Last update:
Thu Apr 24 11:38:52 MDT 2025
J. R. Herndon ACM Algorithm 49: Spherical Neumann
Function . . . . . . . . . . . . . . . . 179
J. N. Merner ACM Algorithm 149: Complete Elliptic
Integral . . . . . . . . . . . . . . . . 605
T. D. Arthurs ACM Algorithm 176: Least Squares Surface
Fit . . . . . . . . . . . . . . . . . . 313
O. G. Ludwig ACM Algorithm 179: Incomplete Beta Ratio 314
A. P. Relph ACM Algorithm 191: Hypergeometric . . . 388--389
D. H. Thurnau ACM Algorithm 195: BANDSOLVE . . . . . . 441
R. H. Kase ACM Algorithm 219: Topological Ordering
for Pert Networks . . . . . . . . . . . 738--739
W. Gautschi ACM Algorithm 222: Incomplete Beta
Function Ratios . . . . . . . . . . . . 143--144
W. Gautschi ACM Algorithm 236: Bessel Functions of
the First Kind [S17] . . . . . . . . . . 479--480
J. Boothroyd ACM Algorithm 246: Graycode . . . . . . 701
R. W. Floyd ACM Algorithm 245: Treesort 3 . . . . . 701
W. Gautschi ACM Algorithm 259: Legendre Functions
for Arguments Larger than One . . . . . 488--492
M. C. Pike and
I. D. Hill ACM Algorithm 266: Pseudo-Random Numbers 605--606
Walter Gautschi Algorithm 282: Derivatives of $e^x/x$,
$\cos(x)/x$, and $\sin(x)/x$ . . . . . . 272--272
W. Fletcher ACM Algorithm 284: Interchange of Two
Blocks of Data . . . . . . . . . . . . . 326
I. D. Hill and
M. C. Pike ACM Algorithm 299: Chi-Squared Integral 243--244
J. H. Gunn ACM Algorithm 300: Coulomb Wave
Functions . . . . . . . . . . . . . . . 244--245
K. M. Brown ACM Algorithm 316: Solution of
Simultaneous Nonlinear Equations . . . . 728--729
R. J. Ord-Smith ACM Algorithm 323: Generation of
Permutations in Lexicographic Order . . 117
G. Bayer ACM Algorithm 324: Maxflow . . . . . . . 117--118
Edsger Wybe Dijkstra Go to statement considered harmful . . . 147--148
B. F. W. Witte ACM Algorithm 332: Jacobi Polynomials 436--437
R. C. Salazar and
S. K. Sen ACM Algorithm 333: Minit Algorithm For
Linear Programming . . . . . . . . . . . 437--440
J. Grad and
M. A. Brebner ACM Algorithm 343: Eigenvalues and
Eigenvectors of a Real Generator Matrix 820--826
R. C. Singleton ACM Algorithm 347: An Efficient
Algorithm for Sorting with Minimal
Storage . . . . . . . . . . . . . . . . 185--187
ANSI Subcommittee X3J3 Clarification of Fortran Standards ---
Initial Progress . . . . . . . . . . . . 289--294
D. S. Clemm ACM Algorithm 352: Characteristic Values
and Associated Solutions of Mathieu's
Differential Equation . . . . . . . . . 399--407 (or 399--406??)
N. Wirth On Multiprogramming, Machine Coding, and
Computer Organization . . . . . . . . . 489--498
I. M. Leitch Certification of ACM Algorithm 323 [G6]:
Generation of Permutations in
Lexicographic Order . . . . . . . . . . 512--512
R. C. Singleton ACM Algorithm 357: An Efficient Prime
Number Generator . . . . . . . . . . . . 563--564
W. Gautschi ACM Algorithm 363: Complex Error
Function . . . . . . . . . . . . . . . . 635
T. C. Lowe Automatic segmentation of cyclic program
structures based on connectivity and
processor timing . . . . . . . . . . . . 3--6
Walter Gautschi and
Bruce J. Klein Recursive computation of certain
derivatives --- A study of error
propagation . . . . . . . . . . . . . . 7--9
A. P. Mullery and
G. C. Driscoll A processor allocation method for
time-sharing . . . . . . . . . . . . . . 10--14
R. F. Simmons Natural Language Question-Answering
Systems: 1969 . . . . . . . . . . . . . 15--30
E. T. Irons Experience with an extensible language 31--40
Ugo Montanari A note on minimal length polygonal
approximation to a digitized contour . . 41--47
Harald Stehfest ACM Algorithm 368: Numerical Inversion
of Laplace Transforms . . . . . . . . . 47--49
H. E. Schaffer ACM Algorithm 369: Generator of Random
Numbers Satisfying the Poisson
Distribution . . . . . . . . . . . . . . 49--49
E. L. Butler ACM Algorithm 370: General Random Number
Generator . . . . . . . . . . . . . . . 49--52
J. K. S. McKay ACM Algorithm 371: Partitions in Natural
Order . . . . . . . . . . . . . . . . . 52--52
K. B. Dunham ACM Algorithm 372: An Algorithm to
Produce Complex Primes CSIEVE . . . . . 52--54
Walter Gautschi and
Bruce J. Klein Remark on Algorithm 282, Derivatives of
$e^x / x$, $\cos(x) / x$, and $\sin(x) /
x$ . . . . . . . . . . . . . . . . . . . 53--54
R. Griffin and
K. A. Redich Remark on ``Algorithm 347: An Efficient
Algorithm for Sorting with Minimal
Storage [M1], by R. C. Singleton'' . . . 54--54
Anonymous Representation for calendar date for
machine-to-machine data interchange . . 55--55
Anonymous Interchange rolls of perforated tape for
information interchange . . . . . . . . 56--56
W. H. Payne Fortran Tausworthe pseudorandom number
generator . . . . . . . . . . . . . . . 57--57
David K. Hsiao and
Frank D. Harary A Formal System for Information
Retrieval from Files . . . . . . . . . . 67--73
E. von Glaserfeld and
P. P. Pisani The multistore parser for hierarchical
syntactic structures . . . . . . . . . . 74--82
Steven Vere Translation equations . . . . . . . . . 83--89
H. L. Morgan Spelling correction in systems programs 90--94
Jay Earley An Efficient Context-Free Parsing
Algorithm . . . . . . . . . . . . . . . 94--102
C. E. Radke The Use of Quadratic Residue Research 103--105
B. Jones A Variation on Sorting by Address
Calculation . . . . . . . . . . . . . . 105--107
James R. Bell The Quadratic Quotient Method: A Hash
Code Eliminating Secondary Clustering 107--109
D. N. Ness and
R. S. Green and
W. A. Martin and
G. A. Moulton Computer education in a graduate school
of management . . . . . . . . . . . . . 110--114, 19
M. F. Robbins and
J. D. Beyer An interactive computer system using
graphical flowchart input . . . . . . . 115--119
J. S. White ACM Algorithm 373: Number of Doubly
Restricted Partitions . . . . . . . . . 120--120
J. S. White ACM Algorithm 374: Restricted Partition
Generator . . . . . . . . . . . . . . . 120--120
H. Späth ACM Algorithm 375: Fitting Data to One
Exponential . . . . . . . . . . . . . . 120--121
H. Späth ACM Algorithm 376: Least Squares Fit by
$f(x)=A\cos(Bx+C)$ . . . . . . . . . . . 121--122
R. R. Fenichel and
J. Weizenbaum and
J. C. Yochelson A Program to Teach Programming . . . . . 141--146
J. R. Slagle and
J. K. Dixon Experiments with the M & N Tree-Searching
Program . . . . . . . . . . . . . . . . 147--154, 159
A. Batson and
Shy-Ming M. Ju and
D. C. Wood Measurements of Segment Size . . . . . . 155--159
G. A. Watson On an Algorithm for Nonlinear Minimax
Approximation . . . . . . . . . . . . . 160--162
D. G. Schweikert A Comparison of Error Improvement
Estimates for Adaptive Trapezoid
Integration . . . . . . . . . . . . . . 163--166
Robert M. Schwarcz and
John F. Burger and
Robert F. Simmons A Deductive Question Answerer for
Natural Language Inference . . . . . . . 167--183
A. F. Cardenas and
W. J. Karplus PDEL --- a Language for Partial
Differential Equations . . . . . . . . . 184--191
Michael J. Levine and
Stanley M. Swanson ACM Algorithm 377: Symbolic Expansion of
Algebraic Expressions . . . . . . . . . 191--192
M. V. Kailas Another method of converting from
hexadecimal to decimal . . . . . . . . . 193--193
D. Pager A number system for the permutations . . 193--193
J. R. H. Dempster Comment on a Paging Anomaly . . . . . . 193--194
H. A. Maurer A Note on the Complement of Inherently
Ambiguous Context-Free Languages . . . . 194--194
D. K. Hsiao and
F. D. Harary Corrigenda: ``A Formal System for
Information Retrieval from Files'' . . . 266--266
A. J. DeSalvio and
J. G. Purdy and
J. Rau Creation and Control of Internal Data
Bases Under a Fortran Programming
Environment . . . . . . . . . . . . . . 211--215
H. D. Mills Syntax-Directed Documentation for PL360 216--222
Rudolf Bayer and
Christoph Witzgall Some Complete Calculi for Matrices . . . 223--237
P. Brinch Hansen The Nucleus of a Multiprogramming System 238--241, 250
C. M. Eastman Representations for Space Planning . . . 242--250
J. E. Pomeranz and
R. L. Weil, Jr. The cyclical majority problem . . . . . 251--254
E. N. Nilson Cubic Splines on Uniform Meshes . . . . 255--258
W. Pankiewicz ACM Algorithm 378: Discretized
Newton-like Method for Solving a System
of Simultaneous Nonlinear Equations . . 259--260
J. N. Lyness ACM Algorithm 379: SQUANK (Simpson
Quadrature Used Adaptively-Noise Killed) 260--263
W. F. Heess, Jr. Comments on a paper by Wallace and Mason 264--265
J. L. Smith Comment on multiprogramming under a page
on demand strategy . . . . . . . . . . . 265--265
Ronald C. de Vries Comment on Lawler's Multilevel Boolean
minimization . . . . . . . . . . . . . . 265--266
K. R. Knight An Algol construction for procedures as
parameters of procedures . . . . . . . . 266--266
N. Wirth Corrigenda: ``On Multiprogramming,
Machine Coding, and Computer
Organization'' . . . . . . . . . . . . . 266--266
L. Hodes Programming System for the On-Line
Analysis of Biomedical Images . . . . . 279--283, 286
G. A. Sitton Operations on Generalized Arrays with
the Genie Compiler . . . . . . . . . . . 284--286
S. Vere Translation Equations (Errata) . . . . . 286--286
W. E. Sasser and
D. S. Burdick and
D. A. Graham and
T. H. Naylor Application of Sequential Sampling to
Simulation. an Example Inventory Model 287--296
J. Loeckx Algorithm for the Construction of
Bounded-Context Parsers . . . . . . . . 297--307
John C. Reynolds GEDANKEN --- A Simple Typeless Language
Based on the Principle of Completeness
and the Reference Concept . . . . . . . 308--319
S. Crespi-Reghizzi and
R. Morpurgo A language for treating graphs . . . . . 319--323
S. Laflin and
M. A. Brebner ACM Algorithm 380: In-situ Transposition
of a Rectangular Matrix . . . . . . . . 324--326
R. E. Knop ACM Algorithm 381: Random Vectors
Uniform In Solid Angle . . . . . . . . . 326--326
H. A. Elder On the Feasibility of Voice Input to an
On-Line Computer Processing System . . . 339--346
C. R. Muthukrishnan and
V. Rajaraman On the Conversion of Decision Tables to
Computer Programs . . . . . . . . . . . 347--351
J. E. Grimes Scheduling to Reduce Conflict in
Meetings . . . . . . . . . . . . . . . . 351--352
D. G. Frantz A PL\slash 1 program to assist the
comparative linguist . . . . . . . . . . 353--356
F. J. Damerau Automatic Parsing for Content Analysis 356--360
Peter Linz Accurate Floating-Point Summation . . . 361--362
K. E. Hillstrom Comparison of Several Adaptive
Newton--Cotes Quadrature Routines in
Evaluating Definite Integrals with
Peaked Integrands . . . . . . . . . . . 362--365
G. W. Stewart Incorporating Origin Shifts into the QR
Algorithm for Symmetric Tridiagonal
Matrices . . . . . . . . . . . . . . . . 365--367
P. J. Chase ACM Algorithm 382: Combinations of ${M}$
Out of ${N}$ Objects . . . . . . . . . . 368--368
P. J. Chase ACM Algorithm 383: Permutations of a Set
with Repetitions . . . . . . . . . . . . 368--369
G. W. Stewart ACM Algorithm 384: Eigenvalues and
Eigenvectors of a Real Symmetric Matrix
[F2] . . . . . . . . . . . . . . . . . . 369--371
R. L. London Certification of ``Algorithm 245:
Treesort 3 [M1]'': Proof of Algorithms
--- A New Kind of Certification . . . . 371--374
J. P. Chandler and
W. C. Harrison R201--SHELLSORT . . . . . . . . . . . . 373--374
E. F. Codd A Relational Model of Data for Large
Shared Data Banks . . . . . . . . . . . 377--387
C. A. Grant An interactive command generating
facility . . . . . . . . . . . . . . . . 403--406
M. A. Wilkes Conversational Access to a 2048-Word
Machine . . . . . . . . . . . . . . . . 407--414
W. M. Waite The mobile programming system: STAGE 2 415--421
Burton H. Bloom Space/Time Trade-offs in Hash Coding
with Allowable Errors . . . . . . . . . 422--426
E. G. Coffman, Jr. and
J. Eve File Structures Using Hashing Functions 427--432, 436
Gordon H. Bradley Algorithm and Bound for the Greatest
Common Divisor of $n$ Integers . . . . . 433--436
W. A. Woods Context-Sensitive Parsing . . . . . . . 437--445
K. A. Paciorek ACM Algorithm 385: Exponential Integral
${E}_i(x)$ . . . . . . . . . . . . . . . 446--447
G. H. Bradley ACM Algorithm 386: Greatest Common
Divisor of $n$ Integers and Multipliers 447--448
T. Bray Certification of Algorithm 22,
Ricatti--Bessel Functions of First and
Second Kind . . . . . . . . . . . . . . 448--448
E. N. Ng Certification of Algorithm 385,
Exponential Integral ${\rm Ei}(x)$ . . . 448--449
K. Sattley and
R. Millstein Comments on a paper by Lowe . . . . . . 450--451
H. D. Baecker A note on data base deadlocks . . . . . 451--451
J. E. Pomeranz Note on an Anomaly in Paging . . . . . . 451--451
B. R. Hunt A Comment on Axiomatic Approaches to
Programming . . . . . . . . . . . . . . 452--452
N. R. Nielsen Allocation of Computer Resources. is
Pricing the Answer . . . . . . . . . . . 467--474
G. Nagy and
N. Tuong Normalization Techniques for Handprinted
Numerals . . . . . . . . . . . . . . . . 475--481
A. C. Day Full Table Quadratic Searching for
Scatter Storage . . . . . . . . . . . . 481--482
B. S. Brawn and
F. G. Gustavson and
E. S. Mankin Sorting in a Paging Environment . . . . 483--494
J. H. Saltzer and
J. W. Gintell The instrumentation of Multics . . . . . 495--500
J. D. Ichbiah and
S. P. Morse A technique for generating almost
optimal Floyd-Evans productions for
precedence grammars . . . . . . . . . . 501--508
K. Fielding ACM Algorithm 387: Function Minimization
and Linear Search . . . . . . . . . . . 509--510
H. Hübner and
H. Kremer and
K. O. Linn and
W. Schwering ACM Algorithm 388: Rademacher Function 510--511
H. Hübner and
H. Kremer and
K. O. Linn and
W. Schwering ACM Algorithm 389: Binary Ordered Walsh
Functions . . . . . . . . . . . . . . . 511--511
H. Hübner and
H. Kremer and
K. O. Linn and
W. Schwering ACM Algorithm 390: Sequency Ordered
Walsh Functions . . . . . . . . . . . . 511--511
J. McKay ACM Algorithm 391: Unitary Symmetric
Polynomials . . . . . . . . . . . . . . 512--512
Anonymous Identification of States of the United
States (including the District of
Columbia) for information interchange 514--515
W. Jack Bouknight A Procedure for Generation of
Three-Dimensional Half-Toned Computer
Graphics Presentations . . . . . . . . . 527--536
G. Bracchi and
M. Somalvico Interactive Software System for
Computer-Aided Design. an Application to
Circuit Project . . . . . . . . . . . . 537--545
I. Hirschsohn AMESPLOT, a Higher Level Data Plotting
Software System . . . . . . . . . . . . 546--555
Cleve B. Moler and
Louis P. Solomon Integrating Square Roots . . . . . . . . 556--557
G. W. Kimble A Variation of the Goodman-Lance Method
for the Solution of Two-Point Boundary
Value Problems . . . . . . . . . . . . . 557--558
M. Wayne Wilson Optimal Starting Approximations for
Generating Square Root for Slow or No
Divide . . . . . . . . . . . . . . . . . 559--560
L. W. Ehrlich Complex Matrix Inversion Versus Real . . 561--562
M. H. van Emden Increasing the Efficiency of Quicksort 563--567
Robert R. Smith and
Dennis McCall ACM Algorithm 392: Systems of Hyperbolic
P.D.E. . . . . . . . . . . . . . . . . . 567--570
S. K. Abdali ACM Algorithm 393: Special Series
Summation with Arbitrary Precision . . . 570--570
R. B. Dial ACM Algorithm 394: Decision Table
Translation . . . . . . . . . . . . . . 571--572
Leslie Lamport and
J. R. Bell Comment on Bell's Quadratic Quotient
Method for Hash Code Searching . . . . . 573--574
Z. Bavel On the Number of Automorphisms of a
Singly Generated Automaton . . . . . . . 574--575
W. A. Woods Transition Network Grammars for Natural
Language Analysis . . . . . . . . . . . 591--606
J. Earley and
H. Sturgis A formalism for translator interactions 607--617
G. W. Hill ACM Algorithm 395: Student's
$t$-Distribution . . . . . . . . . . . . 617--619
G. W. Hill ACM Algorithm 396: Student's
$t$-Quantiles . . . . . . . . . . . . . 619--620
S. K. Chang and
A. Gill ACM Algorithm 397: An Integer
Programming Problem . . . . . . . . . . 620--621
R. A. Stone ACM Algorithm 398: Tableless Date
Conversion . . . . . . . . . . . . . . . 621--621
J. J. Seppänen ACM Algorithm 399: Spanning Tree . . . . 621--622
G. C. Wallick ACM Algorithm 400: Modified Håvie
Integration . . . . . . . . . . . . . . 622--624
R. Peto Remark on ``Algorithm 347: An Efficient
Algorithm for Sorting with Minimal
Storage [M1]'' . . . . . . . . . . . . . 624
L. B. Smith The use of interactive graphics to solve
numerical problems . . . . . . . . . . . 625--634
P. LaFata and
J. B. Rosen An interactive display for approximation
by linear programming . . . . . . . . . 651--659
Vincent Y. Lum Multi-Attribute Retrieval with Combined
Indexes . . . . . . . . . . . . . . . . 660--665
C. J. Mifsud A multiple-precision division algorithm 666--668
K. Conrow and
R. G. Smith NEATER2: A PL/I Source Statement
Reformatter . . . . . . . . . . . . . . 669--675
James R. Bell and
Charles H. Kaman The Linear Quotient Hash Code . . . . . 675--677
C. J. Cheney A Nonrecursive List Compacting Algorithm 677--678
Anonymous Proposed American National Standard.
