . . . 1164--1186
Alan B. Chambers and
David C. Nagel Pilots of the future: human or computer? 1187--1199
Leonard Kleinrock Distributed systems . . . . . . . . . . 1200--1213
Edward Balkovich and
Steven Lerman and
Richard P. Parmelee Computing in higher education: the
Athena experience . . . . . . . . . . . 1214--1224
Joel S. Birnbaum Toward the domestication of
microelectronics . . . . . . . . . . . . 1225--1235
Alain Colmerauer Prolog in 10 figures . . . . . . . . . . 1296--1310
Jacques Cohen Describing Prolog by its interpretation
and compilation . . . . . . . . . . . . 1311--1324
David Lorge Parnas Software aspects of strategic defense
systems . . . . . . . . . . . . . . . . 1326--1335
Gordon V. Cormack Data compression on a database system 1336--1342
J. D. McKeen and
Tor Guimaraes Selecting MIS projects by steering
committee . . . . . . . . . . . . . . . 1344--1352
Rosalie Steier Authors . . . . . . . . . . . . . . . . 1--2
Rosalie Steier From Washington . . . . . . . . . . . . 3--3
Kenneth C. Laudon Data quality and due process in large
interorganizational record systems . . . 4--11
Jason L. Frand and
Ephraim R. McLean Summary of the second annual UCLA survey
of business school computer usage . . . 12--18
Jean-Pierre Banâtre and
Michel Banâtre and
Guy Lapalme and
Florimond Ployette The design and building of Ench\`ere, a
distributed electronic marketing system 19--29
Mike Heck and
Martin Plaehn A workstation model for an interactive
graphics system . . . . . . . . . . . . 30--37
Gordon B. Davis Selected papers from the sixth
international conference on information
systems . . . . . . . . . . . . . . . . 39--39
Gary W. Dickson and
Gerardine DeSanctis and
D. J. McBride Understanding the effectiveness of
computer graphics for decision support:
a cumulative experimental approach . . . 40--47
Iris Vessey and
Ron Weber Structured tools and conditional logic:
an empirical investigation . . . . . . . 48--57
Anonymous Technical correspondence . . . . . . . . 58--59
Rosalie Steier Authors . . . . . . . . . . . . . . . . 83--83
Adele Goldberg President's letter . . . . . . . . . . . 84--85
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 87--90
Jon Louis Bentley Programming Pearls: Cutting the Gordian
Knot . . . . . . . . . . . . . . . . . . 92--96
Richard M. Karp Combinatorics, complexity, and
randomness . . . . . . . . . . . . . . . 98--109
Karen Frenkel Piecing together complexity . . . . . . 110--111
Karen A. Frenkel Complexity and parallel processing: an
interview with Richard Karp . . . . . . 112--117
Simon L. Peyton Jones Parsing Distfix Operators . . . . . . . 118--122
Warren Harrison and
Curtis R. Cook A note on the Berry-Meekings style
metric . . . . . . . . . . . . . . . . . 123--125
K. A. Redish and
W. F. Smyth Program style analysis: a natural
by-product of program compilation . . . 126--133
D. Yun Yeh and
Toshinori Munakata Dynamic initial allocation and local
reallocation procedures for multiple
stacks . . . . . . . . . . . . . . . . . 134--141
Carol S. Saunders and
Richard W. Scamell Organizational power and the information
services department: a reexamination . . 142--147
Rosalie Steier Authors . . . . . . . . . . . . . . . . 171--172
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 173
J. L. Bentley Programming Pearls: The Envelope is Back 176--182
Rosalie Steir From Washington . . . . . . . . . . . . 183--183
James H. Morris and
Mahadev Satyanarayanan and
Michael H. Conner and
John H. Howard and
David S. Rosenthal and
F. Donelson Smith Andrew: a Distributed Personal Computing
Environment . . . . . . . . . . . . . . 184--201
Norman E. Gibbs and
Allen B. Tucker A Model Curriculum for a Liberal Arts
Degree in Computer Science . . . . . . . 202--210
Sumit Sircar and
Dinesh Dave The relationship between benchmark tests
and microcomputer price . . . . . . . . 212--217
Philip J. Fleming and
John J. Wallace How not to lie with statistics: the
correct way to summarize benchmark
results . . . . . . . . . . . . . . . . 218--221
Donald Golden and
Michael Pechura The structure of microcomputer file
systems . . . . . . . . . . . . . . . . 222--230
Gary Lindstrom Elliott I. Organick (1925--1985) . . . . 231--231
Jack J. Baroudi and
Margrethe H. Olson and
Blake Ives An empirical study of the impact of user
involvement on system usage and
information satisfaction . . . . . . . . 232--238
H. E. Lü and
P. S. P. Wang A Comment on ``A Fast Parallel Algorithm
for Thinning Digital Patterns'' . . . . 239--242
Rosalie Steier Authors . . . . . . . . . . . . . . . . 259
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 260--265
Rosalie Steier From Washington . . . . . . . . . . . . 266--ff.
Alfred Spector and
David Gifford A computer science perspective of bridge
design . . . . . . . . . . . . . . . . . 267--283
Karen A. Frenkel Computers, complexity, and the Statue of
Liberty restoration . . . . . . . . . . 284--296
John A. Lee and
Gerald Segal and
Rosalie Steier Positive alternatives: a report on an
ACM panel on hacking . . . . . . . . . . 297--299
Douglas W. Jones An empirical comparison of
priority-queue and event-set
implementations . . . . . . . . . . . . 300--311
Larry Koved and
Ben Scneiderman Embedded menus: selecting items in
context . . . . . . . . . . . . . . . . 312--318
Jon Louis Bentley and
Daniel D. Sleator and
Robert E. Tarjan and
Victor K. Wei A Locally Adaptive Data Compression
Scheme . . . . . . . . . . . . . . . . . 320--330
Anonymous Technical correspondence . . . . . . . . 331--335
W. Richard Stark Comment on: ``Logic programming'' [Comm.
ACM, 28, 1985, 9, 933--941] by M. R.
Genesereth and M. L. Ginsberg. With a
reply by the authors . . . . . . . . . . 331--331
Rosalie Steier Authors . . . . . . . . . . . . . . . . 357--358
Alfred Bork Viewpoint . . . . . . . . . . . . . . . 360--ff.