Recorded magnetic tape for information
interchange (1600 CPI, phase encoded) 679--685
Anonymous Proposed American National Standard.
Unrecorded magnetic tape for information
interchange (9 track-200 and 800 CPI,
NRZI and 1600 CPI, P.E.) . . . . . . . . 686--692
P. Bratley ACM Algorithm 401: An Improved Algorithm
to Produce Complex Primes . . . . . . . 693--693
M. H. van Emden ACM Algorithm 402: Increasing the
Efficiency of Quicksort . . . . . . . . 693--694
W. J. Wilson A generalized method for generating
argument/function values . . . . . . . . 696--697
J. R. Ehrman Correction to 'logical' arithmetic on
computers with two's complement binary
arithmetic . . . . . . . . . . . . . . . 697--698
A. Bernstein Comment on the working set model for
program behavior . . . . . . . . . . . . 698--699
J. Rokne Condition numbers of Pei matrices . . . 699--699
M. V. Mathews and
F. R. Moore GROOVE --- a program to compose, store,
and edit functions of time . . . . . . . 715--721
James C. Tiernan An Efficient Search Algorithm to Find
the Elementary Circuits of a Graph . . . 722--726
C. Betourne and
J. Boulenger and
J. Ferrie and
C. Kaiser and
S. Krakowiak and
J. Mossiere Process management and resource sharing
in the multiaccess system ESOPE . . . . 727--733
H. L. Morgan An interrupt based organization for
management information systems . . . . . 734--739
R. J. Thompson Improving round-off in Runge--Kutta
computations with Gill's method . . . . 739--740
S. C. Shapiro The list set generator: a construct for
evaluating set expressions . . . . . . . 741--744
N. A. Black Optimum Merging from Mass Storage . . . 745--749
K. A. Redish Remark on Algorithm 385, Exponential
Integral ${\rm Ei}(x)$ . . . . . . . . . 750--750
G. W. Stewart Remark on ``Algorithm 384: Eigenvalues
and Eigenvectors of a Real Symmetric
Matrix [F2]'' . . . . . . . . . . . . . 750--750
E. A. Fuchs and
P. E. Jackson Estimates of Distributions of Random
Variables for Certain Computer
Communications Traffic Models . . . . . 752--757
C. C. Pinter On decomposing a Boolean function and
simplifying the components separately 758--758
W. J. Raduchel Efficient handling of binary data . . . 758--759
Robert A. Wagner Finiteness Assumptions and Intellectual
Isolation of Computer Scientists . . . . 759--760
Carl Hammer Signature Simulation and Certain
Cryptographic Codes . . . . . . . . . . 3--14
Allen Klinger Pattern Width at a Given Angle . . . . . 15--20
Shi-Kuo Chang The Reconstruction of Binary Patterns
from Their Projections . . . . . . . . . 21--25
Giampio Bracchi and
Domenico Ferrari Language for Treating Geometric Patterns
in a Two-Dimensional Space . . . . . . . 26--32
R. A. Broucke Construction of Rational and Negative
Powers of a Formal Series . . . . . . . 32--35
Richard C. Holt Comments on Prevention of System
Deadlocks . . . . . . . . . . . . . . . 36--38
C. A. R. Hoare Proof of a Program: FIND . . . . . . . . 39--45
L. G. Proll Further evidence for the analysis of
algorithms for the zero-one programming
problem . . . . . . . . . . . . . . . . 46--47
M. W. Coleman and
M. S. Taylor ACM Algorithm 403: Circular Integer
Partitioning [A1] . . . . . . . . . . . 48--48
C. W. Lucas, Jr. and
C. W. Terrill ACM Algorithm 404: Complex Gamma
Function [S14] . . . . . . . . . . . . . 48--49
Å. Kolm and
T. Dahlstrand Remark on ``Algorithm 333: Minit
Algorithm For Linear Programming ([H])'' 50--50
K. A. Redish Algorithms: Comment on London's
Certification of Algorithm 245 . . . . . 50--51
S. L. Pollack Comment on the conversion of decision
tables to computer programs . . . . . . 52--52
A. V. Aho and
P. J. Denning and
J. D. Ullman Principles of optimal page replacement 80--93
Keith Shwayder Conversion of Limited-Entry Decision
Tables to Computer Programs. a Proposed
Modification to Pollack's Algorithm . . 69--73
Arthur J. Bernstein and
J. C. Sharp A Policy-Driven Scheduler for a
Time-Sharing System . . . . . . . . . . 74--78
Norman R. Nielsen An Analysis of Some Time-Sharing
Techniques . . . . . . . . . . . . . . . 79--90
James R. Slagle and
Carl D. Farrell Experiments in Automatic Learning for a
Multipurpose Heuristic Program . . . . . 91--99
H. Hurwitz, Jr. On the Probability Distribution of the
Values of Binary Trees . . . . . . . . . 99--102
James R. Slagle and
Richard C. T. Lee Application of Game Tree Searching
Techniques to Sequential Pattern
Recognition . . . . . . . . . . . . . . 103--110
J. Rokne and
P. Lancaster Complex Interval Arithmetic . . . . . . 111--112
Alice M. Dell and
Roman L. Weil and
Gerald L. Thompson ACM Algorithm 405: Roots of Matrix
Pencils: The Generalized Eigenvalue
Problem [F2] . . . . . . . . . . . . . . 113--117
A. Michael Noll Scanned-Display Computer Graphics . . . 143--150
Zohar Manna and
Richard J. Waldinger Toward Automatic Program Synthesis . . . 151--165
William K. Winters Scheduling Algorithm for a Computer
Assisted Registration System . . . . . . 166--171
John G. Williams Storage Utilization in a Memory
Hierarchy When Storage Assignment is
Performed by a Hashing Algorithm . . . . 172--175
C. William Gear The Automatic Integration of Ordinary
Differential Equations . . . . . . . . . 176--179
Jo Ann Howell ACM Algorithm 406: Exact Solution of
Linear Equations Using Residue
Arithmetic [F4] . . . . . . . . . . . . 180--184
C. William Gear ACM Algorithm 407: DIFSUB for Solution
of Ordinary Differential Equations [D2] 185--190
Niklaus Wirth Program Development by Stepwise
Refinement . . . . . . . . . . . . . . . 221--227
Vincent Y. Lum and
P. S. T. Yuen and
M. Dodd Key-to-Address Transform Techniques: A
Fundamental Performance Study on Large
Existing Formatted Files . . . . . . . . 228--239
Allen B. Tucker and
Michael J. Flynn Dynamic Microprogramming. Processor
Organization and Programming . . . . . . 240--250
Peggy Anne Talbot and
John W. Carr III and
Richard R. Coulter, Jr. and
Rosa C. Hwang Animator: An On-Line Two-dimensional
Film Animation System . . . . . . . . . 251--259
Marvin L. Stein and
William D. Munro On Complement Division . . . . . . . . . 260--264
J. M. McNamee ACM Algorithm 408: A Sparse Matrix
Package (Part I) . . . . . . . . . . . . 265--273
Elmer W. Galbi Software and patents: a status report 274--278
T. William Olle (Chairman) and
Codasyl Systems Committee Introduction to ``Feature Analysis of
Generalized Data Base Management
Systems'' . . . . . . . . . . . . . . . 308--318
Norman R. Nielsen The Merit of Regional Computing Networks 319--326
Patrick Krolak and
Wayne Felts and
George Marble A Man-Machine Approach Toward Solving
the Traveling Salesman Problem . . . . . 327--334
Ugo Montanari On the Optimal Detection of Curves in
Noisy Pictures . . . . . . . . . . . . . 335--345
Donald L. Richards How To Keep the Addresses Short . . . . 346--349
Robert R. Fenichel On Implementation of Label Variables . . 349--350
James H. Morris, Jr. Another Recursion Induction Principle 351--354
H. Schmitt ACM Algorithm 409: Discrete Chebychev
Curve Fit [E2] . . . . . . . . . . . . . 355--356
J. M. Chambers ACM Algorithm 410: Partial Sorting [M1] 357--358
Kazuaki Harada Generation of rosary permutations
expressed in Hamiltonian circuits . . . 373--379
James D. Foley An approach to the optimum design of
computer graphics systems . . . . . . . 380--390
Saul Amarel Computer Science: A Conceptual Framework
for Curriculum Planning . . . . . . . . 391--401
W. E. Bosarge, Jr. and
O. G. Johnson Numerical properties of the
Ritz--Trefftz algorithm for optimal
control . . . . . . . . . . . . . . . . 402--406
H. Tim Gladwin A Note on Compiling Fixed Point Binary
Multiplications . . . . . . . . . . . . 407--408
A. G. Fraser On the Meaning of Names in Programming
Systems . . . . . . . . . . . . . . . . 409--416
R. J. Walker Binary Summation . . . . . . . . . . . . 417--417
Marvin V. Zelkowitz Interrupt Driven Programming . . . . . . 417--418
J. L. McKenney and
Fred M. Tonge The State of Computer-Oriented Curricula
in Business Schools 1970 . . . . . . . . 443--448
Arthur J. Bernstein A Programmer Training Project . . . . . 449--452
Franklin L. DeRemer Simple LR(k) Grammars . . . . . . . . . 453--460
Terrence W. Pratt and
Daniel P. Friedman A Language Extension for Graph
Processing, and Its Formal Semantics . . 460--467
Keith Paton An algorithm for the blocks and cut
nodes of a graph . . . . . . . . . . . . 468--475
David E. Ferguson Buffer Allocation in Merge-Sorting . . . 476--478
C. V. Ramamoorthy and
M. J. Gonzalez Subexpression ordering in the execution
of arithmetic expressions . . . . . . . 479--485
D. G. McVitie and
L. B. Wilson The Stable Marriage Problem . . . . . . 486--490
D. G. McVitie and
L. B. Wilson ACM Algorithm 411: Three Procedures for
the Stable Marriage Problem [H] . . . . 491--492
J. \vCermák ACM Algorithm 412: Graph Plotter [J6] 492--493
William J. Raduchel Remark on ``Algorithm 316: Solution of
Simultaneous Nonlinear Equations [C5]'' 493
Robert Morris Papers from the 2nd symposium on
symbolic and algebraic manipulation . . 509--510
Anthony C. Hearn Applications of symbol manipulation in
theoretical physics . . . . . . . . . . 511--516
Andrew D. Hall, Jr. The Altran system for rational function
manipulation --- a survey . . . . . . . 517--521
Robert R. Fenichel List Tracing in Systems Allowing
Multiple Cell Types . . . . . . . . . . 522--526
Joel Moses Algebraic Simplification: A Guide for
the Perplexed . . . . . . . . . . . . . 527--537
William H. Jefferys Automatic algebraic manipulation in
celestial mechanics . . . . . . . . . . 538--541
David Barton and
John P. Fitch General relativity and the application
of algebraic manipulative systems . . . 542--547
Joel Moses Symbolic Integration: The Stormy Decade 548--560
Daniel Teichroew Education Related to the Use of
Computers in Organizations . . . . . . . 573--588
Sadahiro Isoda and
Eiichi Goto and
Izumi Kimura An Efficient Bit Table Technique for
Dynamic Storage Allocation of $2^n$-word
Blocks . . . . . . . . . . . . . . . . . 589--592
Keith Paton Corrigendum: ``An algorithm for the
blocks and cutnodes of a graph'' . . . . 592--592
Eugene Wong and
T. C. Chiang Canonical Structure in Attribute Based
File Organization . . . . . . . . . . . 593--597
David L. Phillips A Note on Best One-Sided Approximations 598--600
Werner Liniger A stopping criterion for the
Newton--Raphson method in implicit
multistep integration algorithms for
nonlinear systems of ordinary
differential equations . . . . . . . . . 600--601
Ivan Flores and
George Madpis Average Binary Search Length for Dense
Ordered Lists . . . . . . . . . . . . . 602--603
Robert R. Fenichel Comment on Cheney's List-Compaction
Algorithm . . . . . . . . . . . . . . . 603--604
Jay Earley Toward an Understanding of Data
Structures . . . . . . . . . . . . . . . 617--627
ANSI Subcommittee X3J3 Clarification of Fortran Standards ---
Second Report . . . . . . . . . . . . . 628--642
Arthur E. Oldehoeft and
Samuel D. Conte Experiments with an automated
instructional system for numerical
methods . . . . . . . . . . . . . . . . 643--650
William M. Newman Display Procedures . . . . . . . . . . . 651--660
Alan G. Nemeth and
Paul D. Rovner User program measurement in a
time-shared environment . . . . . . . . 661--666
P. J. Courtois and
F. Heymans and
David Lorge Parnas Concurrent Control with ``Readers'' and
``Writers'' . . . . . . . . . . . . . . 667--668
J. N. Lyness and
G. Sande ACM Algorithm 413: ENTCAF and ENTCRE:
Evaluation of Normalized Taylor
Coefficients of an Analytic Function
(C5) . . . . . . . . . . . . . . . . . . 669--675
P. Branquart and
J. Lewi and
Michel Sintzoff and
P. L. Wodon The composition of semantics in Algol 68 697--708
John W. Hamblen Using computers in higher education:
past recommendations, status, and needs 709--712
Donald L. Shell Optimizing the Polyphase Sort . . . . . 713--719
Itaru Aramaki and
Tomokazu Kawabata and
Kazuhiko Arimoto Automation of Etching-Pattern Layout . . 720--730
Michael A. Malcolm On Accurate Floating-Point Summation . . 731--736
G. H. Golub and
L. B. Smith ACM Algorithm 414: Chebyshev
Approximation of Continuous Functions by
a Chebyshev System of Functions [E2] . . 737--746
Richard Gordon and
Gabor T. Herman Reconstruction of Pictures from Their
Projections . . . . . . . . . . . . . . 759--768
E. L. Amidon and
G. S. Akin Algorithmic Selection of the Best Method
for Compressing Map Data Strings . . . . 769--774
James K. Mullin Retrieval-Update Speed Tradeoffs Using
Combined Indices . . . . . . . . . . . . 775--776
Malcolm C. Harrison Implementation of the Substring Test by
Hashing . . . . . . . . . . . . . . . . 777--779
W. A. (William A.) Wulf and
D. B. Russell and
A. N. Habermann BLISS: A Language for Systems
Programming . . . . . . . . . . . . . . 780--790
Arnold Rochfeld New LISP Techniques for a Paging
Environment . . . . . . . . . . . . . . 791--795
John W. Blumberg and
Clinton R. Foulk A note on `a modification of Nordsieck's
method using an ``off-step'' point' . . 796--796
Sven-Åke A. Gustafson Rapid Computation of General
Interpolation Formulas and Mechanical
Quadrature Rules . . . . . . . . . . . . 797--801
François Bourgeois and
Jean-Claude Lassalle An extension of the Munkres algorithm
for the assignment problem to
rectangular matrices . . . . . . . . . . 802--804
François Bourgeois and
John-Claude C. Lassalle ACM Algorithm 415: Algorithm for the
Assignment Problem (Rectangular
Matrices) [H] . . . . . . . . . . . . . 805--806
Sven-Åke Gustafson ACM Algorithm 416: Rapid Computation of
Coefficients of Interpolation Formulas
[E1] . . . . . . . . . . . . . . . . . . 806--807
Sven-Åke Gustafson ACM Algorithm 417: Rapid Computation of
Weights of Interpolatory Quadrature
Rules [D1] . . . . . . . . . . . . . . . 807--807
Arthur M. Lesk Pictorial pattern recognition and the
phase problem of X-ray crystallography 3--6
Stefano Levialdi On Shrinking Binary Picture Patterns . . 7--10
Richard O. Duda and
Peter E. Hart Use of the Hough transformation to
detect lines and curves in pictures . . 11--15
Edgar T. Irons and
Frans M. Djorup A CRT Editing System . . . . . . . . . . 16--20
T. A. Dwyer Teacher/student authored CAI using the
NEWBASIC system . . . . . . . . . . . . 21--28
Donald L. Shell Corrigendum: ``Optimizing the Polyphase
Sort'' . . . . . . . . . . . . . . . . . 28--28
Gordon I. McCalla and
Jeffrey R. Sampson MUSE: A Model To Understand Simple
English . . . . . . . . . . . . . . . . 29--40
Richard I. Shrager Quadratic Programming for Nonlinear
Regression . . . . . . . . . . . . . . . 41--45
Herbert E. Salzer Ordering +-f(+-f(+-f(\ldots+-f(x)..)))
When f(x) Is Positive Monotonic . . . . 45--46
Bo Einarsson ACM Algorithm 418: Calculation of
Fourier Integrals [D1] . . . . . . . . . 47--48
I. D. G. Macleod Certification of ``Algorithm 380:
In-Situ Transposition of a Rectangular
Matrix [F1]'' . . . . . . . . . . . . . 49
Günther F. Schrack Remark on ``Algorithm 391: Unitary
Symmetric Polynomials [Z]'' . . . . . . 49
David Pager A Proposal for a Computer-Based
Interactive Scientific Community . . . . 71--75
Charles M. Eastman Preliminary report on a system for
general space planning . . . . . . . . . 76--87
William A. Martin and
D. N. Ness Optimizing Binary Trees Grown with a
Sorting Algorithm . . . . . . . . . . . 88--93
Arthur E. Oldehoeft and
Maurice H. Halstead Maximum computing power and cost factors
in the centralization problem . . . . . 94--96
Michael A. Jenkins and
J. F. Traub ACM Algorithm 419: Zeros of a Complex
Polynomial [C2] . . . . . . . . . . . . 97--99
Hugh Williamson ACM Algorithm 420: Hidden-Line Plotting
Program [J6] . . . . . . . . . . . . . . 100--103
James Anderson Moorer Music and Computer Composition . . . . . 104--113
Ivan Flores and
George Madpis Corrigendum: ``Average Binary Search
Length for Dense Ordered Lists'' . . . . 113--113
Richard Gordon and
Gabor T. Herman Corrigendum: ``Reconstruction of
Pictures from Their Projections'' . . . 113--113
Peter J. Denning and
Brian Randell Papers from the 3rd ACM symposium on
operating systems principles . . . . . . 133--134
Daniel G. Bobrow and
Jerry D. Burchfiel and
Daniel L. Murphy and
Raymond S. Tomlinson TENEX, A Paged Time-Sharing System for
the PDP-10 . . . . . . . . . . . . . . . 135--143
Barbara H. Liskov The Design of the Venus Operating System 144--149
R. Stockton Gaines An Operating System Based on the Concept
of a Supervisory Computer . . . . . . . 150--156
Michael D. Schroeder and
Jerome H. Saltzer A Hardware Architecture for Implementing
Protection Rings . . . . . . . . . . . . 157--170
A. Nico Habermann Synchronization of Communicating
Processes . . . . . . . . . . . . . . . 171--176
Toby J. Teorey and
Tad B. Pinkerton A Comparative Analysis of Disk
Scheduling Policies . . . . . . . . . . 177--184
Edward G. Coffman, Jr. and
T. A. Ryan, Jr. A study of storage partitioning using a
mathematical model of locality . . . . . 185--190
Peter J. Denning and
Stuart C. Schwartz Properties of the Working Set Model . . 191--198
Richard W. Conway and
William L. Maxwell and
Howard L. Morgan On the Implementation of Security
Measures in Information Systems . . . . 211--220
David C. Walden A system for interprocess communication
in a resource sharing computer network 221--230
N. M. Herbst and
P. M. Will An experimental laboratory for pattern
recognition and signal processing . . . 231--244
Yutaka Matsushita Hidden Lines Elimination for a Rotating
Object . . . . . . . . . . . . . . . . . 245--252
Stephen M. Chase An implemented graph algorithm for
winning Shannon Switching Games . . . . 253--256
Ellis Horowitz and
Howard L. Morgan and
Alan C. Shaw Computers and Society: A Proposed Course
for Computer Scientists . . . . . . . . 257--261
Hirondo Kuki Complex Gamma Function with Error
Control [S14] . . . . . . . . . . . . . 262--267
Cleve B. Moler Matrix Computations with Fortran and
Paging . . . . . . . . . . . . . . . . . 268--270
Hirondo Kuki ACM Algorithm 421: Complex Gamma
Function with Error Control [S14] . . . 271--272
V. Kevin M. Whitney ACM Algorithm 422: Minimal Spanning Tree
[H] . . . . . . . . . . . . . . . . . . 273--274
Cleve B. Moler ACM Algorithm 423: Linear Equation
Solver [F4] . . . . . . . . . . . . . . 274--274
David C. Walden A Note on Cheney's Nonrecursive
List-Compacting Algorithm . . . . . . . 275--275
T. C. Hu A Comment on the Double-Chained Tree . . 276--276
James K. Mullin An Improved Indexed-Sequential Access
Method Using Hashed Overflow . . . . . . 301--307
A. Bensoussan and
C. T. Clingen and
Robert C. Daley The Multics Virtual Memory: Concepts and
Design . . . . . . . . . . . . . . . . . 308--318
Ronald D. Christman MUX, a Simple Approach to On-Line
Computing . . . . . . . . . . . . . . . 319--329
David Lorge Parnas A technique for software module
specification with examples . . . . . . 330--336
W. Morven Gentleman Implementing Clenshaw--Curtis
quadrature. I. Methodology and
experience . . . . . . . . . . . . . . . 337--342
W. Morven Gentleman Implementing Clenshaw--Curtis
quadrature. II. Computing the cosine
transformation . . . . . . . . . . . . . 343--346
D. Greenspan and
D. Schultz Fast finite-difference solution of
biharmonic problems . . . . . . . . . . 347--350
Charles B. Dunham Minimax nonlinear approximation by
approximation on subsets . . . . . . . . 351--351
Richard Harter The Optimality of Winograd's Formula . . 352--352
W. Morven Gentleman ACM Algorithm 424: Clenshaw--Curtis
Quadrature [D1] . . . . . . . . . . . . 353--355
Rex L. Hurst and
Robert E. Knop ACM Algorithm 425: Generation of Random
Correlated Normal Variables [G5] . . . . 355--357
Coenraad Bron ACM Algorithm 426: Merge Sort Algorithm
[M1] . . . . . . . . . . . . . . . . . . 357--358
Peter Linz ACM Algorithm 427: Fourier Cosine
Integral [D1] . . . . . . . . . . . . . 358--360
J. M. Yohe ACM Algorithm 428: Hu-Tucker Minimum
Redundancy Alphabetic Coding Method [Z] 360--362
Robert L. Ashenhurst A report of the ACM curriculum committee
on computer education for management.
Curriculum recommendations for graduate
professional programs in information
systems . . . . . . . . . . . . . . . . 363--398
J. Blatny and
S. R. Clark and
T. A. Rourke On the optimization of performance of
time-sharing systems by simulation . . . 411--420
Thomas R. Spacek A proposal to establish a pseudo virtual
memory via writable overlays . . . . . . 421--426
Philip Gilbert and
W. J. Chandler Interference between Communicating
Parallel Processes . . . . . . . . . . . 427--437
James F. Gimpel Blocks --- A New Data type for SNOBOL4 438--447
David F. Martin A Boolean matrix method for the
computation of linear precedence
functions . . . . . . . . . . . . . . . 448--454
Robert T. O'Reagan Computer Assigned Codes from Verbal
Responses . . . . . . . . . . . . . . . 455--459
Ken Iguchi A starting method for solving nonlinear
Volterra integral equations of the
second kind . . . . . . . . . . . . . . 460--461
Ira Pohl A Sorting Problem and Its Complexity . . 462--464
K. S. Kölbig Certification of ``Algorithm 363:
Complex error function'' . . . . . . . . 465--466
Herbert Niessner Remark on ``Algorithm 343: Eigenvalues
and eigenvectors of a real general
matrix'' . . . . . . . . . . . . . . . . 466--466
L. G. Proll Remark on ``ACM Algorithm 370: General
random number generator [G5]'' . . . . . 467--468
Günther F. Schrack Remark on ``Algorithm 381: Random
vectors uniform in solid angle'' . . . . 468--468
Arthur H. J. Sale Remark on ``Algorithm 393: Special
series summation with arbitrary
precision'' . . . . . . . . . . . . . . 468--469
Bo Einarsson Remark on ``Algorithm 418: Calculation
of Fourier integrals'' . . . . . . . . . 469--469
Stephen C. Johnson and
Brian W. Kernighan Remark on ``Algorithm 397: An integer
programming problem'' . . . . . . . . . 469--469
Abraham Kandel Computer Science --- A Vicious Circle 470--471
Elliot B. Koffman Individualizing instruction in a
generative CAI tutor . . . . . . . . . . 472--473
E. N. Houstis and
W. F. Mitchell and
J. R. Rice ACM Algorithm 438: Product Type
Two-point Gauss--Legendre--Simpson's
Integration . . . . . . . . . . . . . . 1071
Lee Revens The first twenty-five years: ACM
1947--1962 . . . . . . . . . . . . . . . 485--490
Eric A. Weiss Publications in Computing: An Informal
Review . . . . . . . . . . . . . . . . . 491--497
Anthony Ralston The Next Two Years (ACM President's
Letter) . . . . . . . . . . . . . . . . 499--500
Andrei P. Ershov Aesthetics and the Human Factor in
Programming . . . . . . . . . . . . . . 501--505
G. G. Probst and
Robert S. Oelman and
Sam Wyly and
C. Lester Hogan and
F. T. Cary and
Gordon Bell and
Donald P. Kircher As the Industry Sees It . . . . . . . . 506--517
Michael A. Arbib Toward an Automata Theory of Brains . . 521--527
Zohar Manna and
Jean Vuillemin Fix Point Approach to the Theory of
Computation . . . . . . . . . . . . . . 528--536
J. F. Traub Numerical Mathematics and Computer
Science . . . . . . . . . . . . . . . . 537--541
David F. Shanno and
Roman L. Weil Management science: a view from
nonlinear programming . . . . . . . . . 542--549
Joel Moses Toward a General Theory of Special
Functions . . . . . . . . . . . . . . . 550--554
Caxton C. Foster A View of Computer Architecture . . . . 557--565
A. G. Fraser On the interface between computers and
data communications systems . . . . . . 566--573
Per Brinch Hansen Structured Multiprogramming . . . . . . 574--578
William C. Lynch Operating System Performance . . . . . . 579--585
Stephen R. Kimbleton The role of computer system models in
performance evaluation . . . . . . . . . 586--590
Saul Rosen Programming Systems and Languages
(1965--1975) . . . . . . . . . . . . . . 591--600
Jean E. Sammet Programming Languages: History and
Future . . . . . . . . . . . . . . . . . 601--610
Lloyd D. Fosdick The Production of Better Mathematical
Software . . . . . . . . . . . . . . . . 611--617
Daniel G. Bobrow Requirements for Advanced Programming
Systems for List Processing . . . . . . 618--627
Charles W. Bachman The Evolution of Storage Structures . . 628--634
John R. Rice On the Present and Future of Scientific
Computation . . . . . . . . . . . . . . 637--639
Robert I. Benjamin A generational perspective of
information system development . . . . . 640--643
Sally Yeates Sedelow Language Analysis in the Humanities . . 644--647
Karl L. Zinn Computers in the instructional process:
directions for research and development 648--651
Gerald M. Sturman Computers and Urban Society . . . . . . 652--657
Gerard Salton Dynamic Document Processing . . . . . . 658--668
Donald E. Knuth Ancient Babylonian algorithms . . . . . 671--677
Friedrich L. Bauer and
H. Wössner The ``Plankalkül'' of Konrad Zuse: a
forerunner of today's programming
languages . . . . . . . . . . . . . . . 678--685
Richard E. Sprague A Western View of Computer History . . . 686--692
Franz L. Alt Archaeology of computers ---
reminiscences, 1945--1947 . . . . . . . 693--694
Allan Borodin and
C. C. Gotlieb Computers and Employment . . . . . . . . 695--702
John G. Herriot In Memory of George E. Forsythe . . . . 719--720
Donald E. Knuth George Forsythe and the development of
Computer Science . . . . . . . . . . . . 721--726
David Crowe Generating Parsers for Affix Grammars 728--734
Robert E. Helbig and
Patrick K. Orr and
Robert R. Roediger Political Redistricting by Computer . . 735--741
Arthur J. Benjamin Extensible Editor for a Small Machine
with Disk Storage . . . . . . . . . . . 742--747
Robert F. Rosin and
Gideon Frieder and
Richard H. Eckhouse, Jr. Environment for Research in
Microprogramming and Emulation . . . . . 748--760
P. H. Oden and
Gerald S. Shedler A Model of Memory Contention in a Paging
Machine . . . . . . . . . . . . . . . . 761--771
H. J. Bernstein and
H. T. Gladwin Compiling fixed-point multiplications 772--772
W. L. van der Poel Comment on the composition of semantics
in Algol 68 . . . . . . . . . . . . . . 772--772
Herbert J. Bernstein Compiling Fixed-Point Multiplications 772
James H. Morris, Jr. A Bonus from van Wijngaarden's Device 773--773
Peter R. Jones Comment on Average Binary Search Length 774--774
Ronald C. Read and
K. Harada A Note on the Generation of Rosary
Permutations. With a Response by K.
Harada . . . . . . . . . . . . . . . . . 775--775
W. Squire ACM Algorithm 429: Localization of the
Roots of a Polynomial [C2] . . . . . . . 776--777
Paul Walton Purdom, Jr. and
Edward F. Moore ACM Algorithm 430: Immediate
Predominators in a Directed Graph [H] 777--778
Karl N. Levitt and
William H. Kautz Cellular Arrays for the Solution of
Graph Problems . . . . . . . . . . . . . 789--801
Sakti P. Ghosh File Organization --- The Consecutive
Retrieval Property . . . . . . . . . . . 802--808
Moshe Mor and
T. Lamdan A New Approach to Automatic Scanning of
Contour Maps . . . . . . . . . . . . . . 809--812
Paul L. Richman Automatic Error Analysis for Determining
Precision . . . . . . . . . . . . . . . 813--817
Arunachalam Ravindran ACM Algorithm 431: A Computer Routine
for Quadratic and Linear Programming
Problems [H] . . . . . . . . . . . . . . 818--820
Richard H. Bartels and
G. W. Stewart ACM Algorithm 432: Solution of the
Matrix Equation \boldmath $AX+XB=C$ [F4] 820--826
Edward S. Deutsch Thinning Algorithms on Rectangular,
Hexagonal, and Triangular Arrays . . . . 827--837
James Gregory A Comparison of Floating Point Summation
Methods . . . . . . . . . . . . . . . . 838--838
Hatem M. Khalil The Eigenproblem of Block Tridiagonal
Matrices . . . . . . . . . . . . . . . . 839--839
David Lorge Parnas and
A. Nico Habermann and
R. C. Holt Comment on Deadlock Prevention Method 840--841
Richard Rubinstein and
Julian Feldman A controller for a Braille terminal . . 841--842
K. C. Tan On Foster's Information Storage and
Retrieval Using AVL Trees . . . . . . . 843--843
Edsger W. Dijkstra The Humble Programmer . . . . . . . . . 859--866
James B. Morris Demand Paging Through Utilization of
Working Sets on the Maniac II . . . . . 867--872
Joachim H. Ahrens and
Ulrich Dieter Computer Methods for Sampling from the
Exponential and Normal Distributions . . 873--882
Richard J. Hanson Integral Equations of Immunology . . . . 883--890
Robert F. Simmons and
Jonathan Slocum Generating English Discourse from
Semantic Networks . . . . . . . . . . . 891--905
Gert Dathe Conversion of Decision Tables by Rule
Mask Method without Rule Mask . . . . . 906--909
W. D. Frazer and
C. K. Wong Sorting by Natural Selection . . . . . . 910--913
A. P. Ershov Corrigendum: ``Aesthetics and the Human
Factor in Programming'' . . . . . . . . 913--913
Hiroshi Akima ACM Algorithm 433: Interpolation and
Smooth Curve Fitting Based on Local
Procedures [E2] . . . . . . . . . . . . 914--918
J. Douglas Robertson Remark on ``Algorithm 398: Tableless
Date Conversion'' . . . . . . . . . . . 918
Phyllis Fox Comparative Study of Computer Programs
for Integrating Differential Equations 941--948
Michael A. Malcolm Algorithms to Reveal Properties of
Floating-Point Arithmetic . . . . . . . 949--951
Merrell L. Patrick A Highly Parallel Algorithm for
Approximating All Zeros of a Polynomial
with Only Real Zeros . . . . . . . . . . 952--955
Henry F. Ledgard Model for Type Checking --- with an
Application to Algol 60 . . . . . . . . 956--966
Peter B. Henderson Derived Semantics for Some Programming
Language Constructs . . . . . . . . . . 967--973
M. Verhelst The Conversion of Limited-Entry Decision
Tables to Optimal and Near-Optimal
Flowcharts: Two New Algorithms . . . . . 974--980
H. D. Baecker Garbage Collection for Virtual Memory
Computer Systems . . . . . . . . . . . . 981--986
John S. Ramberg and
Bruce W. Schmeiser Approximate Method for Generating
Symmetric Random Variables . . . . . . . 987--990
David L. March ACM Algorithm 434: Exact Probabilities
for ${R\times{C}}$ Contingency Tables
[G2] . . . . . . . . . . . . . . . . . . 991--992
Wayne Fullerton ACM Algorithm 435: Modified Incomplete
Gamma Function [S14] . . . . . . . . . . 993--995
Vincent Y. Lum and
P. S. T. Yuen Additional results on key-to-address
transform techniques: a fundamental
performance study on large existing
formatted files . . . . . . . . . . . . 996--997
Steve Kennedy A Note on Optimal Doubly-Chained Trees 997--998
Murray A. Eisenberg and
Michael R. McGuire Further comments on Dijkstra's
concurrent programming control problem 999--999
Stephen W. Smoliar Comments on Moorer's Music and computer
composition . . . . . . . . . . . . . . 1000--1001
J. Richard Phillips and
H. C. Adams Dynamic Partitioning for Array Languages 1023--1032
Rudolf Bayer and
C. Witzgall Index Ranges for Matrix Calculi . . . . 1033--1039
Jay Earley and
Paul Caizergues Method for Incrementally Compiling
Languages with Nested Statement
Structure . . . . . . . . . . . . . . . 1040--1044
Fabrizio Luccio Weighted Increment Linear Search for
Scatter Tables . . . . . . . . . . . . . 1045--1047
Donald R. Barr and
Norman L. Sezak A Comparison of Multivariate Normal
Generators . . . . . . . . . . . . . . . 1048--1049
John Moore and
Prentiss Robinson New Method for the Solution of the
Cauchy Problem for Parabolic Equations 1050--1052
David Lorge Parnas On the Criteria To Be Used in
Decomposing Systems into Modules . . . . 1053--1058
P. J. Brown Levels of Language for Portable Software 1059--1062
Stephen Sherman and
Forest Baskett III and
James C. Browne Trace-Driven Modeling and Analysis of
CPU Scheduling in a Multiprogramming
System . . . . . . . . . . . . . . . . . 1063--1069
W. Robert Boland ACM Algorithm 436: Product Type
Trapezoidal Integration . . . . . . . . 1070--1070
W. Robert Boland ACM Algorithm 437: Product Type
Simpson's Integration [D1] . . . . . . . 1070--1071
W. Robert Boland ACM Algorithm 438: Product Type
Two-Point Gauss--Legendre--Simpson's
Integration [D1] . . . . . . . . . . . . 1071
Walter L. Sullins Certification of ``Algorithm 266:
Pseudo-Random Numbers [G5]'' . . . . . . 1072--1073
W. Robert Boland ACM Algorithm 439: Product Type
Three-point Gauss--Legendre--Simpson's
Integration [D1] . . . . . . . . . . . . 1072
P. Hallet and
E. Mund Certification of ``Algorithm 379:
Squank'' . . . . . . . . . . . . . . . . 1073
Ernst Schuegraf Remark on ``Algorithm 176: Least Squares
Surface Fit'' . . . . . . . . . . . . . 1073
Michael J. Frisch Remark on ``Algorithms 352, 385, 392:
Remarks on Characteristic Values and
Associated Solutions of Mathieu's
Differential Equation, Exponential
Integral, and Systems of Hyperbolic
P.D.E.'' . . . . . . . . . . . . . . . . 1074
D. R. T. Marshall Remark on ``Algorithm 394: Decision
Table Translation'' . . . . . . . . . . 1074
Ernst Schuegraf Remark on ``Algorithm 195: BANDSOLVE'' 1074
Richard M. Heiberger Remark on ``Algorithm 405: Roots of
Matrix Pencils'' . . . . . . . . . . . . 1075
Peter J. Denning and
Stuart C. Schwartz Corrigendum: ``Properties of the
working-set model'' . . . . . . . . . . 191--198
Gerald S. Shedler A Queuing Model of a Multiprogrammed
Computer with a Two-Level Storage System 3--10
Carter Bays The Reallocation of Hash-Coded Tables 11--14
James H. Morris, Jr. Protection in Programming Languages . . 15--21
Yoichi Muraoka and
David J. Kuck On the Time Required for a Sequence of
Matrix Products . . . . . . . . . . . . 22--26
E. B. James and
Derek P. Partridge Adaptive Correction of Program
Statements . . . . . . . . . . . . . . . 27--37
Paul L. Richman Variable-Precision Exponentiation . . . 38--40
C. R. Crawford Reduction of a Band-Symmetric
Generalized Eigenvalue Problem . . . . . 41--44
Sumner E. Blount and
Louis Fein The practical aspect of computer science
education --- discussion . . . . . . . . 45--46
Carter Bays A note on when to chain overflow items
within a direct-access table . . . . . . 46--47
M. Stella Atkins Mutual recursion in Algol 60 using
restricted compilers . . . . . . . . . . 47--48
L. J. Gallaher ACM Algorithm 440: A Multidimensional
Monte Carlo Quadrature with Adaptive
Stratified Sampling [D1] . . . . . . . . 49--50
Robert E. Knop ACM Algorithm 441: Random Deviates from
the Dipole Distribution [G5] . . . . . . 51--51
G. W. Hill and
A. W. Davis ACM Algorithm 442: Normal Deviate [S14] 51--52
R. D. Merrill Representation of Contours and Regions
for Efficient Computer Search . . . . . 69--82
Stefano Crespi-Reghizzi and
Michel A. Melkanoff and
L. Lichten The Use of Grammatical Inference for
Designing Programming Languages . . . . 83--90
James F. Gimpel A Theory of Discrete Patterns and Their
Implementation in SNOBOL4 . . . . . . . 91--100
J. Rokne Automatic Errorbounds for Simple Zeros
of Analytic Functions . . . . . . . . . 101--104
Richard P. Brent Reducing the Retrieval Time of Scatter
Storage Techniques . . . . . . . . . . . 105--109
Robert M. Graham and
Gerald J. Clancy, Jr. and
David B. DeVaney A Software Design and Evaluation System 110--116
Robert M. Balzer An Overview of the ISPL Computer System
Design . . . . . . . . . . . . . . . . . 117--122
Fred N. Fritsch and
R. E. Shafer and
W. P. Crowley ACM Algorithm 443: Solution of the
Transcendental Equation $w e^w = x$ [C5] 123--124
Richard H. Austing and
Gerald L. Engel A Computer Science Course Program for
Small Colleges . . . . . . . . . . . . . 139--147
Robert A. Wagner Common Phrases and Minimum-Space Text
Storage . . . . . . . . . . . . . . . . 148--152
Y. Feinroth and
E. Franceschini and
M. Goldstein Telecommunications Using a Front-End