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 362
Jon Bentley and
Don Knuth Programming pearls: literate programming 384--369
M. J. Sergot and
F. Sadri and
R. A. Kowalski and
F. Kriwaczek and
P. Hammond and
H. T. Cory The British Nationality Act as a logic
program . . . . . . . . . . . . . . . . 370--386
John S. Gourlay A language for music printing . . . . . 388--401
Valdis Berzins and
Michael Gray and
David Naumann Abstraction-based software development 402--415
Richard Botting Novel security techniques for online
systems . . . . . . . . . . . . . . . . 416--417
David S. Scott and
S. Sitharama Iyengar TID --- a Translation Invariant Data
Structure for Storing Images . . . . . . 418--429
Rosalie Steier Authors . . . . . . . . . . . . . . . . 465
Adele Goldberg President's letter . . . . . . . . . . . 466--467
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 468--469
Rosalie Steier From Washington . . . . . . . . . . . . 470
Jon Bentley and
Donald E. Knuth and
M. Douglas McIlroy Programming Pearls: a Literate Program:
a \tt WEB program for common words . . . 471--483
Herbert J. Bernstein Special Section on Factory Automation
and Robotics . . . . . . . . . . . . . . 484--485
John E. Hopcroft The impact of robotics on computer
science . . . . . . . . . . . . . . . . 486--498
Marc H. Raibert Legged robots . . . . . . . . . . . . . 499--514
David D. Grossman Opportunities for research on numerical
control machining . . . . . . . . . . . 515--522
S. Ceri and
G. Gottlob Normalization of relations and PROLOG 524--544
Jack J. Baroudi and
Michael J. Ginzberg Impact of the technological environment
on programmer/analyst job outcomes . . . 546--555
Anonymous Technical correspondence . . . . . . . . 556--558
Rosalie Steier Authors . . . . . . . . . . . . . . . . 577--579
Clark Thompson Military direction of academic CS
research . . . . . . . . . . . . . . . . 583--585
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 586--592
Henry F. Ledgard Special Section on The Human Aspects of
Computing: a Note on This Collection . . 593--593
Avi Rushinek and
Sara F. Rushinek What makes users happy? . . . . . . . . 594--598
Brian M. Slator and
Matthew P. Anderson and
Walt Conley Pygmalion at the Interface . . . . . . . 599--604
Richard E. Mayer and
Jennifer L. Dyck and
William Vilberg Learning to program and learning to
think: what's the connection? . . . . . 605--610
Geoffry S. Howard and
Robert D. Smith Computer anxiety in management: myth or
reality? . . . . . . . . . . . . . . . . 611--615
J. D. Gannon and
E. E. Katz and
V. R. Basili Metrics for Ada packages: an initial
study . . . . . . . . . . . . . . . . . 616--623
James C. Spohrer and
Elliot Soloway Novice mistakes: are the folk wisdoms
correct? . . . . . . . . . . . . . . . . 624--632
James L. Peterson A note on undetected typing errors . . . 633--637
Moira LeMay and
Eric Hird Operator work load: when is enough
enough? . . . . . . . . . . . . . . . . 638--642
Neal S. Coulter and
Norman H. Kelly Computer instruction set usage by
programmers: an empirical investigation 643--647
Gerard Salton Another look at automatic text-retrieval
systems . . . . . . . . . . . . . . . . 648--656
Hassan Gomaa Software development of real-time
systems . . . . . . . . . . . . . . . . 657--668
Neil Sarnak and
Robert E. Tarjan Planar point location using persistent
search trees . . . . . . . . . . . . . . 669--679
Anonymous Technical correspondence . . . . . . . . 680--682
Rosalie Steier Authors . . . . . . . . . . . . . . . . 705--706
Paul Abrahams President's letter . . . . . . . . . . . 707--708
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 709--710
Jon Louis Bentley Programming Pearls: Little Languages . . 711--721
Jean E. Sammet Why Ada is Not Just Another Programming
Language . . . . . . . . . . . . . . . . 722--732
Edward Lieblein The Department of Defense software
initiative --- a status report . . . . . 734--744
Martin K. Solomon and
Riva Wenig Bickel Self-assessment procedure XV: a
self-assessment procedure dealing with
file processing . . . . . . . . . . . . 745--751
Karen A. Frenkel Evaluating two massively parallel
machines . . . . . . . . . . . . . . . . 752--758
Russell M. Clapp and
Louis Duchesneau and
Richard A. Volz and
Trevor N. Mudge and
Timothy Schultze Toward real-time performance benchmarks
for Ada . . . . . . . . . . . . . . . . 760--778
Young Moo Kang and
Robert B. Miller and
Roger Alan Pick Comments on ``Grosch's law re-revisited:
CPU power and the cost of computation'' 779--781
Jon Louis Bentley and
Brian W. Kernighan GRAP --- a Language for Typesetting
Graphs . . . . . . . . . . . . . . . . . 782--792
R. H. Irving and
C. A. Higgins and
F. R. Safayeni Computerized performance monitoring
systems: use and abuse . . . . . . . . . 794--801
Raymond F. Koopman The orders of equidistribution of
subsequences of some asymptotically
random sequences . . . . . . . . . . . . 802--806
Rosalie Steier Authors . . . . . . . . . . . . . . . . 825--826
Paul Abrahams President's letter . . . . . . . . . . . 827--828
Robert L. Ashenhurst ACM Forum . . . . . . . . . . . . . . . 829--831
Jon Louis Bentley Programming Pearls: Document Design . . 832--839
Derek H. Sleeman Special Section on The Challenges of
Teaching Computer Programming . . . . . 840--841
J. R. Anderson and
E. Skwarecki The automated tutoring of introductory
computer programming . . . . . . . . . . 842--849
E. Soloway Learning to program = learning to
construct mechanisms and explanations 850--858
Andrea di Sessa and
Harold Abelson Boxer: a reconstructible computational
medium . . . . . . . . . . . . . . . . . 859--868
D. Gries and
R. Miller and
R. Ritchie and
P. Young Imbalance between Growth and Funding in
Academic Computer Science: Two Trends
Colliding . . . . . . . . . . . . . . . 870--878
Daniel G. Bobrow and
Sanjay Mittal and
Mark J. Stefik Expert systems: perils and promise . . . 880--894
M. D. Janssens and
J. K. Annot and
A. J. Van De Goor Adapting UNIX for a multiprocessor
environment . . . . . . . . . . . . . . 895--901
Q. F. Stout and
B. L. Warren Tree rebalancing in optimal time and
space . . . . . . . . . . . . . . . . . 902--908
Rosalie Steier Authors . . . . . . . . . . . . . . . . 927
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 928--931
John S. Quarterman and
Josiah C. Hoskins Notable Computer Networks . . . . . . . 932--971
David Gries The 1984--1985 Taulbee survey . . . . . 972--977
Niklaus Wirth Microprocessor architectures: a
comparison based on code generation by
compiler . . . . . . . . . . . . . . . . 978--990
Manny Hayes Accessing bit fields in FORTRAN-77 . . . 991--995
M. D. Atkinson and
J.-R. Sack and
B. Santoro and
T. Strothotte Min-max heaps and generalized priority
queues . . . . . . . . . . . . . . . . . 996--1000
Anonymous Technical correspondence . . . . . . . . 1001--1005
Rosalie Steier Authors . . . . . . . . . . . . . . . . 1023--1025
Dennis Frailey Vice-president's letter . . . . . . . . 1026
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 1027--1030
William K. McHenry and
Seymour E. Goodman MIS in Soviet industrial enterprise: the
limits of reform from above . . . . . . 1034--1043
Joseph P. Kearney and
Robert L. Sedlmeyer and
William B. Thompson and
Michael A. Gray and
Michael A. Adler Software complexity measurement . . . . 1044--1050
Glen G. Langdon, Jr. Self-assessment procedure XVI: a
self-assessment procedure dealing with
computer organization and logic design 1051--1060
Dorothy Deringer and
David Brandin and
Dexter Fletcher and
Neil Jacobstein The report of the ACM Long-Range
Planning Committee: a summary . . . . . 1061--1071
Pierre N. Robillard Schematic pseudocode for program
constructs and its computer automation
by SCHEMACODE . . . . . . . . . . . . . 1072--1089
Frank G. Landram and
James R. Cook and
Marvin Johnston Spreadsheet calculations of
probabilities from the $F$, $t$,
$\chi^2$, and normal distribution . . . 1090--1092
Izak Benbasat and
Albert S. Dexter and
Peter Todd An experimental program investigating
color-enhanced and graphical information
presentation: an integration of the
findings . . . . . . . . . . . . . . . . 1094--1105
Rosalie Steier Authors . . . . . . . . . . . . . . . . 1127--1128