Minicomputer . . . . . . . . . . . . . . 153--160
Charles D. Pack The Effects of Multiplexing on a
Computer-Communications System . . . . . 161--168
Richard W. Conway and
Thomas R. Wilcox Design and Implementation of a
Diagnostic Compiler for PL/I . . . . . . 169--179
Herbert E. Salzer Gray code and the $\pm$ sequence when
$\pm f(\pm f(\pm f(\cdots \pm f(x)
\cdots)))$ is ordered . . . . . . . . . 180--180
Abraham Bookstein On Harrison's Substring Testing
Technique . . . . . . . . . . . . . . . 180--181
William H. Payne Graduate Education: The Ph.D. Glut . . . 181--182
Robert A. Wagner ACM Algorithm 444: An Algorithm for
Extracting Phrases in a Space-Optimal
Fashion [Z] . . . . . . . . . . . . . . 183--185
Shi-Kuo Chang ACM Algorithm 445: Binary Pattern
Reconstruction from Projections [Z] . . 185--186
John Lau Remark on ``Algorithm 445: Binary
Pattern Reconstruction from Projections
[Z]'' . . . . . . . . . . . . . . . . . 186--186
Anthony Hassitt and
J. W. Lageschulte and
Leonard E. Lyon Implementation of a High Level Language
Machine . . . . . . . . . . . . . . . . 199--212
John G. Williams Asymmetric Memory Hierarchies . . . . . 213--222
H. Kuki and
W. J. Cody A Statistical Study of the Accuracy of
Floating Point Number Systems . . . . . 223--230
Walter A. Burkhard and
Robert M. Keller Some Approaches to Best-Match File
Searching . . . . . . . . . . . . . . . 230--236
James P. Strong, III and
Azriel Rosenfeld A Region Coloring Technique for Scene
Analysis . . . . . . . . . . . . . . . . 237--246
Juan Rodriguez-Rosell and
Jean-Pierre Dupuy The design, implementation, and
evaluation of a working set dispatcher 247--253
R. Broucke ACM Algorithm 446: Ten Subroutines for
the Manipulation of Chebyshev Series
[C1] . . . . . . . . . . . . . . . . . . 254--256
Larry C. Ragland and
Donald I. Good Certification of ``Algorithm 386:
Greatest Common Divisor of $n$ Integers
and Multipliers'' . . . . . . . . . . . 257--257
David Pager On the Problem of Communicating Complex
Information . . . . . . . . . . . . . . 275--281
David W. Low Programming by Questionnaire: an
Effective Way to Use Decision Tables . . 282--286
Peter J. H. King and
Roger G. Johnson Some Comments on the Use of Ambiguous
Decision Tables and Their Conversion to
Computer Programs . . . . . . . . . . . 287--290
John Salasin Hierarchical Storage in Information
Retrieval . . . . . . . . . . . . . . . 291--295
Derek G. Corneil and
C. C. Gotlieb and
Y. M. Lee Minimal Event-Node Network of Project
Precedence Relations . . . . . . . . . . 296--298
Andrew Mercer and
Azriel Rosenfeld An Array Grammar Programming System . . 299--305
Edward M. Reingold A Nonrecursive List Moving Algorithm . . 305--307
H. Vos Remark on ``Algorithm 300: Coulomb Wave
Functions'' . . . . . . . . . . . . . . 308--309
G. Bayer Maxflow . . . . . . . . . . . . . . . . 309--309
G. Bayer Remark on ``Algorithm 324: Maxflow'' . . 309
B. Holmgren and
D. Obradovi\'c and
Å. Kolm Remark on ``Algorithm 333: Minit
Algorithm for Linear Programming'' . . . 310--310
D. Obradovi\'c Remark on ``Algorithm 333: Minit
Algorithm for Linear Programming'' . . . 310--310
Jo Ann Howell Remark on ``Algorithm 406: Exact
Solution of Linear Equations Using
Residue Arithmetic'' . . . . . . . . . . 311--311
Arthur H. J. Sale Remark on ``Algorithm 408: A Sparse
Matrix Package'' . . . . . . . . . . . . 311--311
Robert E. Wheeler Remark on ``Algorithm 402: Increasing
the Efficiency of Quicksort'' . . . . . 311--311
M. K. Roy Reflection-free permutations, rosary
permutations and adjacent transposition
algorithms . . . . . . . . . . . . . . . 312--312
Mohit Kumar Roy Reflection-Free Permutations, Rosary
Permutations, and Adjacent Transposition
Algorithms . . . . . . . . . . . . . . . 312--313
Clyde H. McMorrow Concerning music and computer
composition in computational linguistics 313--313
Richard L. Wexelblat Another Comment on Computer Music . . . 313--314
Robert G. Estell A comment on the practical aspects of
computer science education . . . . . . . 314--315
Roger Fajman and
John Borgelt WYLBUR, An Interactive Text Editing and
Remote Job Entry System . . . . . . . . 314--322
Dennis J. Frailey A Practical Approach to Managing
Resources and Avoiding Deadlocks . . . . 323--329
Richard G. Hamlet Efficient multiprogramming resource
allocation and accounting . . . . . . . 337--342
Erol Gelenbe and
J. C. A. Boekhorst and
J. L. W. Kessels Minimizing Wasted Space in Partitioned
Segmentation . . . . . . . . . . . . . . 343--349
J. Carver Hill Synchronizing processors with
memory-content-generated interrupts . . 350--351
Harold S. Stone and
Samuel H. Fuller On the Near-Optimality of the
Shortest-Latency-Time-First Drum
Scheduling Discipline . . . . . . . . . 352--353
Peter F. Stockhausen Adapting optimal code generation for
arithmetic expressions to the
instruction sets available on
present-day computers . . . . . . . . . 353--354
Robert F. Ling A Computer Generated Aid for Cluster
Analysis . . . . . . . . . . . . . . . . 355--361
Ben Shneiderman Optimum Data Base Reorganization Points 362--365
Horst Strunz The development of decision tables via
parsing of complex decision situations 366--369
James R. Bell Threaded Code . . . . . . . . . . . . . 370--372
John E. Hopcroft and
Robert Endre Tarjan ACM Algorithm 447: Efficient Algorithms
for Graph Manipulation [H] . . . . . . . 372--378
Terry Beyer and
D. F. Swinehart ACM Algorithm 448: Number of
Multiply-Restricted Partitions [A1] . . 379--379
J. Ferguson and
P. A. Staley Least Squares Piecewise Cubic Curve
Fitting . . . . . . . . . . . . . . . . 380--382
W. D. Hoskins Cubic spline solutions to fourth-order
boundary value problems . . . . . . . . 382--385
Franz L. Alt and
Judith Yuni Kirk Computer Photocomposition of Technical
Text . . . . . . . . . . . . . . . . . . 386--391
Richard L. Nolan Managing the Computer Resource: A Stage
Hypothesis . . . . . . . . . . . . . . . 399--405
J. C. Huang A Note on Information Organization and
Storage . . . . . . . . . . . . . . . . 406--410
Edward W. Kozdrowicki and
Dennis W. Cooper COKO III: the Cooper-Koz Chess Program 411--427
John H. Howard, Jr. Mixed Solutions for the Deadlock Problem 427--430
Erol Gelenbe Distribution of a Program in Primary and
Fast Buffer Storage . . . . . . . . . . 431--434
Robert F. Rosin Teaching ``About Programming'' . . . . . 435--438
F. Warren McFarlan and
Richard L. Nolan Curriculum Recommendations for Graduate
Professional Programs in Information
Systems: Recommended Addendum on
Information Systems Administration . . . 439--441
Abraham Kandel Computer Science --- Seminars for
Undergraduates . . . . . . . . . . . . . 442--442
Gregor von Bochmann Multiple Exits from a Loop Without the
GOTO . . . . . . . . . . . . . . . . . . 443--444
Patrick A. V. Hall Equivalence Between AND/OR Graphs and
Context-Free Grammars . . . . . . . . . 444--445
Frantisek Fiala ACM Algorithm 449: Solution of Linear
Programming Problems in $0$-$1$
Variables [H1] . . . . . . . . . . . . . 445--447
Brian W. Kernighan Remark on ``Algorithm 422: Minimal
Spanning Tree'' . . . . . . . . . . . . 448--448
I. D. G. Macleod and
A. M. Collins Remark on ``Algorithm 420: Hidden-Line
Plotting Program'' . . . . . . . . . . . 448--448
Paul J. Nikolai Certification of ``Algorithm 407: DIFSUB
for Solution of Ordinary Differential
Equations'' . . . . . . . . . . . . . . 448--448
Michael H. Smith A Learning Program Which Plays
Partnership Dominoes . . . . . . . . . . 462--467
B. J. MacLennan Fen --- an Axiomatic Basis for Program
Semantics . . . . . . . . . . . . . . . 468--474
David Misunas Petri Nets and Speed Independent Design 474--481
Marek Machura and
Andrzej Mulawa ACM Algorithm 450: Rosenbrock Function
Minimization [E4] . . . . . . . . . . . 482--483
Richard B. Goldstein ACM Algorithm 451: Chi-Square Quantiles
[G1] . . . . . . . . . . . . . . . . . . 483--485
C. N. Liu and
D. T. Tang ACM Algorithm 452: Enumerating
Combinations of $m$ Out of $n$ Objects
[G6] . . . . . . . . . . . . . . . . . . 485--485
Robert Piessens ACM Algorithm 453: Gaussian Quadrature
Formulas for Bromwich's Integral [D1] 486--487
Joel A. Richardson and
J. L. Kuester ACM Algorithm 454: The Complex Method
for Constrained Optimization [E4] . . . 487--489
G. Andrejkova and
J. Vinar Remark and Certification on ``Algorithm
404: Complex Gamma Function'' . . . . . 489--489
Richard M. De Morgan Remark on ``Algorithm 357: An Efficient
Prime Number Generator [A1]'' . . . . . 489--489
Richard P. Watkins Remark on ``Algorithm 412: Graph
Plotter'' . . . . . . . . . . . . . . . 489--490
J. G. Byrne Hu-Tucker minimum redundancy alphabetic
coding method . . . . . . . . . . . . . 490--490
A. J. Good Clenshaw--Curtis quadrature . . . . . . 490--490
Edward J. Williams Remark on ``Algorithm 429: Localization
of the Roots of a Polynomial'' . . . . . 490--490
J. G. Byrne Remark on ``Algorithm 428: Hu-Tucker
Minimum Redundancy Alphabetic Coding
Method'' . . . . . . . . . . . . . . . . 490
Albert J. Good Remark on ``Algorithm 424:
Clenshaw--Curtis Quadrature'' . . . . . 490
Zohar Manna and
Stephen Ness and
Jean Vuillemin Inductive Methods for Proving Properties
of Programs . . . . . . . . . . . . . . 491--502
W. W. Peterson and
Tadao Kasami and
Nobuki Tokura On the Capabilities of While, Repeat,
and Exit Statements . . . . . . . . . . 503--512
Caxton C. Foster A Generalization of AVL Trees . . . . . 513--517
Jeffrey P. Buzen Computational Algorithms for Closed
Queueing Networks with Exponential
Servers . . . . . . . . . . . . . . . . 527--531
S. Ganapathy and
V. Rajaraman Information Theory Applied to the
Conversion of Decision Tables to
Computer Programs . . . . . . . . . . . 532--539
Alfonso F. Cardenas Evaluation and Selection of File
Organization --- A Model and System . . 540--548
Richard G. Casey Design of Tree Structures for Efficient
Querying . . . . . . . . . . . . . . . . 549--556
Juan Rodriguez-Rosell Empirical Working Set Behavior . . . . . 556--560
Geoffrey W. Gates and
David A. Poplawski A Simple Technique for Structured
Variable Lookup . . . . . . . . . . . . 561--565
Marvin V. Zelkowitz Reversible Execution . . . . . . . . . . 566--566
Robert E. Barnhill and
David T. Pilcher Sard kernels for certain bivariate
cubatures . . . . . . . . . . . . . . . 567--570
D. B. Hunter and
Julia M. Williams ACM Algorithm 455: Analysis of Skew
Representations of the Symmetric Group 571--572
Zden\vek Fencl ACM Algorithm 456: Routing Problem . . . 572--574
Coen Bron and
Joep Kerbosch ACM Algorithm 457: Finding All Cliques
of an Undirected Graph . . . . . . . . . 575--577
Mohit Kumar Roy Remark on ``Algorithm 323: Generation of
Permutations in Lexicographic Order
[G6]'' . . . . . . . . . . . . . . . . . 577--578
E. E. Lawrence Remark on ``Algorithm 408: A Sparse
Matrix Package'' . . . . . . . . . . . . 578--578
Hugh Williamson Remark on ``Algorithm 420: Hidden-Line
Plotting Program'' . . . . . . . . . . . 578--579
H. B. Driessen and
E. W. LeM. Hunt Remark on ``Algorithm 429: Localization
of the Roots of a Polynomial'' . . . . . 579--579
John S. McGeachie Multiple Terminals Under User Program
Control in a Time-Sharing Environment 587--590
Daniel G. Bobrow and
Ben Wegbreit A Model and Stack Implementation of
Multiple Environments . . . . . . . . . 591--603
Vincent Y. Lum General Performance Analysis of
Key-to-Address Transformation Methods
Using an Abstract File Concept . . . . . 603--612
Butler W. Lampson A Note on the Confinement Problem . . . 613--615
Daniel S. Hirschberg A Class of Dynamic Memory Allocation
Algorithms . . . . . . . . . . . . . . . 615--618
Barton G. Prieve Using Page Residency to Select the
Working Set Parameter . . . . . . . . . 619--620
Robert E. Millstein Control Structures in Illiac IV Fortran 621--627
Charles J. Mifsud and
Michael J. Bohlen Addendum to a Multiple-Precision
Division Algorithm . . . . . . . . . . . 628
P. D. Robers and
S. S. Robers ACM Algorithm 458: Discrete Linear
${L}_1$ Approximation by Interval Linear
Programming [E2] . . . . . . . . . . . . 629--631
Maciej M. Syslo ACM Algorithm 459: The Elementary
Circuits of a Graph [H] . . . . . . . . 632--633
Paul E. Saylor and
James D. Sebastian ACM Algorithm 460: Calculation of
Optimum Parameters for Alternating
Direction Implicit Procedures [D3] . . . 633--635
Forbes J. Burkowski and
W. D. Hoskins ACM Algorithm 461: Cubic Spline
Solutions to a Class of Functional
Differential Equations [D2] . . . . . . 635--637
Thomas G. Donnelly ACM Algorithm 462: Bivariate Normal
Distribution [S15] . . . . . . . . . . . 638--638
C. R. Lewart ACM Algorithm 463: Algorithms SCALE1,
SCALE2, and SCALE3 for Determination of
Scales on Computer Generated Plots [J6] 639--640
Charles W. Bachman The Programmer as Navigator . . . . . . 653--658
Robert S. Fabry Dynamic Verification of Operating System
Decisions . . . . . . . . . . . . . . . 659--668
M. Dennis Mickunas and
Victor B. Schneider A Parser-Generating System for
Constructing Compressed Compilers . . . 669--676
B. W. Jordan, Jr. and
R. C. Barrett Scan Conversion Algorithm with Reduced
Storage Requirements . . . . . . . . . . 676--682
James R. Slagle and
Lewis M. Norton Experiments with an Automatic
Theorem-Prover Having Partial Ordering
Inference Rules . . . . . . . . . . . . 682--688
Christian H. Reinsch ACM Algorithm 464: Eigenvalues of a
Real, Symmetric, Tridiagonal Matrix [F2] 689--689
G. W. Hill ACM Algorithm 465: Student's $t$
Frequency [S14] . . . . . . . . . . . . 690--690
Gideon Ehrlich ACM Algorithm 466: Four Combinatorial
Algorithms [G6] . . . . . . . . . . . . 690--691
Norman Brenner ACM Algorithm 467: Matrix Transposition
in Place [F1] . . . . . . . . . . . . . 692--694
T. N. L. Patterson ACM Algorithm 468: Algorithm for
Automatic Numerical Integration Over a
Finite Interval [D1] . . . . . . . . . . 694--699
C. Lam and
J. McKay ACM Algorithm 469: Arithmetic Overa
Finite Field [A1] . . . . . . . . . . . 699--699
Peter J. Denning and
G. Scott Graham A Note on Subexpression Ordering in the
Evaluation of Arithmetic Expressions . . 700--702
Jerome A. Feldman and
James R. Low and
R. P. Brent Comment on Brent's scatter storage
algorithm (and author's reply) . . . . . 703--703
Eberhard Wegner Tree-Structured Programs . . . . . . . . 704--705
Herbert E. Salzer A recurrence scheme for converting from
one orthogonal expansion into another 705--707
Frank Stenger An algorithm for the approximate
solution of Wiener--Hopf integral
equations . . . . . . . . . . . . . . . 708--710
Louis W. Ehrlich Solving the Biharmonic Equation in a
Square: a Direct Versus a Semidirect
Method . . . . . . . . . . . . . . . . . 711--714
J. Daniel Couger Curriculum Recommendations for
Undergraduate Programs in Information
Systems . . . . . . . . . . . . . . . . 727--749
Edgar H. Sibley and
Robert W. Taylor A Data Definition and Mapping Language 750--759
Milan Kubicek ACM Algorithm 470: Linear Systems with
Almost Tridiagonal Matrix [F4] . . . . . 760--761
Walter Gautschi ACM Algorithm 471: Exponential Integrals
[S13] . . . . . . . . . . . . . . . . . 761--763
John G. Herriot and
Christian H. Reinsch ACM Algorithm 472: Procedures for
Natural Spline Interpolation [E1] . . . 763--768
Gordon Lyon Syntax-directed least-errors analysis
for context-free languages: a practical
approach . . . . . . . . . . . . . . . . 3--14
Michael A. Malcolm and
John Palmer A fast method for solving a class of
tridiagonal linear systems . . . . . . . 14--17
Hiroshi Akima A method of bivariate interpolation and
smooth surface fitting based on local
procedures . . . . . . . . . . . . . . . 18--20
Norman E. Gibbs and
William G. Poole, Jr. Tridiagonalization by Permutations . . . 20--24
Robert Piessens ACM Algorithm 473: Computation of
Legendre Series Coefficients [C6] . . . 25--25
Hiroshi Akima ACM Algorithm 474: Bivariate
Interpolation and Smooth Surface Fitting
Based on Local Procedures [E2] . . . . . 26--31
Ivan E. Sutherland and
Gary W. Hodgman Reentrant Polygon Clipping . . . . . . . 32--42
Peter J. H. King and
Roger G. Johnson Comments on the algorithms of Verhelst
for the conversion of limited-entry
decision tables to flowcharts (and
author's reply) . . . . . . . . . . . . 43--45
Gary D. Knott A Numbering System for Combinations . . 45--46
Henry C. Lucas, Jr. A CRT Report Generating System . . . . . 47--48
James B. Rothnie, Jr. and
Tomas Lozano Attribute Based File Organization in a
Paged Memory Environment . . . . . . . . 63--69
B. W. Jordan, Jr. and
R. C. Barrett A Cell Organized Raster Display for Line
Drawings . . . . . . . . . . . . . . . . 70--77
John S. Ramberg and
Bruce W. Schmeiser An Approximate Method for Generating
Asymmetric Random Variables . . . . . . 78--82
Leslie Lamport The Parallel Execution of DO Loops . . . 83--93
Henry F. Ledgard Production Systems: or can we do better
than BNF? . . . . . . . . . . . . . . . 94--102
Ben Wegbreit The Synthesis of Loop Predicates . . . . 102--112
K. Sreenivasan and
A. J. Kleinman On the Construction of a Representative
Synthetic Workload . . . . . . . . . . . 127--133
E. Balkovich and
W. Chiu and
Leon Presser and
R. Wood Dynamic Memory Repacking . . . . . . . . 133--138
Howard Lee Morgan Optimal Space Allocation on Disk Storage
Devices . . . . . . . . . . . . . . . . 139--142
Rudolf Loeser Some Performance Tests of ``Quicksort''
and Descendants . . . . . . . . . . . . 143--152
Thomas Wright ACM Algorithm 475: Visible Surface
Plotting Program [J6] . . . . . . . . . 152--155
Nancy E. Bosten and
E. L. Battiste Remark on ``Algorithm 179: Incomplete
Beta Ratio'' . . . . . . . . . . . . . . 156--157
R. C. Barrett and
B. W. Jordan, Jr. Scan Conversion Algorithms for a Cell
Organized Raster Display . . . . . . . . 157--163
Arunachalam Ravindran Remark on ``Algorithm 431: A Computer
Routine for Quadratic and Linear
Programming Problems'' . . . . . . . . . 157
David H. Withers Remark on ``Algorithm 419: Zeros of a
Complex Polynomial'' . . . . . . . . . . 157
A. Frank Ackerman Quadratic Search for Hash Tables of Size
$p^n$ . . . . . . . . . . . . . . . . . 164--164
Stephen W. Smoliar Emotional Content Considered Dangerous 164--165
Harold S. Stone A note on a combinatorial problem of
Burnett and Coffman . . . . . . . . . . 165--166
Fred T. Krogh Efficient Implementation of a Variable
Projection Algorithm for Nonlinear Least
Squares Problems . . . . . . . . . . . . 167--169
Jerome H. Saltzer A Simple Linear Model of Demand Paging
Performance . . . . . . . . . . . . . . 181--186
Mark A. Franklin and
R. K. Gupta Computation of Page Fault Probability
from Program Transition Diagram . . . . 186--191
John W. Boyse Execution Characteristics of Programs in
a Page-On-Demand System . . . . . . . . 192--196
Graham Smith and
Ian M. Sefton On Lions' Counter Example for Gotlieb's
Method for the Construction of School
Timetables . . . . . . . . . . . . . . . 196--197
Gary Lindstrom Copying List Structures Using Bounded
Workspace . . . . . . . . . . . . . . . 198--202
Shimon Even Parallelism in Tape-Sorting . . . . . . 202--204
Henry C. Lucas, Jr. and
David B. Montgomery and
Jean Claude Larreche A study of computer use in a graduate
school of business . . . . . . . . . . . 205--206
Peter Freeman and
Michael A. Malcolm and
William H. Payne Graduate Education: The Ph.D. Glut:
Response and Rebuttal . . . . . . . . . 206--207
Theodor D. Sterling and
Seymour V. Pollack Ideal teaching machines --- a solution
to the pedagogic language problem . . . 207--208
Paul W. Abrahams Some Remarks on Lookup of Structured
Variables . . . . . . . . . . . . . . . 209--210
Grover C. Simmons Addendum to M. L. Patrick Paper . . . . 209
A. Balfour An alternative approach to mutual
recursion in Algol 60 using restricted
compilers . . . . . . . . . . . . . . . 210--210
R. C. T. Lee and
C. L. Chang and
Richard J. Waldinger An Improved Program-Synthesizing
Algorithm and its Correctness . . . . . 211--217
A. K. Cline Scalar- and Planar-Valued Curve Fitting
Using Splines Under Tension. I . . . . . 218--220
A. K. Cline ACM Algorithm 476: Six Subprograms for
Curve Fitting Using Splines Under
Tension [E2] . . . . . . . . . . . . . . 220--223
Gideon Ehrlich ACM Algorithm 477: Generator of
Set-Partitions to Exactly $R$ Subsets
[G7] . . . . . . . . . . . . . . . . . . 224--225
Bo Einarsson Remark on ``Algorithm 443: Solution of
the Transcendental Equation
$w\exp(w)=x$'' . . . . . . . . . . . . . 225--225
Mary Shaw Reduction of Compilation Costs Through
Language Contraction . . . . . . . . . . 245--250
Ben Wegbreit The Treatment of Data Types in EL1 . . . 251--264
Robert A. Wagner Order-$n$ Correction for Regular
Languages . . . . . . . . . . . . . . . 265--268
Nai Kuan Tsao On the Distributions of Significant
Digits and Roundoff Errors . . . . . . . 269--271
Marvin C. Wunderlich and
J. L. Selfridge Design for a Number Theory Package with
an Optimized Trial Division Routine . . 272--276
W. Morven Gentleman and
Scott B. Marovich More on Algorithms that Reveal
Properties of Floating Point Arithmetic
Units . . . . . . . . . . . . . . . . . 276--277
D. E. Gold and
David J. Kuck A Model for Masking Rotational Latency
by Dynamic Disk Allocation . . . . . . . 278--288
Jacques Cohen and
Carl Zuckerman Two Languages for Estimating Program
Efficiency . . . . . . . . . . . . . . . 301--308
Lawrence J. Henschen and
Ross A. Overbeek and
Larry Wos A Theorem-Proving Language for
Experimentation . . . . . . . . . . . . 308--314
James F. Gimpel The Minimization of
Spatially-Multiplexed Character Sets . . 315--318
I. Barrodale and
F. D. K. Roberts ACM Algorithm 478: Solution of an
Overdetermined System of Equations in
the $L_1$ Norm [F4] . . . . . . . . . . 319--320
R. L. Page ACM Algorithm 479: A Minimal Spanning
Tree Clustering Method [Z] . . . . . . . 321--323
B. Gaither Hidden-line plotting program . . . . . . 324--324
Robert Piessens Remark on ``Algorithm 418: Calculation
of Fourier Integrals'' . . . . . . . . . 324--324
Robert Piessens Remark on ``Algorithm 400: Modified
Haåvie Integration'' . . . . . . . . . . 324--324
T. M. R. Ellis Remark on ``Algorithm 420: Hidden-Line
Plotting Program'' . . . . . . . . . . . 324--325
Blaine Gaither Remark on ``Algorithm 420: Hidden-Line
Plotting Program'' . . . . . . . . . . . 324
R. L. Page Remark on ``Algorithm 425: Generation of
Random Correlated Normal Variables'' . . 325--325
D. M. Boulton Remark on ``Algorithm 434: Exact
Probabilities for $R \times C$
Contingency Tables'' . . . . . . . . . . 326--326
William D. Slysz An Evaluation of Statistical Software in
the Social Sciences . . . . . . . . . . 326--332
John Adams and
John Gary Compact Representation of Contour Plots
for Phone Line Transmission . . . . . . 333--336
William A. Wulf and
Ellis S. Cohen and
William M. Corwin and
Anita K. Jones and
Roy Levin and
C. Pierson and
Fred J. Pollack HYDRA: The Kernel of a Multiprocessor
Operating System . . . . . . . . . . . . 337--345
Ian J. Barton and
Susan E. Creasey and
Michael F. Lynch and
Michael J. Snell An Information-Theoretic Approach to
Text Searching in Direct Access Systems 345--350
Edward Minieka On Computing Sets of Shortest Paths in a
Graph . . . . . . . . . . . . . . . . . 351--353
Dennis M. Ritchie and
Ken Thompson The UNIX Time-Sharing System . . . . . . 365--375
Samuel H. Fuller Minimal-Total-Processing Time Drum and
Disk Scheduling Disciplines . . . . . . 376--381
John L. Bruno and
Edward G. Coffman, Jr. and
Ravi Sethi Scheduling Independent Tasks To Reduce
Mean Finishing Time . . . . . . . . . . 382--387
Jerome H. Saltzer Protection and the Control of
Information Sharing in Multics . . . . . 388--402
Robert S. Fabry Capability-Based Addressing . . . . . . 403--412
Gerald J. Popek and
Robert P. Goldberg Formal Requirements for Virtualizable
Third Generation Architectures . . . . . 412--421
Bruce Hahn A New Technique for Compression and
Storage of Data . . . . . . . . . . . . 434--436
Arthur Evans, Jr. and
William Kantrowitz and
Edwin Weiss A User Authentication Scheme Not
Requiring Secrecy in the Computer . . . 437--442
George B. Purdy A High Security Log-in Procedure . . . . 442--445
Theodore D. Friedman and
Lance J. Hoffman Execution Time Requirements for
Encipherment Programs . . . . . . . . . 445--449
G. A. Neufeld and
John Tartar Graph Coloring Conditions for the
Existence of Solutions to the Timetable
Problem . . . . . . . . . . . . . . . . 450--453
Leslie Lamport A New Solution of Dijkstra's Concurrent
Programming Problem . . . . . . . . . . 453--455
John C. Cavouras On the Conversion of Programs to
Decision Tables: Method and Objectives 456--462
Tom Lyche and
Larry L. Schumaker ACM Algorithm 480: Procedures for
computing Smoothing and Interpolating
Natural Splines [E1] . . . . . . . . . . 463--467
Keith C. Crandall ACM Algorithm 481: Arrow to Precedence
Network Transformation [H] . . . . . . . 467--469
John McKay and
E. Regener ACM Algorithm 482: Transitivity Sets
[G7] . . . . . . . . . . . . . . . . . . 470--470
Adhemar Bultheel Remark on ``Algorithm 450: Rosenbrock
Function Minimization'' . . . . . . . . 470
A. H. Stroud Gauss Harmonic Interpolation Formulas 471--475
Kenneth D. Shere Remark on ``Algorithm 454: The Complex
Method for Constrained Optimization'' 471
Rolf O. E. Lagerlöf Interpolation with Rounded Ramp
Functions . . . . . . . . . . . . . . . 476--479
Forman S. Acton Recurrence Relations for the Fresnel
Integral
$\int_0^\infty[\exp(-ct)dt/(t)^{1/2}(1+t^2)]$ and Similar Integrals 480--481
Daniel D. McCracken A Problem-List of Issues Concerning
Computers and Public Policy --- A Report
of the ACM Commitee on Computers and
Public Policy . . . . . . . . . . . . . 495--503
I. M. Willers A New Integration Algorithm for Ordinary
Differential Equations Based on
Continued Fraction Approximations . . . 504--508
Oliver Aberth A Precise Numerical Analysis Program . . 509--513
To-yat. Cheung Interactive Graphic Display for Region
Partitioning by Linear Programming . . . 513--516
Mario Schkolnick The Equivalence of Reducing Transition
Languages and Deterministic Languages 517--519
Steven L. Watkins ACM Algorithm 483: Masked
Three-Dimensional Plot Program with
Rotations [J6] . . . . . . . . . . . . . 520--523
Keith H. Burrell ACM Algorithm 484: Evaluation of the
Modified Bessel Functions ${K}_0(z)$ and
${K}_1(z)$ for Complex Arguments [S17] 524--526
Harold D. Eidson and
Larry L. Schumaker ACM Algorithm 485: Computation of
$g$-Splines via a Factorization Method
[E2] . . . . . . . . . . . . . . . . . . 526--530
John W. Young A First Order Approximation to the
Optimal Checkpoint Interval . . . . . . 530--531
Keith Shwayder Extending the Information Theory
Approach to Converting Limited-Entry
Decision Tables to Computer Programs . . 532--537
C. A. R. Hoare Monitors: An Operating System
Structuring Concept . . . . . . . . . . 549--557
Kenneth K. Shen and
James L. Peterson A Weighted Buddy Method for Dynamic
Storage Allocation . . . . . . . . . . . 558--562
Donald R. Slutz and
Irving L. Traiger A note on the calculation of average
working set size . . . . . . . . . . . . 563--565
Ben Shneiderman and
Peter Scheuermann Structured Data Structures . . . . . . . 566--574
R. H. Canaday and
R. D. Harrison and
Evan L. Ivie and
J. L. Ryder and
L. A. Wehr A Back-end Computer for Data Base
Management . . . . . . . . . . . . . . . 575--582
A. Charnes and
W. M. Raike and
J. D. Stutz and
A. S. Walters On Generation of Test Problems for
Linear Programming Codes . . . . . . . . 583--586
Francoise Veillon ACM Algorithm 486: Numerical Inversion
of Laplace Transform . . . . . . . . . . 587--589
Henk Koppelaar Certification and Remark on ``Algorithm
191: Hypergeometric'' . . . . . . . . . 589--590
L. G. Proll Remark on ``Algorithm 431: A Computer
Routine for Quadratic and Linear
Programming Problems'' . . . . . . . . . 590--590
Jiri Klemes and
Jaroslav Klemsa Remark on ``Algorithm 450: Rosenbrock
Function Minimization'' . . . . . . . . 590--591
Fred T. Krogh Errata: ``Efficient Implementation of a
Variable Projection Algorithm for
Nonlinear Least Squares'' . . . . . . . 591--591
Bruce Gilchrist and
Richard E. Weber Enumerating Full-Time Programmers . . . 592--593
Theodor D. Sterling Guidelines for Humanizing Computerized
Information Systems, A Report from
Stanley House . . . . . . . . . . . . . 609--613
Domenico Ferrari Improving Locality by Critical Working
Sets . . . . . . . . . . . . . . . . . . 614--620
Perry Lowell Miller A Locally-Organized Parser for Spoken
Input . . . . . . . . . . . . . . . . . 621--630
Gary M. Rader Method for Composing Simple Traditional
Music by Computer . . . . . . . . . . . 631--638
R. A. Freiburghouse Register Allocation Via Usage Counts . . 638--642
Edsger W. Dijkstra Self-stabilizing Systems in Spite of
Distributed Control . . . . . . . . . . 643--644
J. A. Brown and
Bernard Werner An On-Site Data Management System
Application in Field Archaeology . . . . 644--646
David R. Hanson A simple technique for representing
strings in Fortran IV . . . . . . . . . 646--647
C. J. Van Rijsbergen The Best-Match Problem in Document
Retrieval . . . . . . . . . . . . . . . 648--649
R. V. Evans Multiple exits from a loop using neither
GO TO nor labels . . . . . . . . . . . . 650--650
Donald E. Knuth Computer Programming as an Art . . . . . 667--673
Laurance I. Press Arguments for a Moratorium on the
Construction of a Community Information
Utility . . . . . . . . . . . . . . . . 674--678
Jon C. Strauss An analytic model of the Hasp execution
task monitor . . . . . . . . . . . . . . 679--685
Thomas L. Adam and
K. Mani Chandy and
J. R. Dickson A Comparison of List Schedules for
Parallel Processing Systems . . . . . . 685--690
N. D. Wallace Computer Generation of Gamma Random
Variates with Non-Integral Shape
Parameters . . . . . . . . . . . . . . . 691--695
A. Salazar and
R. V. Oakford A Graph Formulation of a School
Scheduling Algorithm . . . . . . . . . . 696--698
Sherwood C. Chu and
Mones Berman An Exponential Method for the Solution
of Systems of Ordinary Differential
Equations . . . . . . . . . . . . . . . 699--702
John Pomeranz ACM Algorithm 487: Exact Cumulative
Distribution of the Kolmogorov--Smirnov
Statistic for Small Samples . . . . . . 703--704
Richard P. Brent ACM Algorithm 488: A Gaussian
pseudo-random number generator [G5] . . 704--706
C. Bron Remark on ``Algorithm 426: Merge Sort
Algorithm'' . . . . . . . . . . . . . . 706
T. M. R. Ellis Remark on ``Algorithm 420: Hidden-Line
Plotting Program'' . . . . . . . . . . . 706
Gerhard Tesch Remark on ``Algorithm 456: Routing
Problem'' . . . . . . . . . . . . . . . 706
C. William Skinner Heuristic Approach to Inductive
Inference in Fact Retrieval Systems . . 707--712
Ralph A. Willoughby Special Issue Honoring Alston S.