Paul Abrahams President's letter . . . . . . . . . . . 1129--1130
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 1151--1154
Jon Louis Bentley Programming Pearls: Birth of a Cruncher 1155--1161
P. J. Denning Editorial: Parallel Computing and Its
Evolution . . . . . . . . . . . . . . . 1163--1166
Karen A. Frenkel Introduction to the Special Issue on
Parallelism . . . . . . . . . . . . . . 1168--1169
W. Daniel Hillis and
Guy L. Steele, Jr. Data parallel algorithms . . . . . . . . 1170--1183
David A. Padua and
Michael J. Wolfe Advanced Compiler Optimization for
Supercomputers . . . . . . . . . . . . . 1184--1201
Randall Rettberg and
Robert Thomas Contention is no obstacle to
shared-memory multiprocessing . . . . . 1202--1212
Craig Stanfill and
David Waltz Toward memory-based reasoning . . . . . 1213--1228
Craig Stanfill and
Brewster Kahle Parallel Free Text Search on the
Connection Machine System . . . . . . . 1229--1239
Anonymous Technical correspondence . . . . . . . . 1240--1242
Daniel D. McCracken Viewpoint: Ruminations on Computer
Science Curricula . . . . . . . . . . . 3--5
John M. Carroll and
Jean McKendree Interface design issues for
advice-giving expert systems . . . . . . 14--32
Mark Stefik and
Gregg Foster and
Daniel G. Bobrow and
Kenneth Kahn and
Stan Lanning and
Lucy Suchman Beyond the chalkboard: computer support
for collaboration and problem solving in
meetings . . . . . . . . . . . . . . . . 32--47
Daniel R. Dolk and
Robert A. Kirsch, II A relational information resource
dictionary system . . . . . . . . . . . 48--61
James P. Held and
John V. Carlis MATCH: a new high-level relational
operator for pattern matching . . . . . 62--75
W. Daniel Hillis and
Guy L. Steele, Jr. Update to ``Data Parallel Algorithms'' 78--78
Alan Borning Computer system reliability and nuclear
war . . . . . . . . . . . . . . . . . . 112--131
David Notkin and
Norman Hutchinson and
Jan Sanislo and
Michael Schwartz Heterogeneous computing environments:
report on the ACM SIGOPS workshop on
accommodating heterogeneity . . . . . . 132--140
Paul J. Jalics COBOL on a PC: a new perspective on a
language and its performance . . . . . . 142--154
Christopher M. Holt and
Alan Stewart and
Maurice Clint and
Ronald H. Perrott An improved parallel thinning algorithm 156--160
Zen-Cheung Shih and
Gen-Huey Chen and
R. C. T. Lee Systolic algorithms to examine all pairs
of elements . . . . . . . . . . . . . . 161--167
John E. Hopcroft Computer Science: The Emergence of a
Discipline . . . . . . . . . . . . . . . 198--202
Robert E. Tarjan Algorithm Design . . . . . . . . . . . . 204--212
Karen A. Frenkel An interview with the 1986 A. M. Turing
Award recipients --- John E. Hopcroft
and Robert E. Tarjan . . . . . . . . . . 214--222
Michael Allen Bickel Automatic Correction to Misspelled
Names: a Fourth generation Approach . . 224--228
Nancy C. Goodwin Functionality and usability . . . . . . 229--233
John T. Stasko and
Jeffrey Scott Vitter Pairing Heaps: Experiments and Analysis 234--249
Farokh B. Bastani and
S. Sitharama Iyengar The effect of data structures on the
logical complexity of programs . . . . . 250--259
Jon L. Bentley and
David Gries Programming Pearls: Abstract data types 284--290
David Gifford and
Alfred Spector Case study: IBM's system/360--370
architecture . . . . . . . . . . . . . . 291--307
Phillip Ein-Dor and
Jacob Feldmesser Attributes of the Performance of Central
Processing Units: a Relative Performance
Prediction Model . . . . . . . . . . . . 308--317
Jorge L. C. Sanz and
Its'hak Dinstein and
Dragutin Petkovic Computing multi-colored polygonal masks
in pipeline architecture and its
application to automated visual
inspection . . . . . . . . . . . . . . . 318--329
Alfs Berztiss A mathematically focused curriculum for
computer science . . . . . . . . . . . . 356--365
Carolynn Van Dyke Taking ``Computer Literacy'' Literally 366--374
Taylor Booth and
Raymond E. Miller Computer Science Program Accreditation:
the first-year activities of the
computing sciences accreditation board 376--388
Thomas W. Malone and
Kenneth R. Grant and
Franklyn A. Turbak and
Stephen A. Brobst and
Michael D. Cohen Intelligent information-sharing systems 390--402
Jack J. Dongarra and
Eric Grosse Distribution of mathematical software
via electronic mail . . . . . . . . . . 403--407
S. A. Mamrak and
M. J. Kaelbling and
C. K. Nicholas and
M. Share A Software Architecture for Supporting
the Exchange of Electronic Manuscripts 408--414
Chris F. Kemerer An empirical validation of software cost
estimation models . . . . . . . . . . . 416--429
Richard Nance and
Robert Moose and
Robert Foutz A statistical technique for comparing
heuristics: an example from capacity
assignment strategies in computer
network design . . . . . . . . . . . . . 430--442
Jon Louis Bentley Programming Pearls: Self-Describing Data 479--483
Thomas W. Malone and
Joanne Yates and
Robert I. Benjamin Electronic markets and electronic
hierarchies . . . . . . . . . . . . . . 484--497
M. Lynne Markus and
Niels Bjòrn-Andersen Power over users: its exercise by system
professionals . . . . . . . . . . . . . 498--504
Itzhak Shemer Systems Analysis: a Systemic Analysis of
a Conceptual Model . . . . . . . . . . . 506--512
Jürgen Ebert A versatile data structure for
edge-oriented graph algorithms . . . . . 513--519
Ian H. Witten and
Radford M. Neal and
John G. Cleary Arithmetic coding for data compression 520--540
Vasant Dhar and
Harry E. Pople Rule-based versus structure-based models
for explaining and generating expert
behavior . . . . . . . . . . . . . . . . 542--555
Ananth Srinivasan and
Kate M. Kaiser Relationships between selected
organizational factors and systems
development . . . . . . . . . . . . . . 556--562
J. L. Bentley Programming Pearls: Profilers . . . . . 587--592
Peter J. Denning Announcing Literate Programming,
moderated by Christopher J. Van Wyk . . 593--593
Christopher J. Van Wyk and
David R. Hanson and
John Gilbert Literate Programming: Printing Common
Words . . . . . . . . . . . . . . . . . 594--599
Joseph D. Becker Arabic word processing . . . . . . . . . 600--610
José A. Mañas Word division in Spanish . . . . . . . . 612--616
Georgia Griffiths and
G. Carlyle Stones The tea-leaf reader algorithm: an
efficient implementation of CRC-16 and
CRC-32 . . . . . . . . . . . . . . . . . 617--620
Shu-Xiang Li and
Murray H. Loew The quadcode and its arithmetic . . . . 621--626
Shu-Xiang Li and
Murray H. Loew Adjacency Detection Using Quadcodes . . 627--631
Russell J. Abbott Knowledge abstraction . . . . . . . . . 664--671
C. A. R. Hoare and
I. J. Hayes and
He Jifeng and
C. C. Morgan and
A. W. Roscoe and
J. W. Sanders and
I. H. Sòrensen and
J. M. Spivey and
B. A. Sufrin Laws of programming . . . . . . . . . . 672--686
David Gries The 1985--1986 Taulbee survey . . . . . 688--694
Kjell W. Nielsen and
Ken Shumate Designing large real-time systems with
Ada . . . . . . . . . . . . . . . . . . 695--715
Lee W. Schruben and
V. James Cogliano An experimental procedure for simulation
response surface model identification 716--730
Shu Tezuka Walsh-spectral test for GFSR
pseudorandom numbers . . . . . . . . . . 731--735
Jon Louis Bentley and
R. W. Floyd Programming Pearls: a Sample of
Brilliance . . . . . . . . . . . . . . . 754--757
John D. Gould and
Stephen J. Boies and
Stephen Levy and
John T. Richards and
Jim Schoonard The 1984 Olympic Message System: a test
of behavioral principles of system
design . . . . . . . . . . . . . . . . . 758--769
C. A. R. Hoare and
I. J. Hayes and
Jifeng He and
C. C. Morgan and
A. W. Roscoe and
J. W. Sanders and
I. H. Sorensen and
J. M. Spivey and
B. A. Sufrin Corrigenda: ``Laws of programming'' . . 770--770
Chris F. Kemerer Corrigenda: ``An Empirical Validation of
Software Cost Estimation Models'' . . . 770--770
Jonathan P. Jacky and
Ira J. Kalet An object-oriented programming
discipline for standard Pascal . . . . . 772--776
Niv Ahituv and
Yeheskel Lapid and
Seev Neumann Processing encrypted data . . . . . . . 777--780
Niv Ahituv A metamodel of information flow: a tool
to support information systems theory 781--791
B. Ya. Ryabko and
R. Nigel Horspool and
Gordon V. Cormack Comments to: ``A locally adaptive data
compression scheme'' [Comm. ACM \bf 29,
1986, 4, 320--330, MR 87e:68020] by J.