Householder --- Editor's Foreword . . . 3
Aaron Finerman Professionalism in the Computing Field 4--9
Friedrich L. Bauer Positivity and Norms . . . . . . . . . . 9--13
John Todd The Lemniscate Constants . . . . . . . . 14--19
G. Peters and
James Hardy Wilkinson On the Stability of Gauss--Jordan
Elimination with Pivoting . . . . . . . 20--24
Garrett Birkhoff Two Hadamard Numbers for Matrices . . . 25--29
A. van der Sluis Perturbations of Eigenvalues of
Non-Normal Matrices . . . . . . . . . . 30--36
Marvin Marcus and
Herbert Robinson Elementary Divisors of Tensor Products 36--39
Magnus R. Hestenes Pseudoinverses and Conjugate Gradients 40--43
Harlan D. Mills The New Math of Computer Programming . . 43--48
Tien Chi Chen and
Irving T. Ho Storage-Efficient Representation of
Decimal Data . . . . . . . . . . . . . . 49--52
Werner Liniger Connections Between Accuracy and
Stability Properties of Linear Multistep
Formulas . . . . . . . . . . . . . . . . 53--56
Richard J. Hanson Stably Updating Mean and Standard
Deviation of Data . . . . . . . . . . . 57--58
G. J. Burnett and
Edward G. Coffman, Jr. Analysis of Interleaved Memory Systems
Using Blockage Buffers . . . . . . . . . 91--95
Neil M. Goldman Sentence Paraphrasing from a Conceptual
Base . . . . . . . . . . . . . . . . . . 96--106
Gordon J. van der Brug and
Jack Minker State-Space, Problem-Reduction, and
Theorem Proving --- Some Relationships 107--115
Ove Skovgaard Remark on ``Algorithm 332: Jacobi
Polynomials'' . . . . . . . . . . . . . 116--117
William J. Knight Certification of ``Algorithm 451:
Chi-Square Quantiles'' . . . . . . . . . 116
T. W. Hancock Remark on ``Algorithm 434: Exact
Probabilities for $R \times C$
Contingency Tables'' . . . . . . . . . . 117--119
H. S. Magnuski Remark on ``Algorithm 479: A Minimal
Spanning Tree Clustering Method'' . . . 119
Maciej M. Syslo Remark on ``Algorithm 459: The
Elementary Circuits of a Graph'' . . . . 119
Carolyn Kimme and
Dana Ballard and
Jack Sklansky Finding Circles by an Array of
Accumulators . . . . . . . . . . . . . . 120--122
John McCarthy ACM Forum: Proposed Criterion for a
Cipher to be Probable-Word-Proof . . . . 131--132
H. C. Johnston and
C. A. R. Hoare Matrix Reduction --- an Efficient Method
(school timetables) . . . . . . . . . . 141--150
Brian W. Kernighan and
Lorinda L. Cherry A System for Typesetting Mathematics . . 151--157
Duncan H. Lawrie and
T. Layman and
D. Baer and
J. M. Randal GLYPNIR --- A programming language for
Illiac IV . . . . . . . . . . . . . . . 157--164
Robert W. Floyd and
Ronald L. Rivest Expected Time Bounds for Selection . . . 165--172
Robert W. Floyd and
Ronald L. Rivest ACM Algorithm 489: The Algorithm SELECT
--- for Finding the $i$th Smallest of
$n$ Elements [M1] . . . . . . . . . . . 173--173
Jerry D. Whitt and
A. Gale Sullenberger The Algorithm Sequential Access Method:
An Alternative to Index Sequential . . . 174--176
Richard Alan Karp A Reply to Gentleman and Marovich . . . 174
A. M. Erisman and
W. F. Tinney On Computing Certain Elements of the
Inverse of a Sparse Matrix . . . . . . . 177--179
L. F. Shampine Discrete Least Squares Polynomial Fits 179--180
A. van der Sluis Corrigendum: ``Perturbations of
eigenvalues of non-normal matrices'' . . 180
David Lorge Parnas On a Solution to the Cigarette Smoker's
Problem (Without Conditional Statements) 181--183
Jack A. Chambers and
Ray V. Poore Computer Networks in Higher Education:
Socio-Economic-Political Factors . . . . 193--199
E. S. Ginsberg and
Dorothy Zaborowski ACM Algorithm 490: The Dilogarithm
Function of a Real Argument [S22] . . . 200--202
K. K. Shen and
J. L. Peterson Corrigendum: ``A Weighted Buddy Method
for Dynamic Storage Allocation'' . . . . 202--202
Lawrence W. Frederick Remark on ``Algorithm 475'': Visible
Surface Plotting Program [J6] . . . . . 202
Graham Smith On Maintenance of the Opportunity List
for Class-Teacher Timetable Problems . . 203--208
I. C. Braid The Synthesis of Solids Bounded by Many
Faces . . . . . . . . . . . . . . . . . 209--216
Vladimir Batagelj Quadratic Hash Method When the Table
Size is not a Prime Number . . . . . . . 216--217
Henry S. Warren, Jr. A Modification of Warshall's Algorithm
for the Transitive Closure of Binary
Relations . . . . . . . . . . . . . . . 218--220
James A. Hinds Algorithm for Locating Adjacent Storage
Blocks in the Buddy System . . . . . . . 221--222
Jean G. Vaucher and
Pierre Duval A Comparison of Simulation Event List
Algorithms . . . . . . . . . . . . . . . 223--230
Robert R. Korfhage and
David W. Matula On Salazar and Oakford . . . . . . . . . 240--240
Michael R. Garey and
David S. Johnson On Salazar and Oakford . . . . . . . . . 240--241
David A. Fisher Copying Cyclic List Structures in Linear
Time Using Bounded Workspace . . . . . . 251--252
Alfonso F. Cardenas Analysis and Performance of Inverted
Data Base Structures . . . . . . . . . . 253--263
Yorick Wilks An intelligent analyzer and understander
of English . . . . . . . . . . . . . . . 264--274
Norman E. Gibbs ACM Algorithm 491: Basic Cycle
Generation [H] . . . . . . . . . . . . . 275--276
Robert Piessens and
Irene Mertens Remark and Certification on ``Algorithm
446: Ten Subroutines for the
Manipulation of Chebyshev Series'' . . . 276--276
R. G. Mashburn Remark on ``Algorithm 475: Visible
Surface Plotting Program'' . . . . . . . 276--277
C. J. Doran Remark on ``Algorithm 475: Visible
Surface Plotting Program'' . . . . . . . 277
Fred N. Fritsch and
Alan C. Hindmarsh Remark on ``Algorithm 478: Solution of
an Overdetermined System of Equations in
the $L_1$ Norm'' . . . . . . . . . . . . 277
D. J. Evans and
Michael Hatzopoulos A note on the LU factorization of a
symmetric matrix . . . . . . . . . . . . 278--279
B. L. Fox More on $k$th Shortest Paths . . . . . . 279--279
Anthony I. Wasserman A Problem-List of Public Policy Issues
Concerning Computers and Health Care . . 279--280
Harlan D. Mills Corrigendum: ``The New Math of Computer
Programming'' . . . . . . . . . . . . . 280--280
Steven L. Horowitz Syntactic Algorithm for Peak Detection
in Waveforms with Applications to
Cardiography . . . . . . . . . . . . . . 281--285
Charles E. Pfefferkorn Heuristic Problem Solving Design System
for Equipment or Furniture Layouts . . . 286--297
Robert R. Korfhage and
David W. Matula More on the Salazar and Oakford Paper 303--303
Norman E. Gibbs ACM Algorithm 492: Generation of All the
Cycles of a Graph from a Set of Basic
Cycles [H] . . . . . . . . . . . . . . . 310--310
Bui Tuong Phong Illumination for Computer Generated
Pictures . . . . . . . . . . . . . . . . 311--317
Vincent Y. Lum and
Michael E. Senko and
C. P. Wang and
H. Ling A Cost Oriented Algorithm for Data Set
Allocation in Storage Hierarchies . . . 318--322
Alan F. Babich and
John Grason and
David Lorge Parnas Significant Event Simulation . . . . . . 323--329
Robert B. K. Dewar Indirect Threaded Code . . . . . . . . . 330--331
Ben Cranston and
Rick Thomas Simplified Recombination Scheme for the
Fibonacci Buddy System . . . . . . . . . 331--332
Alfred V. Aho and
Margaret J. Corasick Efficient String Matching: an Aid to
Bibliographic Search . . . . . . . . . . 333--340
Daniel S. Hirschberg A Linear Space Algorithm for Computing
Maximal Common Subsequences . . . . . . 341--343
Stephen Soule Addition in an Arbitrary Base Without
Radix Conversion . . . . . . . . . . . . 344--346
L. H. Harper and
T. H. Payne and
John E. Savage and
E. Straus Sorting $X + Y$ . . . . . . . . . . . . 347--349
F. Paul Wyman Improved Event-Scanning Mechanisms for
Discrete Event Simulation . . . . . . . 350--353
Donald E. Knuth and
Charles T. Zahn, Jr. Ill-Chosen Use of ``Event'' . . . . . . 360--360
P. J. Courtois Decomposability, Instabilities, and
Saturation in Multiprogramming Systems 371--377
Sòren Lauesen A Large Semaphore Based Operating System 377--389
Naomi Sager and
Ralph Grishman Restriction Language for Computer
Grammars of Natural Language . . . . . . 390--400
David Lorge Parnas and
Daniel P. Siewiorek Use of the Concept of Transparency in
the Design of Hierarchically Structured
Systems . . . . . . . . . . . . . . . . 401--408
Herbert Freeman and
Ruth Shapira Determining the Minimum-Area Encasing
Rectangle for an Arbitrary Closed Curve 409--413
Daniel G. Bobrow A Note on Hash Linking . . . . . . . . . 413--415
Richard E. Weber and
Bruce Gilchrist Discrimination in the employment of
women in the computer industry . . . . . 416--418
John E. Shore On the External Storage Fragmentation
Produced by First-Fit and Best-Fit
Allocation Strategies . . . . . . . . . 433--440
Alfred V. Aho and
Stephen C. Johnson and
Jeffrey D. Ullman Deterministic Parsing of Ambiguous
Grammars . . . . . . . . . . . . . . . . 441--452
Edsger W. Dijkstra Guarded Commands, Nondeterminacy and
Formal Derivation of Programs . . . . . 453--457
Ira W. Cotton Remark on stably updating mean and
standard deviation of data . . . . . . . 458--458
Stuart C. Shapiro and
Stanley C. Kwasny Interactive Consulting via Natural
Language . . . . . . . . . . . . . . . . 459--462
John Todd Corrigendum: ``The Lemniscate
Constants'' . . . . . . . . . . . . . . 462--462
J. G. Vaucher and
P. Duval Corrigendum: ``A comparison of
simulation event list algorithms'' . . . 462--462
Alan Jay Smith Comments on a paper by T. C. Chen and I.
T. Ho . . . . . . . . . . . . . . . . . 463--463
A. J. Smith Comments on a paper by T. C. Chen and I.
T. Ho . . . . . . . . . . . . . . . . . 463--463
Sakti P. Ghosh Consecutive Storage of Relevant Records
with Redundancy . . . . . . . . . . . . 464--471
Leslie Lamport Multiple Byte Processing with Full-Word
Instructions . . . . . . . . . . . . . . 471--475
Keith Shwayder Combining Decision Rules in a Decision
Table . . . . . . . . . . . . . . . . . 476--480
Guy L. Steele, Jr. Multiprocessing Compactifying Garbage
Collection . . . . . . . . . . . . . . . 495--508
Jon Louis Bentley Multidimensional Binary Search Trees
Used for Associative Searching . . . . . 509--517
R. Mark Claudson Digital Simulation of River Plankton
Population Dynamics . . . . . . . . . . 517--523
William F. Piepmeier Optimal Balancing of I/O Requests to
Disks . . . . . . . . . . . . . . . . . 524--527
Ben Wegbreit Mechanical Program Analysis . . . . . . 528--539
Rob Gerritsen A Preliminary System for the Design of
DBTG Data Structures . . . . . . . . . . 551--557
Nan C. Shu and
Barron C. Housel and
Vincent Y. Lum CONVERT: A High Level Translation
Definition Language for Data Conversion 557--567
T. Sterling and
V. Lum and
N. Shu and
B. Housel \em CONVERT: A High Level Translation
Definition Language for Data Conversion 557--567
John Miles Smith and
Philip Yen-Tang Chang Optimizing the Performance of a
Relational Algebra Data Base Interface 568--579
Morton M. Astrahan and
Donald D. Chamberlin Implementation of a Structured English
Query Language . . . . . . . . . . . . . 580--588
Fanica Gavril Merging with Parallel Processors . . . . 588--591
Martin Reiser and
H. Kobayashi Horner's Rule for the Evaluation of
General Closed Queueing Networks . . . . 592--593
Gerard Salton and
A. Wong and
C. S. Yang A Vector Space Model for Automatic
Indexing . . . . . . . . . . . . . . . . 613--620
Raymond F. Boyce and
Donald D. Chamberlin and
W. Frank King III and
Michael M. Hammer Specifying Queries as Relational
Expressions: The SQUARE Data Sublanguage 621--628
Henry F. Ledgard and
Michael Marcotty A Genealogy of Control Structures . . . 629--639
Susan L. Graham and
Steven P. Rhodes Practical Syntactic Error Recovery . . . 639--650
James R. Bitner and
Edward M. Reingold Backtrack Programming Techniques . . . . 651--656
Lawrence T. Kou and
C. K. Wong A Note on the Set Basis Problem Related
to the Compaction of Character Sets . . 656--657
Peter Naur Programming Languages, Natural
Languages, and Mathematics . . . . . . . 676--683
John B. Goodenough Exception Handling: Issues and a
Proposed Notation . . . . . . . . . . . 683--696
Mehdi Jazayeri and
William F. Ogden and
William C. Rounds The Intrinsically Exponential Complexity
of the Circularity Problem for Attribute
Grammars . . . . . . . . . . . . . . . . 697--706
Harry B. Hunt, III and
Thomas G. Szymanski and
Jeffrey D. Ullman On the Complexity of LR(k) Testing . . . 707--716
Susan L. Graham and
Mark N. Wegman A Fast and Usually Linear Algorithm for
Global Flow Analysis (Abstract) . . . . 716--716
Richard J. Lipton Reduction: A Method of Proving
Properties of Parallel Programs . . . . 717--721
Jacob T. Schwartz Automatic Data Structure Choice in a
Language of Very High Level . . . . . . 722--728
Leonard Kleinrock and
William E. Naylor and
Holger Opderbeck A Study of Line Overhead in the ARPANET 3--13
Neil C. Wilhelm An Anomaly in Disk Scheduling: A
Comparison of FCFS and SSTF Seek
Scheduling Using an Empirical Model for
Disk Accesses . . . . . . . . . . . . . 13--17
Carson E. Agnew On Quadratic Adaptive Routing Algorithms 18--22
Philip L. Karlton and
Samuel H. Fuller and
R. E. Scroggs and
E. B. Kaehler Performance of Height-Balanced Trees . . 23--28
J. J. Florentin Information Reference Coding . . . . . . 29--33
Charles R. Litecky and
Gordon B. Davis Study of Errors, Error-Proneness, and
Error Diagnosis in Cobol . . . . . . . . 33--37
Gregor von Bochmann Semantic Evaluation from Left to Right 55--62
Ronald L. Rivest On Self-Organizing Sequential Search
Heuristics . . . . . . . . . . . . . . . 63--67
F. M. Ives Permutation Enumeration: Four New
Permutation Algorithms . . . . . . . . . 68--72
Alberto Martelli Application of Heuristic Search Methods
to Edge and Contour Detection . . . . . 73--83
Kenneth F. Siler A Stochastic Evaluation Model for
Database Organization in Data Retrieval
Systems . . . . . . . . . . . . . . . . 84--95
Ronald Fagin A Counterintuitive Example of Computer
Paging . . . . . . . . . . . . . . . . . 96--97
Ehud Artzy and
James A. Hinds and
Harry J. Saal A Fast Division Technique for Constant
Divisors . . . . . . . . . . . . . . . . 98--101
Donald E. Knuth Errata: ``Ancient Babylonian
algorithms'' . . . . . . . . . . . . . .
Allen Newell and
Herbert A. Simon Computer Science as Empirical Inquiry:
Symbols and Search . . . . . . . . . . . 113--126
Jair M. Babad and
Mario M. Modiano Joining Policies in a Multipriority
Multiclass Batch Computer System . . . . 127--136
Frances E. Allen and
John Cocke A Program Data Flow Analysis Procedure 137--147
Naftaly H. Minsky Intentional Resolution of Privacy
Protection in Database Systems . . . . . 148--159
Whitfield Diffie and
Martin E. Hellman A critique of the proposed Data
Encryption Standard . . . . . . . . . . 164--165
Oliver R. Smoot Development of an international system
for legal protection of computer
programs . . . . . . . . . . . . . . . . 171--174
Bennet P. Lientz A Comparative Evaluation of Versions of
BASIC . . . . . . . . . . . . . . . . . 175--181
J. Raymond LG: A Language for Analytic Geometry . . 182--187
Ronald Fagin Corrigendum: ``A Counterintuitive
Example of Computer Paging'' . . . . . . 187
Shmuel Katz and
Zohar Manna Logical Analysis of Programs . . . . . . 188--206
Dorothy E. Denning A Lattice Model of Secure Information
Flow . . . . . . . . . . . . . . . . . . 236--243
Jonathan K. Millen Security Kernel Validation in Practice 243--250
Butler W. Lampson and
Howard E. Sturgis Reflections on an Operating System
Design . . . . . . . . . . . . . . . . . 251--265
A. Nico Habermann and
Lawrence Flon and
Lee W. Cooprider Modularization and Hierarchy in a Family
of Operating Systems . . . . . . . . . . 266--272
John H. Howard Proving Monitors . . . . . . . . . . . . 273--279
Susan S. Owicki and
David Gries Verifying Properties of Parallel
Programs: An Axiomatic Approach . . . . 279--285
A. Wayne Madison and
Alan P. Batson Characteristics of Program Localities 285--294
Barton G. Prieve and
Robert S. Fabry VMIN --- an Optimal Variable-Space Page
Replacement Algorithm . . . . . . . . . 295--297
Wesley W. Chu and
Holger Opderbeck Analysis of the PFF Replacement
Algorithm via a Semi-Markov Model . . . 298--304
Orrin E. Taulbee and
Samuel D. Conte Production and employment of Ph.D.'s in
computer science . . . . . . . . . . . . 311--313
Dennis G. Severance and
Ricardo A. Duhne A Practitioner's Guide To Addressing
Algorithms . . . . . . . . . . . . . . . 314--326
Forest Baskett and
Alan Jay Smith Interference in Multiprocessor Computer
Systems with Interleaved Memory . . . . 327--334
Gideon Frieder and
Harry J. Saal Process for the Determination of
Addresses in Variable Length Addressing 335--338
David S. Wise Referencing Lists by an Edge . . . . . . 338--342
Helmut Schumacher and
Kenneth C. Sevcik The Synthetic Approach to Decision Table
Conversion . . . . . . . . . . . . . . . 343--351
Douglas W. Clark An Efficient List Moving Algorithm Using
constant Workspace . . . . . . . . . . . 352--354
Guy L. Steele, Jr. Corrigendum: ``Multiprocessing
Compactifying Garbage Collection'' . . . 354--354
Gary D. Knott A Numbering System for Permutations of
Combinations . . . . . . . . . . . . . . 355--356
Samuel D. Conte and
Maurice H. Halstead Technology of Computer Center
Management: a Proposed Course for
Graduate Professional Programs in
Computer Science or in Information
Systems . . . . . . . . . . . . . . . . 369--370
Robert M. Keller Formal Verification of Parallel Programs 371--384
James C. King Symbolic Execution and Program Testing 385--394
Robert M. Metcalfe and
David R. Boggs Ethernet: Distributed Packet Switching
for Local Computer Networks . . . . . . 395--404
Cheng-Wen Cheng and
Jonas Rabin Synthesis of Decision Rules . . . . . . 404--406
George S. Fishman Sampling from the Gamma-distribution on
a computer . . . . . . . . . . . . . . . 407--409
Kurt Maly Compressed Tries . . . . . . . . . . . . 409--415
Warren Burton A Buddy System Variation for Disk
Storage Allocation . . . . . . . . . . . 416--417
Gaston H. Gonnet Heaps Applied to Event Driven Mechanisms 417--418
John J. Donovan Tools and Philosophy for Software
Education . . . . . . . . . . . . . . . 430--436
Robert D. Tennent The Denotational Semantics of
Programming Languages . . . . . . . . . 437--453
James H. Clark Designing Surfaces in 3-D . . . . . . . 454--460
Michael A. Harrison and
Walter L. Ruzzo and
Jeffrey D. Ullman Protection in Operating Systems . . . . 461--471
Daniel S. Hirschberg An Insertion Technique for One-Sided
Height-Balanced Trees . . . . . . . . . 471--473
Philip L. Wadler Analysis of an Algorithm for Real Time
Garbage Collection . . . . . . . . . . . 491--500
Chee K. Yap New Upper Bounds for Selection . . . . . 501--508
Michael C. Loui Weighted Derivation Trees . . . . . . . 509--513
Kenneth G. Walter Recursion Analysis for Compiler
Optimization . . . . . . . . . . . . . . 514--516
James R. Bitner and
Gideon Ehrlich and
Edward M. Reingold Efficient Generation of the Binary
Reflected Gray Code and Its Applications 517--521
L. Peter Deutsch and
Daniel G. Bobrow An Efficient, Incremental, Automatic
Garbage Collector . . . . . . . . . . . 522--526
Ben Wegbreit Faster Retrieval from Context Trees . . 526--529
Wesley W. Chu and
Holger Opderbeck Corrigendum: ``Analysis of the PFF
replacement algorithm via a semi-Markov
model'' . . . . . . . . . . . . . . . .
Udo W. Pooch Papers from SIGGRAPH 76 --- Introduction 541
James F. Blinn and
Martin E. Newell Texture and Reflection in Computer
Generated Images . . . . . . . . . . . . 542--547
James H. Clark Hierarchical Geometric Models for
Visible Surface Algorithms . . . . . . . 547--554
Joshua Z. Levin A Parametric Algorithm for Drawing
Pictures of Solid Objects Composed of
Quadric Surfaces . . . . . . . . . . . . 555--563
N. Burtnyk and
M. Wein Interactive Skeleton Techniques for
Enhancing Motion Dynamics in Key Frame
Animation . . . . . . . . . . . . . . . 564--569
James W. Frane The BMD and BMDP Series of Statistical
Computer Programs . . . . . . . . . . . 570--576
C. Duong-Kien and
Hans-Jürgen Hoffmann and
D. Muth An improvement to Martin's algorithm for
computation of linear precedence
functions . . . . . . . . . . . . . . . 576--577
Richard G. Montanelli, Jr. and
Sandra A. Mamrak Status of Women and Minorities in
Academic Computer Science . . . . . . . 578--581
Douglas T. Ross Homilies for humble standards (computer
applications) . . . . . . . . . . . . . 595--600
Henry F. Ledgard and
William C. Cave Cobol Under Control . . . . . . . . . . 601--608
Thomas R. Wilcox and
Alan M. Davis and
Michael H. Tindall Design and Implementation of a Table
Driven, Interactive Diagnostic
Programming System . . . . . . . . . . . 609--616
Frank Rubin Experiments in Text File Compression . . 617--623
Kapali P. Eswaran and
Jim N. Gray and
Raymond A. Lorie and
Irving L. Traiger The notions of consistency and predicate
locks in a database system . . . . . . . 624--633
K. Maruyama and
S. E. Smith Optimal Reorganization of Distributed
Space Disk Files . . . . . . . . . . . . 634--642
Richard G. Hamlet High-Level Binding with Low-Level
Linkers . . . . . . . . . . . . . . . . 642--644
Jean E. Sammet Roster of Programming Languages for
1974--75 . . . . . . . . . . . . . . . . 655--669
Bruce W. Arden The Computer Science and Engineering
Research Study (COSERS) . . . . . . . . 670--673
Jay F. Nunamaker, Jr. and
Benn R. Konsynski, Jr. and
Thomas Ho and
Carl Singer Computer-Aided Analysis and Design of
Information Systems . . . . . . . . . . 674--687
George Stockman and
Laveen N. Kanal and
M. C. Kyle Structural Pattern Recognition of
Carotid Pulse Waves Using a General
Waveform Parsing System . . . . . . . . 688--695
Allen van Gelder Structured programming in COBOL: an
approach for application programmers . . 2--12
Richard H. Austing and
Bruce H. Barnes and
Gerald L. Engel A Survey of the Literature in Computer
Science Education Since Curriculum '68 13--21
Jair M. Babad A Record and File Partitioning Model . . 22--30
Albert L. Zobrist and
Frederick R. Carlson, Jr. Detection of Combined Occurrences . . . 31--35
Alan P. Batson and
Robert E. Brundage Segment Sizes and Lifetimes in Algol 60
Programs . . . . . . . . . . . . . . . . 36--44
David Gries On Believing Programs to be Correct . . 49--50
Mervin E. Muller An Approach to Multidimensional Data
Array Processing by Computer . . . . . . 63--77
Douglas W. Clark and
C. Cordell Green An Empirical Study of List Structure in
Lisp . . . . . . . . . . . . . . . . . . 78--87
Franco P. Preparata and
S. J. Hong Convex Hulls of Finite Sets of Points in
Two and Three Dimensions . . . . . . . . 87--93
Malcolm C. Easton and
B. T. Bennett Transient-Free Working-Set Statistics 93--99
Jack Bresenham A Linear Algorithm for Incremental
Digital Display of Circular Arcs . . . . 100--106
Thoddi C. T. Kotiah and
David I. Steinberg Occurrences of Cycling and Other
Phenomena Arising in a Class of Linear
Programming Models . . . . . . . . . . . 107--112
Gary D. Knott A Numbering System for Binary Trees . . 113--115
Philip Clapson Improving the Access Time for Random
Access Files . . . . . . . . . . . . . . 127--135
Clement T. Yu and
Gerard Salton Effective Information Retrieval Using
Term Accuracy . . . . . . . . . . . . . 135--142
Åmund Lunde Empirical Evaluation of Some Features of
Instruction Set Processor Architectures 143--153
R. M. Brown and
James C. Browne and
K. Mani Chandy Memory Management and Response Time . . 153--165
Warren Burton Representation of Many-Sided Polygons
and Polygonal Lines for Rapid Processing 166--171
Harry B. Hunt III and
Thomas G. Szymanski and
Jeffrey D. Ullman Operations on Sparse Relations . . . . . 171--176
Richard L. Nolan Effects of Chargeout on User/Manager
Attitudes . . . . . . . . . . . . . . . 177--185
Israel Borovits and
Phillip Ein-Dor Cost/utilization: A measure of system
performance . . . . . . . . . . . . . . 185--191
Carter Bays A Comparison of Next-fit, First-fit, and
Best-fit . . . . . . . . . . . . . . . . 191--192
Eberhard Bertsch The Storage Requirement in Precedence
Parsing . . . . . . . . . . . . . . . . 192--194
James H. Morris, Jr. and
Ben Wegbreit Subgoal Induction . . . . . . . . . . . 209--222
Steven L. Tanimoto and
Theodosios Pavlidis Editing of Picture Segmentations Using
Local Analysis of Graphs . . . . . . . . 223--229
Nicholas V. Findler Studies in Machine Cognition Using the
Game of Poker . . . . . . . . . . . . . 230--245
K. Maruyama and
S. E. Smith Analysis of Design Alternatives for
Virtual Memory Indexes . . . . . . . . . 245--254
Henry C. Lucas, Jr. and
Jimmy A. Sutton The Stage Hypothesis and the S-Curve:
Some Contradictory Evidence . . . . . . 254--259
S. Bing Yao Approximating the Number of Accesses in
Database Organizations . . . . . . . . . 260--261
Clifford R. Hollander Remark on Uniform Insertion in
Structured Data Structures . . . . . . . 261--262
S. K. Bandypadhyay Comment on Weighted Increment Linear
Search for Scatter Tables . . . . . . . 262--263
C. D. Thompson and
H. T. Kung Sorting on a Mesh-Connected Parallel
Computer . . . . . . . . . . . . . . . . 263--271
Lawrence Robinson and
Karl N. Levitt Proof Techniques for Hierarchically
Structured Programs . . . . . . . . . . 271--283
Richard C. Holt and
David B. Wortman and
David T. Bardnard and
James R. Cordy SP/k: A System for Teaching Computer
Programming . . . . . . . . . . . . . . 301--309
George S. Fishman Achieving Specific Accuracy in
Simulation Output Analysis . . . . . . . 310--315
Howard L. Morgan and
K. Dan Levin Optimal Program and Data Locations in
Computer Networks . . . . . . . . . . . 315--322
Jean-Loup Baer and
B. Schwab A Comparison of Tree-Balancing
Algorithms . . . . . . . . . . . . . . . 322--330
Neil J. Stillman and
P. Bruce Berra A Comparison of Hardware and Software
Associative Memories in the Context of
Computer Graphics . . . . . . . . . . . 331--339
Marvin B. Shapiro Choice of Reference Points in Best-Match
File Searching . . . . . . . . . . . . . 339--343
Michael Z. Hanani An Optimal Evaluation of Boolean
Expressions in an Online Query System 344--347
Y. Milman An Approach to Optimal Design of Storage
Parameters in Databases . . . . . . . . 347--350
James W. Hunt and
Thomas G. Szymanski A Fast Algorithm for Computing Longest
Common Subsequences . . . . . . . . . . 350--353
Orrin E. Taulbee and
Samuel D. Conte Production and Employment of Ph.D.'s in
Computer Science --- 1976 . . . . . . . 370--372
Ben Shneiderman and
Richard E. Mayer and
Don McKay and
Peter Heller Experimental Investigations of the
Utility of Detailed Flowcharts in
Programming . . . . . . . . . . . . . . 373--381
Henry F. Ledgard and
Robert W. Taylor Two Views of Data Abstraction ---
Introduction to the Special Section . . 382--384
Moshé M. Zloof and
S. Peter de Jong The System for Business Automation
(SBA): Programming Language . . . . . . 385--396
John V. Guttag Abstract Data Types and the Development
of Data Structures . . . . . . . . . . . 396--404
John Miles Smith and
Diane C. P. Smith Database Abstractions: Aggregation . . . 405--413
David Gries and
Narain H. Gehani Some Ideas on Data Types in High-Level
Languages . . . . . . . . . . . . . . . 414--420
James L. Peterson and
Theodore A. Norman Buddy Systems . . . . . . . . . . . . . 421--431
J. M. Robson A Bounded Storage Algorithm for Copying
Cyclic Structures . . . . . . . . . . . 431--433
Richard S. Bird Notes on Recursion Elimination . . . . . 434--439
Henry S. Warren, Jr. Functions Realizable with Word-Parallel
Logical and Two's-Complement Addition
Instructions . . . . . . . . . . . . . . 439--441
Sandra A. Mamrak Dynamic Response Time Prediction for
Computer Networks . . . . . . . . . . . 461--468
Manfred Ruschitzka and
Robert S. Fabry A Unifying Approach to Scheduling . . . 469--477
William D. Tajibnapis A Correctness Proof of a Topology
Information Maintenance Protocol for a
Distributed Computer Network . . . . . . 477--485
Paul G. Heckel and
Butler W. Lampson A Terminal-Oriented Communication System 486--494
Ben Ross Schneider, Jr. and
Reid M. Watts SITAR: an Interactive Text Processing
System for Small Computers . . . . . . . 495--499
Joep L. W. Kessels Alternative to Event Queues for
Synchronization in Monitors . . . . . . 500--503
Dorothy E. Denning and
Peter J. Denning Certification of Programs for Secure
Information Flow . . . . . . . . . . . . 504--513
Jeffrey M. Barth Shifting Garbage Collection Overhead to
Compile Time . . . . . . . . . . . . . . 513--518
Edward A. Ashcroft and
William W. Wadge Lucid, a Nonprocedural Language with
Iteration . . . . . . . . . . . . . . . 519--526
J. Nevil Brownlee An Algol-based implementation of SNOBOL
4 patterns . . . . . . . . . . . . . . . 527--529
James J. Horning Selected Papers from the ACM Conference
on Language Design for Reliable Software
--- Introduction . . . . . . . . . . . . 539
Charles M. Geschke and
James H. Morris, Jr. and
Edwin H. Satterthwaite Early Experience with Mesa . . . . . . . 540--553
Mary Shaw and
William A. Wulf and
Ralph L. London Abstraction and Verification in Alphard:
Defining and Specifying Iteration and
Generators . . . . . . . . . . . . . . . 553--564
Barbara Liskov and
Alan Snyder and
Russell R. Atkinson and
Craig Schaffert Abstraction Mechanisms in CLU . . . . . 564--576
Niklaus Wirth Toward a Discipline of Real-Time
Programming . . . . . . . . . . . . . . 577--583
John D. Gannon An Experimental Evaluation of Data Type
Conventions . . . . . . . . . . . . . . 584--595
William R. Franta and
Kurt Maly An Efficient Data Structure for the
Simulation Event Set . . . . . . . . . . 596--602
Orrin E. Taulbee and
Samuel D. Conte Corrigendum: Production and Employment
of Ph.D.'s in Computer Science --- 1976 602
Eugene L. Lawler Comment on computing the $k$ shortest
paths in a graph . . . . . . . . . . . . 603--604
Nissim Francez Another advantage of keyword notation
for parameter communication with
subprograms . . . . . . . . . . . . . . 604--605
Michael O. Rabin Complexity of Computations . . . . . . . 625--633
Dana S. Scott Logic and Programming Languages . . . . 634--641
Richard H. Austing The GRE Advanced Test in Computer
Science . . . . . . . . . . . . . . . . 642--645
Robert W. Scheifler An Analysis of Inline Substitution for a
Structured Programming Language . . . . 647--654
David K. Gifford Hardware Estimation of a Process'
Primary Memory Requirements . . . . . . 655--663
Harry G. Mairson Some New Upper Bounds on the Generation
of Prime Numbers . . . . . . . . . . . . 664--669
Edward M. McCreight Pagination of B*-Trees with
Variable-Length Records . . . . . . . . 670--674
H. Fuchs and
Zvi M. Kedem and
Samuel P. Uselton Optimal Surface Reconstruction from
Planar Contours . . . . . . . . . . . . 693--702
Sheng-Chuan C. Wu and
John F. Abel and
Donald P. Greenberg An Interactive Computer Graphics
Approach to Surface Representation . . . 703--712
Barry K. Rosen High-Level Data Flow Analysis . . . . . 712--724
Carlo Montangero and
Giuliano Pacini and
Franco Turini Two-Level Control Structure for
Nondeterministic Programming . . . . . . 725--730
Wilf R. LaLonde Regular Right Part Grammars and Their
Parsers . . . . . . . . . . . . . . . . 731--741
Raymond R. Devillers Game Interpretation of the Deadlock
Avoidance Problem . . . . . . . . . . . 741--745
Evan L. Ivie Programmer's Workbench --- a Machine for
Software Development . . . . . . . . . . 746--753
Alan Jay Smith Multiprocessor Memory Organization and
Memory Interference . . . . . . . . . . 754--761
Ben Ross Schneider, Jr. and
Reid M. Watts Corrigendum: SITAR: An Interactive Text
Processing System for Small Computers 761
Robert S. Boyer and
J. Strother Moore A Fast String Searching Algorithm . . . 762--772
John A. N. Lee Considerations for future programming
language standards activities . . . . . 788--794
Rollins Turner and
William D. Strecker Use of the LRU Stack Depth Distribution
for Simulation of Paging Behavior . . . 795--798
Franklin C. Crow The Aliasing Problem in
Computer-Generated Shaded Images . . . . 799--805
Leslie Lamport Concurrent Reading and Writing . . . . . 806--811
John E. Shore Anomalous Behavior of the Fifty-Percent
Rule in Dynamic Memory Allocation . . . 812--820
G. C. Stockman and
Ashok K. Agrawala Equivalence of Hough curve detection to
template matching . . . . . . . . . . . 820--822
Niklaus Wirth What can we do about the unnecessary
diversity of notation for syntactic
definitions? . . . . . . . . . . . . . . 822--823
M. K. Roy A note on reflection-free permutation
enumeration . . . . . . . . . . . . . . 823--823
Mohit Kumar Roy A Note On Refection-Free Permutation
Enumeration . . . . . . . . . . . . . . 823
Zohar Manna and
Adi Shamir The Optimal Approach to Recursive
Programs . . . . . . . . . . . . . . . . 824--831
Michael Hammer and
W. Gerry Howe and
Vincent J. Kruskal and
Irving Wladawsky Very High Level Programming Language for
Data Processing Applications . . . . . . 832--840
Renzo Sprugnoli Perfect Hashing Functions: A Single
Probe Retrieving Method for Static Sets 841--850
John Cocke and
Ken Kennedy An Algorithm for Reduction of Operator
Strength . . . . . . . . . . . . . . . . 850--856
Richard S. Bird Improving Programs by the Introduction
of Recursion . . . . . . . . . . . . . . 856--863
Norman R. Nielsen Dynamic Memory Allocation in Computer
Simulation . . . . . . . . . . . . . . . 864--873
Michael W. Blasgen and
Richard G. Casey and
Kapali P. Eswaran An Encoding Method for Multifield
Sorting and Indexing . . . . . . . . . . 874--878
Enrique Grapa and
Geneva G. Belford Some Theorems to Aid in Solving the File
Allocation Problem . . . . . . . . . . . 878--882
A. A. Lopez and
Robert Raymond and
Robert Tardiff A survey of computer science offerings
in small liberal arts colleges . . . . . 902--906
Joep L. W. Kessels A Conceptual Framework for a
Nonprocedural Programming Language . . . 906--913
J. Lawrence Carter A Case Study of a New Code Generation
Technique for Compilers . . . . . . . . 914--920
David Gries An Exercise in Proving Parallel Programs
Correct . . . . . . . . . . . . . . . . 921--930
Irene Greif A Language for Formal Problem
Specification . . . . . . . . . . . . . 931--935
Marshall D. Abrams and
Siegfried Treu A Methodology for Interactive Computer
Service Measurement . . . . . . . . . . 936--944
James N. Danziger and
William H. Dutton Computers as an innovation in American
local governments . . . . . . . . . . . 945--956
Gordon Bell and
Samuel H. Fuller and
Daniel P. Siewiorek Forword to the Special Issue on Computer
Architecture . . . . . . . . . . . . . . 3
Simon H. Lavington The Manchester Mark I and Atlas: a
historical perspective . . . . . . . . . 4--12
R. N. Ibbett and
P. C. Capon The Development of the MU5 Computer
System . . . . . . . . . . . . . . . . . 13--24
B. R. Borgerson and
M. L. Hanson and
P. A. Hartley Evolution of the Sperry Univac 1100
Series: a History, Analysis, and
Projection . . . . . . . . . . . . . . . 25--43
C. Gordon Bell and
A. Kotok and
Thomas N. Hastings and
R. Hill The Evolution of the DECsystem 10 . . . 44--63
Richard M. Russell The Cray-1 Computer System . . . . . . . 63--72
Richard P. Case and
Andris Padegs Architecture of the IBM System/370 . . . 73--96
Sandra A. Mamrak and
Richard G. Montanelli, Jr. Computer Science Faculties: The Current
Status of Minorities and Woman . . . . . 115--119
Ronald L. Rivest and
Adi Shamir and
Leonard M. Adleman A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems 120--126
Marc A. Auslander and
H. Raymond Strong Systematic Recursion Removal . . . . . . 127--134
Lawrence T. Kou and
Larry J. Stockmeyer and
C. K. Wong Covering Edges by Cliques with Regard to
Keyword Conflicts and Intersection
Graphs . . . . . . . . . . . . . . . . . 135--139
Gerald Held and
Michael Stonebraker B-trees Re-examined . . . . . . . . . . 139--143
William J. Stewart A Comparison of Numerical Techniques in
Markov Modeling . . . . . . . . . . . . 144--152
Gabor T. Herman and
Arnold Lent and
Peter H. Lutz Relaxation Methods for Image
Reconstruction . . . . . . . . . . . . . 152--158
Zohar Manna and
Richard J. Waldinger Is `Sometime' Sometimes Better Than
`Always'? (Intermittent Assertions in
Proving Program Correctness) . . . . . . 159--172
Bruce J. Schachter and
Azriel Rosenfeld Some New Methods of Detecting Step Edges
in Digital Pictures . . . . . . . . . . 172--176
Henry C. Lucas, Jr. Use of an Interactive Information
Storage and Retrieval System in Medical
Research . . . . . . . . . . . . . . . . 197--205
William H. Dutton and
Kenneth L. Kraemer Management Utilization of Computers in
American Local Governments . . . . . . . 206--218
Ronald E. Anderson Value Orientation of Computer Science
Students . . . . . . . . . . . . . . . . 219--225
S. Rao Kosaraju Insertions and Deletions in One-Sided
Height-Balanced Trees . . . . . . . . . 226--227
Richard A. DeMillo and
Stanley C. Eisenstat and
Richard J. Lipton Preserving Average Proximity in Arrays 228--231
Mark A. Franklin and
G. Scott Graham and
R. K. Gupta Anomalies with Variable Partition Paging
Algorithms . . . . . . . . . . . . . . . 232--236
Andrew S. Tanenbaum Implications of Structured Programming
for Machine Architecture . . . . . . . . 237--246
Michael O. Rabin Corrigendum: ``Complexity of
computations'' . . . . . . . . . . . . .