L. Bentley, D. D. Sleator, R. E. Tarjan
and V. K. Wei . . . . . . . . . . . . . 792--794
Peter J. Denning Paradigms crossed . . . . . . . . . . . 808--809
Diane Crawford Public policy issues ripen with age . . 810--813
Karen A. Frenkel Profiles in Computing --- Introduction 815--828
Karen A. Frenkel Profiles in computing: Donald E. Knuth:
scholar with a passion for the
particular . . . . . . . . . . . . . . . 816--819
Karen A. Frenkel Profiles in computing: Brian K. Reid: a
graphics tale of a hacker tracker . . . 820--823
Karen A. Frenkel Profiles in computing: Allan L. Scherr
--- Big Blue's Time-Sharing Pioneer . . 824--828
Mina Rees The computing program of the Office of
Naval Research, 1946--1953 . . . . . . . 830--848
Linda Feczko ACM --- Making Computing History for 40
Years --- Introduction . . . . . . . . . 849--849
Franz L. Alt Fifteen years ACM . . . . . . . . . . . 850--857
Lee Revens The first 25 years: ACM 1947--1962 . . . 860--865
Anita Cochran ACM: the past 15 years: 1972--1987 . . . 866--872
Eric A. Weiss Commentaries on the past 15 years . . . 880--883
Eric A. Weiss Self-assessment procedure XVII . . . . . 886--891
Richard H. Lathrop and
Teresa A. Webster and
Temple F. Smith ARIADNE: pattern-directed inference and
hierarchical abstraction in protein
structure recognition . . . . . . . . . 909--921
Ulises Agüero and
Subrata Sasgupta A plausibility-driven approach to
computer architecture design . . . . . . 922--932
James H. Coombs and
Allen H. Renear and
Steven J. DeRose Markup systems and the future of
scholarly text processing . . . . . . . 933--947
Kemal Efe A proposed solution to the problem of
levels in error-message generation . . . 948--955
Robert G. Reynolds The partial metrics system: modeling the
stepwise refinement process using
partial metrics . . . . . . . . . . . . 956--963
G. W. Furnas and
T. K. Landauer and
L. M. Gomez and
S. T. Dumais The vocabulary problem in human-system
communication . . . . . . . . . . . . . 964--971
William J. Doll and
Golamreza Torkzadeh The relationship of MIS steering
committees to size of firm and
formalization of MIS planning . . . . . 972--978
Jon Louis Bentley Programming Pearls: The Furbelow
Memorandum . . . . . . . . . . . . . . . 998--999, 1010
Christopher J. Van Wyk and
Michael Jackson and
David W. Wall Literate Programming: Processing
Transactions . . . . . . . . . . . . . . 1000--1010
John McCarthy Generality in artificial intelligence 1030--1035
Jeff Shrager and
Daniel S. Jordan and
Thomas P. Moran and
Gregor Kiczales and
Daniel M. Russell Issues in the pragmatics of qualitative
modeling: lessons learned from a
xerographics project . . . . . . . . . . 1036--1047
Channing H. Russell and
Pamela J. Waterman Variations on UNIX for
parallel-processing computers . . . . . 1048--1055
Mark L. Gillenson The duality of database structures and
design techniques . . . . . . . . . . . 1056--1065
Haim Mendelson Economies of scale in computing:
Grosch's law revisited . . . . . . . . . 1066--1072
Kjell W. Nielsen and
Ken Shumate Corrigenda: ``Designing large real-time
systems with Ada'' . . . . . . . . . . . 1073--1073
J. H. Hester and
D. H. Hirschberg Self-organizing search lists using
probabilistic back-pointers . . . . . . 1074--1079
G. A. Ringwood Parlog86 and the dining logicians . . . 10--25
Jacques Cohen A view of the origins and development of
Prolog . . . . . . . . . . . . . . . . . 26--36
Robert A. Kowalski The early years of logic programming . . 38--43
J. Kay and
P. Lauder A Fair Share Scheduler . . . . . . . . . 44--55
Jack W. Stott and
Jeffrey E. Kottemann Anatomy of a compact user interface
development tool . . . . . . . . . . . . 56--66
Ron Weber Computer technology and jobs: an impact
assessment model . . . . . . . . . . . . 68--77
Yehuda Kahane and
Seev Neumann and
Charles S. Tapiero Computer backup pools, disaster
recovery, and default risk . . . . . . . 78--83
Karen A. Frenkel The Art and Science of Visualizing Data 110--121
Donald P. Greenberg Coons Award Lecture . . . . . . . . . . 122--129
Paul S. Heckbert Ray Tracing Jell-O Brand Gelatin . . . . 130--134
Clifford A. Pickover Pattern Formation and Chaos in Networks 136--151
Stephen I. Gallant Connectionist Expert Systems . . . . . . 152--169
Jerome A. Feldman and
Mark A. Fanty and
Nigel H. Goddard and
Kenton J. Lynne Computing with Structured Connectionist
Networks . . . . . . . . . . . . . . . . 170--187
Brian A. Nejmeh NPATH: a Measure of Execution Path
Complexity and its Applications . . . . 188--200
Gerard Salton and
Chris Buckley Parallel Text Search Methods . . . . . . 202--215
Voratas Kachitvichyanukul and
Bruce W. Schmeiser Binomial Random Variate Generation . . . 216--222
Abraham Peled John Cocke: The 1987 ACM A. M. Turing
Award recipient . . . . . . . . . . . . 249--249
John Cocke The search for performance in scientific
processors: the Turing Award Lecture . . 250--253
Alan Shaw Special section on operating systems . . 255--257
David Notkin and
Andrew P. Black and
Edward D. Lazowska and
Henry M. Levy and
Jan Sanislo and
John Zahorjan Interconnecting heterogeneous computer
systems . . . . . . . . . . . . . . . . 258--273
Stuart R. Faulk and
David L. Parnas On Synchronization in Hard-Real-Time
Systems . . . . . . . . . . . . . . . . 274--287
David K. Gifford and
Roger M. Needham and
Michael D. Schroeder The Cedar File System . . . . . . . . . 288--298
Barbara Liskov Distributed programming in Argus . . . . 300--312
David Cheriton The V distributed system . . . . . . . . 314--333
John C. Munson Self-assessment procedure XVIII:
fundamentals of data communications . . 334--341
Jan L. Guynes Impact of system response time on state
anxiety . . . . . . . . . . . . . . . . 342--347
Bing-Chao Huang and
Michael A. Langston Practical In-Place Merging . . . . . . . 348--352
Robert E. Filman Reasoning with worlds and truth
maintenance in a knowledge-based
programming environment . . . . . . . . 382--401
Christopher Cherniak Undebuggability and cognitive science 402--412
Michael R. Blaha and
William J. Premerlani and
James E. Rumbaugh Relational database design using an
object-oriented methodology . . . . . . 414--427
Marilyn M. Mantei and
Toby J. Teorey Cost/benefit analysis for incorporating
human factors in the software lifecycle 428--439
Bennett L. Fox and
Peter W. Glynn Computing Poisson probabilities . . . . 440--445
Per-Åke Larson Dynamic Hash Tables . . . . . . . . . . 446--457
Clifford Stoll Stalking the wily hacker . . . . . . . . 484--497
Roger Clarke Information technology and dataveillance 498--512
David Harel On Visual Formalisms . . . . . . . . . . 514--530
John L. Gustafson Reevaluating Amdahl's law . . . . . . . 532--533
James M. Cupello and
David J. Mishelevich Managing prototype knowledge/expert
system projects . . . . . . . . . . . . 534--541
Sid L. Huff and
Malcolm C. Munro and
Barbara H. Martin Growth stages of end user computing . . 542--550
Suzanne Rivard and
Sid L. Huff Factors of success for end-user
computing . . . . . . . . . . . . . . . 552--561
Narayan S. Umanath and
Richard W. Schmell An experimental evaluation of the impact
of data display format on recall
performance . . . . . . . . . . . . . . 562--570
Andrew W. Appel and
Guy J. Jacobson The world's fastest Scrabble program . . 572--578
Thomas E. Gerasch An insertion algorithm for a minimal
internal path length binary search tree 579--585
Michael J. Ginzberg and
Jack J. Baroudi MIS Careers --- a Theoretical
Perspective . . . . . . . . . . . . . . 586--594
Paul Abrahams The Strategic Defense Initiative ---
President's Letter . . . . . . . . . . . 628--629
B. W. Mel and
S. M. Omohundro and
A. D. Robison and
S. S. Skiena and
K. H. Thearling Tablet: personal computer of the year
2000 . . . . . . . . . . . . . . . . . . 638--648
Michael J. Callahan and
David Hoffman and
James T. Hoffman Computer Graphics Tools for the Study of
Minimal Surfaces . . . . . . . . . . . . 648--661
Richard G. Hamlet Introduction to special section on
software testing . . . . . . . . . . . . 662--667
E. J. Weyuker The evaluation of program-based software
test data adequacy criteria . . . . . . 668--675
T. J. Ostrand and
M. J. Balcer The Category-Partition Method for
Specifying and Generating Functional
Tests . . . . . . . . . . . . . . . . . 676--686
D. Gelperin and
B. Hetzel The Growth of Software Testing . . . . . 687--695
S. B. Guthery Self-timing programs and the quantum
scheduler . . . . . . . . . . . . . . . 696--702
D. R. Dolk Model management and structured
modeling: the role of an information
resource dictionary system . . . . . . . 704--718
K. Appleby and
M. Carllson and
S. Haridi and
D. Sawhlin Garbage collection for Prolog based on
WAM . . . . . . . . . . . . . . . . . . 719--741
Pierre L'Ecuyer Efficient and portable combined random
number generators . . . . . . . . . . . 742--749, 774
Sukhamay Kundu The Equivalence of the Subregion
Representation and the Wall
Representation for a Certain Class of
Rectangular Dissections . . . . . . . . 752--763
S. L. Jarvenpaa and
G. W. Dickson Graphics and managerial decision making:
research-based guidelines . . . . . . . 764--774
Peter J. Denning Edmund C. Berkeley --- ACM founder . . . 781--782
John B. Smith and
Stephen F. Weiss Hypertext: Introduction to the Special
Issue . . . . . . . . . . . . . . . . . 816--819
Robert M. Akscyn and
Donald L. McCracken and
Elise A. Yoder KMS: a Distributed Hypermedia System for
Managing Knowledge in Organizations . . 820--835
Frank G. Halasz Reflections on NoteCards: seven issues
for the next generation of hypermedia
systems . . . . . . . . . . . . . . . . 836--855
Brad Campbell and
Joseph M. Goodman HAM: a General Purpose Hypertext
Abstract Machine . . . . . . . . . . . . 856--861
Pankaj K. Garg Abstraction mechanisms in hypertext . . 862--870
Darrell R. Raymond and
Frank Wm. Tompa Hypertext and the Oxford English
Dictionary . . . . . . . . . . . . . . . 871--879
Mark E. Frisse Searching for information in a hypertext
medical handbook . . . . . . . . . . . . 880--886
Andries van Dam Hypertext '87: Keynote Address . . . . . 887--895
Jason L. Frand and
Ephraim R. McLean and
Julia A. Britt Fourth annual UCLA survey of business
school computer usage . . . . . . . . . 896--910
James L. Poirot and
Harriet G. Taylor and
Cathleen A. Norris Retraining teachers to teach high school
computer science . . . . . . . . . . . . 912--917
Edward A. Fox ACM Press Database and Electronic
Products --- New Services for the
Information Age . . . . . . . . . . . . 948--951
J. D. Wilson and
E. S. Adams and
H. P. Baouendi and
W. A. Marion and
G. J. Yaverbaum Computer science education in the
People's Republic of China in the late
1980s . . . . . . . . . . . . . . . . . 956--964
S. F. Lam An empirical study of computer capacity
planning in Japan . . . . . . . . . . . 965--976
N. P. Archer and
M. W. L. Chan and
S. J. Huang and
R. T. Liu A Chinese-English microcomputer system 977--982
D. Gries and
D. Marsh The 1986--1987 Taulbee survey . . . . . 984--991
Monty Newborn and
Danny Kopec Results of ACM's Eighteenth Computer
Chess Championship . . . . . . . . . . . 992--995
Douglas W. Jones Application of Splay Trees to Data
Compression . . . . . . . . . . . . . . 996--1007
D. V. Sarwate Computation of cyclic redundancy checks
via table look-up . . . . . . . . . . . 1008--1013
L. Press Benchmarks for LAN performance
evaluation . . . . . . . . . . . . . . . 1014--1017
James H. Fetzer Program verification: the very idea . . 1048--1063
John M. Carroll and
Amy P. Aaronson Learning by doing with simulated
intelligent help . . . . . . . . . . . . 1064--1079
Wilfred J. Hansen and
Christina Haas Reading and Writing with Computers: a
Framework for Explaining Differences in
Performance . . . . . . . . . . . . . . 1080--1089
Surya B. Yadav and
Ralph R. Bravoco and
Akemi T. Chatfield and
T. M. Rajkumar Comparison of analysis techniques for
information requirement determination 1090--1097
Alan M. Davis A Comparison of Techniques for the
Specification of External System
Behavior . . . . . . . . . . . . . . . . 1098--1115
Alok Aggarwal and
Jeffrey Scott Vitter The Input/Output Complexity of Sorting
and Related Problems . . . . . . . . . . 1116--1127
Robert Courts Improving locality of reference in a
garbage-collecting memory management
system . . . . . . . . . . . . . . . . . 1128--1138
David W. Hamaker and
Ian H. Witten and
Radford M. Neal and
John G. Cleary Compress and Compact Discussed Further
(letters) . . . . . . . . . . . . . . . 1139, 1140, 1145
K. A. Frenkel Computers and elections . . . . . . . . 1176--1183
R. G. Saltman Accuracy, integrity and security in
computerized vote-tallying . . . . . . . 1184--1191
Stephen K. Park and
Keith W. Miller Random Number Generators: Good Ones are
Hard to Find . . . . . . . . . . . . . . 1192--1201
J. E. Smith Characterizing computer performance with
a single number . . . . . . . . . . . . 1202--1206
M. Gordon Probabilistic and genetic algorithms in
document retrieval . . . . . . . . . . . 1208--1218
R. Brown Calendar Queues: a Fast ${O}(1)$
Priority Queue Implementation for the
Simulation Event Set Problem . . . . . . 1220--1227
D. Rubinstein and
J. Shallit and
M. Szegedy A subset coloring algorithm and its
applications to computer graphics . . . 1228--1232
Ben Shneiderman and
John M. Carroll Ecological Studies of Professional
Programmers: An Overview . . . . . . . . 1256--1258
Elliot Soloway and
Robin Lampert and
Stan Letovsky and
David Littman and
Jeannine Pinto Designing documentation to compensate
for delocalized plans . . . . . . . . . 1259--1267
Bill Curtis and
Herb Krasner and
Neil Iscoe A field study of the software design
process for large systems . . . . . . . 1268--1287
Mary Beth Rosson and
Wendy Kellogg and
Susanne Maass The designer as user: building
requirements for design tools from
design practice . . . . . . . . . . . . 1288--1298
Udi Manber Using induction to design algorithms . . 1300--1313
Paul C. K. Kwok A thinning algorithm by contour
generation . . . . . . . . . . . . . . . 1314--1324
Clifford A. Pickover A Note on Chaos and Halley's Method . . 1326--1329
Joachim H. Ahrens and
Ulrich Dieter Efficient table-free sampling methods
for the exponential, Cauchy, and normal
distributions . . . . . . . . . . . . . 1330--1337
Alon Itai and
Yoav Raz The Number of Buffers Required for
Sequential Processing of a Disk File . . 1338--1342
James R. Driscoll and
Harold N. Gabow and
Ruth Shrairman and
Robert E. Tarjan Relaxed Heaps: An Alternative to
Fibonacci Heaps with Applications to
Parallel Computation . . . . . . . . . . 1343--1354
Christopher J. Van Wyk and
Eric Hamilton and
Don Colner Literate Programming: Expanding
Generalized Regular Expressions . . . . 1376--1385
Richard C. Holt and
James R. Cordy The Turing programming language . . . . 1410--1423
Tore Risch and
René Reboh and
Peter E. Hart and
Richard O. Duda A functional approach to integrating
database and expert systems . . . . . . 1424--1437
Starr Roxanne Hiltz Productivity Enhancement from
Computer-Mediated Communication: a
Systems Contingency Approach . . . . . . 1438--1454
Feng-Yang Kuo and
Jahangir Karimi User interface design from a real time
perspective . . . . . . . . . . . . . . 1456--1466
Niv Ahituv and
Magid Igbaria A model for predicting and evaluating
computer resource consumption . . . . . 1467--1473
Gautam Mitra and
Mehrdad Tamiz and
Joseph Yadegar Experimental Investigation of an
Interior Search Method within a Simplex
Framework . . . . . . . . . . . . . . . 1474--1482
Michael Lebowitz The use of memory in text processing . . 1483--1502
S. L. Jarvenpaa The Importance of Laboratory
Experimentation in IS Research . . . . . 1502--1504
John R. Weitzel and
Larry Kerschberg Developing Knowledge-Based Systems:
Reorganizing the System Development Life
Cycle . . . . . . . . . . . . . . . . . 482--488
Bryan Kocher A Hygiene Lesson . . . . . . . . . . . . 3
Peter J. Denning and
D. E. Comer and
David Gries and
Michael C. Mulder and
Allen Tucker and
A. Joe Turner and
Paul R. Young Computing as a discipline . . . . . . . 9--23
Karen A. Frenkel The computer bowl . . . . . . . . . . . 24--31
Leslie Lamport A Simple Approach to Specifying
Concurrent Systems . . . . . . . . . . . 32--45
Claude Banville and
Maurice Landry Can the field of MIS be disciplined? . . 48--60
Jason L. Frand and
Julia A. Britt Fifth annual UCLA survey of business
school computer usage . . . . . . . . . 62--76
David M. Abrahamson An Adaptive Dependency Source Model for
Data Compression . . . . . . . . . . . . 77--83
Boaz Ronen and
Michael A. Palley and
Henry C. Lucas, Jr. Spreadsheet analysis and design . . . . 84--93
David M. DeJean and
George W. Zobrist A definition optimization technique used
in a code translation algorithm . . . . 94--105
Neal R. Wagner and
Paul Putter Error detecting decimal digits . . . . . 106--110
Boris D. Lubachevsky Efficient Distributed Event-Driven
Simulations of Multiple-Loop Networks 111--123, 131
R. W. Hall Fast Parallel Thinning Algorithms:
Parallel Speed and Connectivity
Preservation . . . . . . . . . . . . . . 124--131
Douglas W. Jones Concurrent Operations on Priority Queues 132--137
E. Robert Yoche Legal Protection for Computer Software 169--171
L. Earnest Can computers cope with human races? . . 173--182
S. L. Young and
A. G. Hauptmann and
W. H. Ward and
E. T. Smith and
P. Werner High level knowledge sources in usable
speech recognition systems . . . . . . . 183--194
Y. Bengio and
R. Cardin and
R. De Mori and
E. Merlo Programmable execution of multi-layered
networks for automatic speech
recognition . . . . . . . . . . . . . . 195--199
Walter Hollingsworth and
Howard Sachs and
Alan Jay Smith The Clipper Processor: Instruction Set
Architecture and Implementation . . . . 200--219
Robert E. Kraut and
Susan T. Dumais and
Susan Koch Computerization, productivity, and
quality of work-life . . . . . . . . . . 220--238
John Tillquist and
Feng-Yang Kuo An approach to the recursive retrieval
problem in the relational database . . . 239--245
P. J. Jalics and
D. R. McIntyre Caching and other disk access avoidance
techniques on personal computers . . . . 246--255
Rosalie Steier News track . . . . . . . . . . . . . . . 285--286
Robert L. Ashenhurst ACM forum . . . . . . . . . . . . . . . 287--ff.
Bryan Kocher President's letter . . . . . . . . . . . 292--293
David Gries and
Terry M. Walker and
Paul Young The 1988 Snowbird Report: a Discipline
Matures . . . . . . . . . . . . . . . . 294--297
Virginia E. Barker and
Dennis E. O'Connor and
Judith Bachant and
Elliot Soloway Expert systems for configuration at
Digital: XCON and beyond . . . . . . . . 298--318
Donald P. Ballou and
Giri Kumar.Tayi Methodology for allocating resources for
data quality enhancement . . . . . . . . 320--329
Bo Sanden An Entity-Life Modeling Approach to the
Design of Concurrent Software . . . . . 330--343
Xue Dong Luo A practical sieve algorithm for finding
prime numbers . . . . . . . . . . . . . 344--346
Virginia R. Gibson and
James A. Senn System structure and software
maintenance performance . . . . . . . . 347--358
Zicheng Guo and
Richard W. Hall Parallel Thinning with Two-Subiteration
Algorithms . . . . . . . . . . . . . . . 359--373
James C. Pleasant and
Lawrence Paulson and
Avra Cohen and
Michael Gordon Bevier and
Michael K. Smith and
William D. Young and
Thomas R. Clune and
Stephen Savitzky and
James H. Fetzer Correspondence on Fetzer, Program
Verification: The Very Idea . . . . . . 374--381
John Dobson and
Brian Randell Program Verification: Public Image And
Private Reality . . . . . . . . . . . . 420--422
Karen A. Frenkel Volume rendering . . . . . . . . . . . . 426--435
Peter J. Denning and
Karen A. Frenkel A conversation with Steve Jobs . . . . . 436--443
Nicholas Carriero and
David Gelernter Linda in context . . . . . . . . . . . . 444--458
L. Bailyn Toward the perfect workplace? . . . . . 460--471
R. Wenig Bickel Self-assessment procedure XIX . . . . . 472--480
John R. Weitzel and
Larry Kerschberg Developing knowledge-based systems:
reorganizing the system development life
cycle . . . . . . . . . . . . . . . . . 482--488
E. R. Fiala and
D. H. Greene Data compression with finite windows . . 490--505
Harald M. Müller and
Christopher M. Holt and
Aaron Watters and
James H. Fetzer More on the Very Idea (letters) . . . . 506--512
E. Robert Yoche and
Arthur J. Levine Basic Principles of Copyright Protection
for Computer Software . . . . . . . . . 544--545
Harold Abelson and
Michael Eisenberg and
Matthew Halfant and
Jacob Katzenelson and
Elisha Sacks and
Gerald J. Sussman and
Jack Wisdom and
Kenneth Yip Intelligence in Scientific Computing . . 546--562
P. Samuelson Why the look and feel of software user
interfaces should not be protected by
copyright law . . . . . . . . . . . . . 563--572
John Yen GERTIS: a Dempster-Shafer Approach to
Diagnosing Hierarchical Hypotheses . . . 573--585
Y. M. Kang Computer hardware performance:
production and cost function analyses 586--593
N. E. Gibbs The SEI education program: the challenge
of teaching future software engineers 594--605
Sidney C. Bailin An Object-Oriented Requirements
Specifications Method . . . . . . . . . 608--623
Pamela Samuelson Can Hackers Be Sued for Damages Caused
by Computer Viruses? . . . . . . . . . . 666--669
Michael Gemignani Viruses and Criminal Law . . . . . . . . 669--671
Anonymous The Worm Story . . . . . . . . . . . . . 677--677
Eugene H. Spafford The Internet Worm: Crisis and Aftermath 678--687
Jon A. Rochlis and
Mark W. Eichin With microscope and tweezers: the worm
from MIT's perspective . . . . . . . . . 689--698
Donn Seeley Password cracking: a game of wits . . . 700--703
T. Eisenberg and
D. Gries and
J. Hartmanis and
D. Holcomb and
M. Stuart Lynn and
T. Santoro The Cornell commission: on Morris and
the worm . . . . . . . . . . . . . . . . 706--709
Karen A. Frenkel An interview with Ivan Sutherland . . . 712--718
I. E. Sutherland Micropipelines . . . . . . . . . . . . . 720--738
Christopher J. Van Wyk and
Donald C. Lindsay Literate Programming: a File Difference
Program . . . . . . . . . . . . . . . . 740--754
Harold Thimbleby A Review of Donald C. Lindsay's Text
File Difference Utility, \em diff . . . 754--755
Zicheng Guo and
Richard W. Hall Corrigenda: ``Parallel Thinning with
Two-Sub-Iteration Algorithms'' . . . . . 759--759
Richard W. Hall Corrigenda: ``Fast Parallel Thinning
Algorithms: Parallel Speed and
Connectivity Preservation'' . . . . . . 759--760
Larry Press Thoughts and Observations at the
Microsoft CD-ROM Conference . . . . . . 784--788
Edward A. Fox The coming revolution in interactive
digital video . . . . . . . . . . . . . 794--801
Wendy E. Mackay and
Glorianna Davenport Virtual video editing in interactive
multimedia applications . . . . . . . . 802--810
G. David Ripley DVI --- a Digital Multimedia Technology 811--822
Douglas F. Dixon Life Before the Chips: Simulating
Digital Video Interactive Technology . . 824--831
Scott M. Stevens Intelligent interactive video simulation
of a code inspection . . . . . . . . . . 832--843
Michael Tinker DVI parallel image compression . . . . . 844--851
Andrew Lippman and
William Butera Coding image sequences for interactive
retrieval . . . . . . . . . . . . . . . 852--860
Clement Yu and
Wei Sun and
Dina Bitton and
Qi Yang and
Richard Bruno and
John Tullis Efficient placement of audio data on
optical disks for real-time applications 862--871
Karen A. Frenkel The next generation of interactive
technologies . . . . . . . . . . . . . . 872--881
J. Michael Jakes and
E. Robert Yoche Basic Principles of Patent Protection
for Computer Software . . . . . . . . . 922--924
Douglas Schuler and
Jonathan Jacky Introduction --- computing and social
responsibilities . . . . . . . . . . . . 925--927
Donald H. Berman and
Carole D. Hafner The potential of artificial intelligence
to help solve the crisis in our legal
system . . . . . . . . . . . . . . . . . 928--938
Jack Beusmans and
Karen Wieckert Computing, research, and war: if
knowledge is power, where is
responsibility? . . . . . . . . . . . . 939--951
Richard E. Ladner Computer accessibility for federal
workers with disabilities: it's the law 952--956
Jack Minker Scientific Freedom and Human Rights of
Computer Professionals --- 1989 . . . . 957--974
Toby J. Teorey and
Guangping Wei and
Deborah L. Bolton and
John A. Koenig ER model clustering as an aid for user
communication and documentation in
database design . . . . . . . . . . . . 975--987
Steve Rozen and
Dennis Shasha Using a relational system on Wall
Street: the good, the bad, the ugly, and
the ideal . . . . . . . . . . . . . . . 988--994
Pai-Chun Ma and
Frederic H. Murphy and
Edward A. Stohr A Graphics Interface for Linear
Programming . . . . . . . . . . . . . . 996--1012
Fatin Sezgin On efficient and portable combined
random number generators . . . . . . . . 1019--1020
Rick L. Edgeman and
Paul W. Abrahams and
Francis M. Sand and
James Crawford, Jr. Random Number Generators and the Minimal
Standard . . . . . . . . . . . . . . . . 1020--1024
Christopher J. Van Wyk and
Norman Ramsey Literate Programming: Waving a
Language-Independent WEB . . . . . . . . 1051--1055
John Sculley The Relationship Between Business and
Higher Education: a Perspective on the
21st Century . . . . . . . . . . . . . . 1056--1061
John D. McGregor and
Arthur M. Riehl Support for Multiprocessing
(Introduction to the Special Section) 1062--1064
Anthony E. Terrano and
Stanley M. Dunn and
Joseph E. Peters Using an architectural knowledge base to
generate code for parallel computers . . 1065--1072
Carolyn McCreary and
Helen Gill Automatic determination of grain size
for efficient parallel processing . . . 1073--1078
Wan-Hong S. Cheng and
Virgil E. Wallentine DEBL: a Knowledge-Based Language for
Specifying and Debugging Distributed
Programs . . . . . . . . . . . . . . . . 1079--1084
Charles J. Fleckenstein and
David Hemmendinger Using a global name space for parallel
execution of UNIX tools . . . . . . . . 1085--1090
C. Gordon Bell The future of high performance computers
in science and engineering . . . . . . . 1091--1101
Ronald J. Norman and
Jay F. Nunamaker, Jr. CASE productivity perceptions of
software engineering professionals . . . 1102--1108
Rui Feng Zhu and
Tadao Takaoka A Technique for Two-Dimensional Pattern
Matching . . . . . . . . . . . . . . . . 1110--1120
Jonathan Grudin The case against user interface
consistency . . . . . . . . . . . . . . 1164--1173
Glenn D. Blank A Finite and Real-Time Processor for
Natural Language . . . . . . . . . . . . 1174--1189
H. Albert Napier and
Richard R. Batsell and
Norman S. Guadango and
David M. Lane Impact of a restricted natural language
interface on ease of learning and
productivity . . . . . . . . . . . . . . 1190--1198
Rudy Hirschheim and
Heinz K. Klein Four paradigms of information systems
development . . . . . . . . . . . . . . 1199--1216
David Gries and
Dorothy Marsh The 1987 --- 1988 Taulbee survey . . . . 1217--1224
Monty Newborn and
Danny Kopec Results of the nineteenth ACM North
American computer chess championship . . 1225--1230
Carol B. MacKnight and
Santosh Balagopalan An evaluation tool for measuring
authoring system performance . . . . . . 1231--1236
M. V. Ramakrishna Practical performance of Bloom filters
and parallel free-text searching . . . . 1237--1239
Larry Press The Toshiba T1000, IBM's Academic
Computing Conference and SPARC PCs . . . 1292--1298
Karen A. Frenkel HDTV and the computer industry . . . . . 1300--1312
William W. Cotterman and
Kuldeep Kumar User cube: a taxonomy of end users . . . 1313--1320
Gerald E. Evans and
Mark G. Simkin What best predicts computer proficiency? 1322--1327
Detmar W. Straub, Jr. and
James C. Wetherbe Information Technologies for the 1990's:
An Organizational Impact Perspective . . 1328--1339
Victor M. Matos and
Paul J. Jalics An Experimental Analysis of the
Performance of Fourth Generation Tools
on PCs . . . . . . . . . . . . . . . . . 1340--1351
Eliezer Kantorowitz and
Oded Sudarsky The adaptable user interface . . . . . . 1352--1358
Jayaram K. Udupa and
Gabor T. Herman Volume Rendering Versus Surface
Rendering . . . . . . . . . . . . . . . 1364--1367
John McCarthy Networks Considered Harmful for
Electronic Mail . . . . . . . . . . . . 1389--1390
Saul Lefkowitz and
E. Robert Yoche The Role of Trademarks in the Protection
of Computer Software . . . . . . . . . . 1391--1393, 1396
Peter J. Denning A debate on teaching computing science 1397--1397
Edsger W. Dijkstra On the Cruelty of Really Teaching
Computer Science . . . . . . . . . . . . 1398--1404
David L. Parnas and
W. L. Scherlis and
M. H. van Emden and
Jacques Cohen and
R. W. Hamming and
Richard M. Karp and
Terry Winograd Colleagues Respond to Dijkstra's
Comments . . . . . . . . . . . . . . . . 1405--1413
Edsger W. Dijkstra Dijkstra's Reply To Comments . . . . . . 1414--1414
Thomas J. McCabe and
Charles W. Butler Design complexity measurement and
testing . . . . . . . . . . . . . . . . 1415--1425
Tarek K. Abdel-Hamid and
Stuart E. Madnick Lessons learned from modeling the
dynamics of software development . . . . 1426--1438
Samson W. Tu and
Michael G. Kahn and
Mark A. Musen and
Lawrence M. Fagan and
Jay C. Ferguson Episodic Skeletal-Plan Refinement Based
on Temporal Data . . . . . . . . . . . . 1439--1455
Eugene Levin Grand challenges to computation science 1456--1457
Bo Sanden Entity-life modeling and structured
analysis in real-time software design
--- a comparison . . . . . . . . . . . . 1458--1466
James J. Purtilo and
John R. Callahan Parse tree annotations . . . . . . . . . 1467--1477
Libes Choosing a Name for Your Computer . . . 1289--1291
Danielle R. Bernstein and
Joshua Stern and
William Ehrich and
Michael R. Dunlavey and
Leonard Zettel and
Bruce B. Herbert and
Mark Nelson and
W. F. Smyth and
Bruce W. Walker and
Robert M. Gordon and
Stephen N. Cole and
David B. Lightstone ACM Forum: Debatable . . . . . . . . . . 264--271
Martin Wielgus and
Marvin L. Watkins and
Edward Sacharuk and
Srinivasarao Damerla ACM Forum: More Debatable . . . . . . . 396--397
Daniel M. Sunday A Very Fast Substring Search Algorithm 132--142
Ricardo Baeza-Yates and
Gaston H. Gonnet A new approach to text searching . . . . 74--82
Sun Wu and
Udi Manber Fast text searching allowing errors . . 83--91
R. J. Brown Chromatic scheduling and the chromatic
number problem . . . . . . . . . . . . . 451--463
Jayadev Misra Remark on ``Algorithm 246: Graycode
[Z]'' . . . . . . . . . . . . . . . . . 285--285
Mohamed el Lozy Remark on ``Algorithm 299: Chi-Squared
Integral [S15]'' . . . . . . . . . . . . 393--395
Donald E. Knuth and
J. H. Morris and
V. R. Pratt Fast pattern matching in strings . . . . 323--350
Paolo Sipala Remark on ``Algorithm 408: A Sparse
Matrix Package (Part I) [F4]'' . . . . . 303--303
Fred G. Gustavson Remark on ``Algorithm 408: A Sparse
Matrix Package (Part I) [F4]'' . . . . . 295--295
Mohamed el Lozy Remark on ``Algorithm 395: Student's
$t$-Distribution'' and Remark on
``Algorithm 396: Student's Quantiles
[S14]'' . . . . . . . . . . . . . . . . 238--239
U. Harms and
H. Kollakowski and
G. Möller Remark on ``Algorithm 408: A Sparse
Matrix Package (Part 1) [F4]'' . . . . . 456--457
G. W. Hill Remark on ``Algorithm 395: Student's
$t$-Distribution'' . . . . . . . . . . . 247--249
G. W. Hill Remark on ``Algorithm 396: Student's
$t$-Quantiles'' . . . . . . . . . . . . 250--251
A. L. Tharp and
K.-C. Tai The practicality of text signatures for
accelerating string searching . . . . . 35--44
Allen E. Tracht Remark on ``Algorithm 334: Normal Random
Deviates'' . . . . . . . . . . . . . . . 89--89
M. C. Er Remark on ``Algorithm 246: Graycode
[Z]'' . . . . . . . . . . . . . . . . . 441--443
I. D. Hill and
M. C. Pike Remark on ``Algorithm 299: Chi-Squared
Integral'' . . . . . . . . . . . . . . . 185--185
Milan Novotny Remark on ``Algorithm 30: Numerical
Solution of the Polynomial Equation'' 183--184