W. H. Payne and
K. L. McMillen Orderly Enumeration of Nonsingular
Binary Matrices Applied to Text
Encryption . . . . . . . . . . . . . . . 259--263
Paul Heckel A Technique for Isolating Differences
Between Files . . . . . . . . . . . . . 264--268
Art Lew Optimal Conversion of Extended-Entry
Decision Tables with General Cost
Criteria . . . . . . . . . . . . . . . . 269--279
Henry G. Baker, Jr. List Processing in Real Time on a Serial
Computer . . . . . . . . . . . . . . . . 280--294
Ralph C. Merkle Secure Communications Over Insecure
Channels . . . . . . . . . . . . . . . . 294--299
Thomas G. Szymanski Assembling Code for machines with
Span-Dependent Instructions . . . . . . 300--308
Jean Vuillemin A Data Structure for Manipulating
Priority Queues . . . . . . . . . . . . 309--315
Shimon Even and
Michael Rodeh Economical Encoding of Commas Between
Strings . . . . . . . . . . . . . . . . 315--317
R. C. H. Cheng Generating beta variates with
nonintegral shape parameters . . . . . . 317--322
Douglas W. Clark A Fast Algorithm for Copying List
Structures . . . . . . . . . . . . . . . 351--357
Anita K. Jones and
Barbara H. Liskov A Language Extension for Expressing
Constraints on Data Access . . . . . . . 358--367
Matthew M. Geller Test Data as an Aid in Proving Program
Correctness . . . . . . . . . . . . . . 368--375
James R. Low Automatic Data Structure Selection: an
Example and Overview . . . . . . . . . . 376--385
Michael Karr and
David B. Loveman III Incorporation of Units into Programming
Languages . . . . . . . . . . . . . . . 385--391
David R. Hanson and
Ralph E. Griswold The SL5 Procedure Mechanism . . . . . . 392--400
Frederick Hayes-Roth and
John P. McDermott An Interference Matching Technique for
Inducing Abstractions . . . . . . . . . 401--410
J. M. Fleisher and
R. R. Meyer New Sufficient Optimality Conditions for
Integer Programming and Their
Application . . . . . . . . . . . . . . 411--418
Pandu R. Tadikamalla Computer Generation of Gamma Random
Variables . . . . . . . . . . . . . . . 419--422
Richard L. Sites Optimal Shift Strategy for a
Block-Transfer CCD Memory . . . . . . . 423--425
Stuart H. Zweben and
M. A. McDonald An Optimal Method for Deletion in
One-Sided Height-Balanced Trees . . . . 441--445
James R. Driscoll and
Y. Edmund Lien A Selective Traversal Algorithm for
Binary Search Trees . . . . . . . . . . 445--447
Jacques Cohen and
Martin S. Roth Analyses of Deterministic Parsing
Algorithms . . . . . . . . . . . . . . . 448--458
M. Dennis Mickunas and
John A. Modry Automatic Error Recovery for LR Parsers 459--465
Bennet P. Lientz and
E. Burton Swanson and
G. E. Tompkins Characteristics of Application Software
Maintenance . . . . . . . . . . . . . . 466--471
Earl Chrysler Some Basic Determinants of Computer
Programming Productivity . . . . . . . . 472--483
Rob Kling Automated Welfare Client-Tracking and
Service Integration: the Political
Economy of Computing . . . . . . . . . . 484--493
Erol Gelenbe and
D. Derochette Performance of Rollback Recovery Systems
Under Intermittent Failures . . . . . . 493--499
Toby J. Teorey General Equations for Idealized CPU-I/O
Overlap Configurations . . . . . . . . . 500--507
David L. Waltz An English Language Query Answering
System for a Large Relational Data Base 526--539
Michael L. Fredman and
Bruce W. Weide On the complexity of computing the
measure of $\bigcup[a_i,b_i]$ . . . . . 540--544
Francis Y. Chin An ${O}(n)$ Algorithm for Determining a
Near-Optimal Computation Order of Matrix
Chain Products . . . . . . . . . . . . . 544--549
Yehoshua Perl and
Alon Itai and
Haim Avni Interpolation Search --- A Log Log N
Search . . . . . . . . . . . . . . . . . 550--553
Constantine Halatsis and
George Philokyprou Pseudochaining in Hash Tables . . . . . 554--557
Leslie Lamport Time, Clocks, and the Ordering of Events
in a Distributed System . . . . . . . . 558--565
Henry Givens Baker, Jr. Shallow Binding in Lisp 1.5 . . . . . . 565--569
Hanan Samet Proving the Correctness of Heuristically
Optimized Code . . . . . . . . . . . . . 570--582
Robert E. Shostak An Algorithm for Reasoning About
Equality . . . . . . . . . . . . . . . . 583--585
Rahul Chattergy and
Udo W. Pooch Analysis of the Availability of Computer
Systems Using Computer-Aided Algebra . . 586--591
Lawrence Snyder B-Trees Re-examined . . . . . . . . . . 594--594
Lawrence Snyder On B-trees Re-examined . . . . . . . . . 594
John Backus Can Programming Be Liberated From the
von Neumann Style? A Functional Style
and its Algebra of Programs . . . . . . 613--641
Rob Kling Value conflicts and social choice in
electronic funds transfer system
developments . . . . . . . . . . . . . . 642--657
Daniel S. Hirschberg Fast Parallel Sorting Algorithms . . . . 657--661
F. Lockwood Morris A Time- and Space-Efficient Garbage
Compaction Algorithm . . . . . . . . . . 662--665
C. A. R. Hoare Communicating Sequential Processes . . . 666--677
Richard S. Brice and
James C. Browne Feedback Coupled Resource Allocation
Policies in the
Multiprogramming-Multiprocessor Computer
System . . . . . . . . . . . . . . . . . 678--686
Peter Scheuermann and
C. Robert Carlson Self-Assessment Procedure V: a
self-assessment procedure dealing with
database systems . . . . . . . . . . . . 687--693
R. A. Harris and
J. D. Zund An algorithm using symbolic techniques
for the Bel-Petrov classification of
gravitational fields . . . . . . . . . . 715--717
Herbert D. Schwetman Hybrid Simulation Models of Computer
Systems . . . . . . . . . . . . . . . . 718--723
Jeffrey M. Barth A Practical Interprocedural Data Flow
Analysis Algorithm . . . . . . . . . . . 724--736
Gerald J. Popek and
David A. Farber Model for Verification of Data Security
in Operating Systems . . . . . . . . . . 737--749
Peter J. Denning and
Donald R. Slutz Generalized Working Sets for Segment
Reference Strings . . . . . . . . . . . 750--759
Glenford J. Myers A Controlled Experiment in Program
Testing and Code
Walkthroughs/Inspections . . . . . . . . 760--768
Thomas Ottmann and
Hans-Werner Six and
Derick Wood Right Brother Trees . . . . . . . . . . 769--776
Ernst G. Ulrich Event Manipulation for Discrete
Simulations Requiring Large Numbers of
Events . . . . . . . . . . . . . . . . . 777--785
Kurt Maly A Note on Virtual Memory Indexes . . . . 786--787
Stephen A. Ward Real Time Plotting of Approximate
Contour Maps . . . . . . . . . . . . . . 788--790
Aaron M. Tenenbaum Simulations of Dynamic Sequential Search
Algorithms . . . . . . . . . . . . . . . 790--791
Walt Brainerd Fortran 77 . . . . . . . . . . . . . . . 806--820
Donald F. Towsley and
K. Mani Chandy and
James C. Browne Models for Parallel Processing Within
Programs: Application to CPU:I/O and
I/O:I/O Overlap . . . . . . . . . . . . 821--831
Ben Shneiderman Jump Searching: A Fast Sequential Search
Technique . . . . . . . . . . . . . . . 831--834
Shi-Kuo Chang and
Yin-Wah Wong Optimal Histogram Matching by Monotone
Gray Level Transformation . . . . . . . 835--840
Robert Morris Counting Large Numbers of Events in
Small Registers . . . . . . . . . . . . 840--842
Colin L. McMaster An Analysis of Algorithms for the Dutch
National Flag Problem . . . . . . . . . 842--846
Robert Sedgewick Implementing Quicksort Programs . . . . 847--857
Gordon Lyon Packed Scatter Tables . . . . . . . . . 857--865
Malcolm C. Easton and
Ronald Fagin Cold-Start Vs. Warm-Start Miss Ratios 866--872
William R. Franta and
Kurt Maly A comparison of heaps and the TL
structure for the simulation event set 873--875
Norman R. Lyons Systems Design Education: A Gaming
Approach . . . . . . . . . . . . . . . . 889--895
J. W. Wendorf A Simply Extended and Modified Batch
Environment Graphical System (Sembegs) 897--904
B. Kumar and
Edward S. Davidson Performance Evaluation of Highly
Concurrent Computers by Deterministic
Simulation . . . . . . . . . . . . . . . 904--913
Berthold K. P. Horn and
Brett L. Bachman Using Synthetic Images to Register Real
Images with Surface Models . . . . . . . 914--924
Pandu R. Tadikamalla Computer Generation of Gamma Random
Variables --- II . . . . . . . . . . . . 925--928
G. David Ripley A Simple Recovery-Only Procedure For
Simple Precedence Parsers . . . . . . . 928--930
Daniel P. Friedman and
David S. Wise A Note on Conditional Expressions . . . 931--933
Per Brinch Hansen Distributed Processes: A Concurrent
Programming Concept . . . . . . . . . . 934--941
Fabrizio Luccio and
Linda Pagli Power Trees . . . . . . . . . . . . . . 941--947
B. A. Sheil Median Split Trees: A Fast Lookup
Technique for Frequently Occurring Keys 947--958
C. A. R. Hoare Corrigendum: ``Communicating Sequential
Processes'' . . . . . . . . . . . . . . 958--958
Eugene C. Freuder Synthesizing Constraint Expressions . . 958--966
Edsger W. Dijkstra and
Leslie Lamport and
Alain J. Martin and
C. S. Scholten and
E. F. M. Steffens On-the-Fly Garbage Collection: An
Exercise in Cooperation . . . . . . . . 966--975
Roger M. Needham and
Michael D. Schroeder Using Encryption for Authentication in
Large Networks of Computers . . . . . . 993--999
David Gries and
Jayadev Misra A Linear Sieve Algorithm for Finding
Prime Numbers . . . . . . . . . . . . . 999--1003
James L. Peterson and
James R. Bitner and
John H. Howard The Selection of Optimal Tab Settings 1004--1007
James C. Wetherbe and
V. Thomas Dock Strategic Planning Methodology for the
Computing Effort in Higher Education: an
Empirical Evaluation . . . . . . . . . . 1008--1015
M. Ibramsha and
V. Rajaraman Detection of Logical Errors in Decision
Table Programs . . . . . . . . . . . . . 1016--1025
Alberto Martelli and
Ugo Montanari Optimizing Decision Trees Through
Heuristically Guided Search . . . . . . 1025--1039
Yogen K. Dalal and
Robert M. Metcalfe Reverse Path Forwarding of Broadcast
Packets . . . . . . . . . . . . . . . . 1040--1048
John V. Guttag and
Ellis Horowitz and
David R. Musser Abstract Data Types and Software
Validation . . . . . . . . . . . . . . . 1048--1064
Jay M. Spitzen and
Karl N. Levitt and
Lawrence Robinson An Example of Hierarchical Design and
Proof . . . . . . . . . . . . . . . . . 1064--1075
David Gries Corrigendum: ``An exercise in proving
parallel programs correct'' . . . . . .
John W. Boyse Interference Detection Among Solids and
Surfaces . . . . . . . . . . . . . . . . 3--9
Kent W. Colton The impact and use of computer
technology by the police . . . . . . . . 10--20
Gian Carlo Bongiovanni and
Fabrizio Luccio Permutation of Data Blocks in a Bubble
Memory . . . . . . . . . . . . . . . . . 21--25
Charles H. Sauer and
K. Mani Chandy The Impact of Distributions and
Disciplines on Multiple Processor
Systems . . . . . . . . . . . . . . . . 25--34
Jean-Pierre P. Banâtre and
Jean-Paul P. Routeau and
L. Trilling An Event-Driven Compiling Technique . . 34--42
Jacques J. Arsac Syntactic Source to Source Transforms
and Program Manipulation . . . . . . . . 43--54
Orrin E. Taulbee and
Samuel D. Conte Production and employment of Ph.D.s in
computer science --- 1977 and 1978 . . . 75--76
Richard E. Fairley Employment characteristics of doctoral
level computer scientists . . . . . . . 77--78
W. E. Gull and
Michael A. Jenkins Recursive data structures in APL . . . . 79--96
É. Morel and
C. Renvoise Global Optimization by Suppression of
Partial Redundancies . . . . . . . . . . 96--103
M. R. Anderson and
M. G. Anderson Comments on Perfect Hashing Functions: A
Single Probe Retrieving Method for
Static Sets . . . . . . . . . . . . . . 104--105
David R. Cheriton and
Michael A. Malcolm and
Lawrence S. Melen and
Gary R. Sager Thoth, a Portable Real-Time Operating
System . . . . . . . . . . . . . . . . . 105--115
David P. Reed and
Rajendra K. Kanodia Synchronization with Eventcounts and
Sequencers . . . . . . . . . . . . . . . 115--123
Haim Mendelson and
Joseph S. Pliskin and
Uri Yechiali Optimal Storage Allocation for Serial
Files . . . . . . . . . . . . . . . . . 124--130
Richard H. Austing and
Bruce H. Barnes and
Della T. Bonnette and
Gerald L. Engel and
Gordon Stokes Curriculum '78: Recommendations for the
Undergraduate Program in Computer
Science --- A Report of the ACM
Curriculum Committee on Computer Science 147--166
Albert D. Edgar and
Samuel C. Lee FOCUS Microcomputer Number System . . . 166--177
James R. Slagle Experiments with Some Algorithms that
Find Central Solutions for Pattern
Classification . . . . . . . . . . . . . 178--183
Amaryllis Deliyanni and
Robert A. Kowalski Logic and Semantic Networks . . . . . . 184--192
Dalia Motzkin Use of Normal Multiplication Tables for
Information Storage and Retrieval . . . 193--207
C. L. McMaster Corrigendum: ``An Analysis of Algorithms
for the Dutch National Flag Problem'' 207--207
Arthur M. Lesk Detection of Three-Dimensional Patterns
of Atoms in Chemical Structures . . . . 219--224
E. G. Cale and
Lee L. Gremillion and
J. L. McKenney Price/Performance Patterns of U.S.
Computer Systems . . . . . . . . . . . . 225--232
Giacomo Bucci and
Donald N. Streeter Methodology for the Design of
Distributed Information Systems . . . . 233--245
Richard J. Hanson and
John A. Wisniewski A Mathematical Programming Updating
Method Using Modified Givens
Transformations and Applied to LP
Problems . . . . . . . . . . . . . . . . 245--251
Daniel Brélaz New Methods to Color the Vertices of a
Graph . . . . . . . . . . . . . . . . . 251--256
Richard A. De Millo and
Richard J. Lipton and
Alan J. Perlis Social Processes and Proofs of Theorems
and Programs . . . . . . . . . . . . . . 271--280
Ernest J. H. Chang and
Rosemary Roberts An improved algorithm for decentralized
extrema-finding in circular
configurations of processes . . . . . . 281--283
Theodor D. Sterling Consumer Difficulties with Computerized
Transactions: an Empirical Investigation 283--289
John C. Reynolds Reasoning About Arrays . . . . . . . . . 290--299
Michael J. Manthey Model for and Discussion of
Multi-Interpreter Systems . . . . . . . 299--309
Ronald S. Lemos An Implementation of Structured
Walk-Throughs in Teaching Cobol
Programming . . . . . . . . . . . . . . 335--340
Stavros N. Busenberg and
Wing C. Tam An academic program providing realistic
training in software engineering . . . . 341--345
Steven Alter Model for Automating File and Program
Design in Business Application Systems 345--353
Jerome A. Feldman High Level Programming for Distributed
Computing . . . . . . . . . . . . . . . 353--368
Robert Sedgewick Corrigendum: ``Implementing Quicksort
Programs'' . . . . . . . . . . . . . . . 368--368
Ruth Shapira and
Herbert Freeman The Cyclic Order Property of Vertices as
an Aid in Scene Analysis . . . . . . . . 368--375
Terry Winograd Beyond Programming Languages . . . . . . 391--401
Franco P. Preparata An Optimal Real-Time Algorithm for
Planar Convex Hulls . . . . . . . . . . 402--405
Patrick C. Fischer and
Robert L. Probert Storage Reorganization Techniques for
Matrix Computation in a Paging
Environment . . . . . . . . . . . . . . 405--415
J. H. Hine and
Isi Mitrani and
S. Tsur The Control of Response Times in
Multi-Class Systems by Memory Allocation 415--424
Robert A. Kowalski Algorithm = Logic + Control . . . . . . 424--436
J. W. Wong and
G. Scott Graham Self-Assessment Procedure VI: a
self-assessment procedure dealing with
queueing network models of computer
systems . . . . . . . . . . . . . . . . 449--454
Robert W. Floyd The Paradigms of Programming . . . . . . 455--460
Daniel S. Hirschberg and
Ashok K. Chandra and
Dilip V. Sarwate Computing Connected Components on
Parallel Computers . . . . . . . . . . . 461--464
Nachum Dershowitz and
Zohar Manna Proving Termination with Multiset
Orderings . . . . . . . . . . . . . . . 465--476
Dorothy E. Denning Secure Personal Computing in an Insecure
Network . . . . . . . . . . . . . . . . 476--482
Lloyd S. Nelson Further remark on stably updating mean
and standard deviation estimates . . . . 483--483
Jerome A. Feldman and
William R. Sutherland Rejuvenating Experimental Computer
Science --- A Report to the National
Science Foundation and Others . . . . . 497--502
Daniel D. McCracken, CCP and
Peter J. Denning and
David H. Brandin Addendum: An ACM Executive Committee
Position on the Crisis in Experimental
Computer Science . . . . . . . . . . . . 503--504
Zvi Galil On Improving the Worse Case Running Time
of the Boyer--Moore String Matching
Algorithm . . . . . . . . . . . . . . . 505--508
Kari-Jouko Räihä and
Stuart H. Zweben An Optimal Insertion Algorithm for
One-Sided Height-Balanced Binary Search
Trees . . . . . . . . . . . . . . . . . 508--512
Wilfred J. Hansen Progressive acyclic digraphs --- a tool
for database integrity . . . . . . . . . 513--518
George Nagy and
Sharad G. Wagle Approximation of Polygonal Maps by
Cellular Maps . . . . . . . . . . . . . 518--525
Tony F. Chan and
John Gregg Lewis Computing Standard Deviations: Accuracy 526--531
D. H. D. West Updating mean and variance estimates: an
improved method . . . . . . . . . . . . 532--535
Philip D. Laird Comment on: ``An optimal evaluation of
Boolean expressions in an online query
system'' [Comm. ACM, 20, 1977, no. 5,
344--347, MR 55 #9627] by M. Z. Hanani 549--550
Ehud Gudes and
Anthony Hoffman A note on: ``An optimal evaluation of
Boolean expressions in an online query
system'' [Comm. ACM, 20, 1977, no. 5,
344--347, MR 55 #9627] by M. Z. Hanani 550--553
M. R. Anderson and
M. G. Anderson Corrigendum: ``Comments on Perfect
Hashing Functions: A Single Probe
Retrieving Method for Static Sets'' . . 553
Leslie Lamport On the Proof of Correctness of a
Calendar Program . . . . . . . . . . . . 554--556
Paul Klint Line Numbers Made Cheap . . . . . . . . 557--559
Tomás Lozano-Pérez and
Michael A. Wesley An Algorithm for Planning Collision-Free
Paths Among Polyhedral Obstacles . . . . 560--570
F. L. Morris On a Comparison of Garbage Collection
Techniques . . . . . . . . . . . . . . . 571
Richard E. Mayer A Psychology of Learning BASIC . . . . . 589--593
Robert Morris and
Ken Thompson Password Security --- A Case History . . 594--597
Shmuel Peleg and
Azriel Rosenfeld Breaking Substitution Ciphers Using a
Relaxation Algorithm . . . . . . . . . . 598--605
Robert Endre Tarjan and
Andrew Chi Chih Yao Storing a Sparse Table . . . . . . . . . 606--611
Adi Shamir How to Share a Secret . . . . . . . . . 612--613
Rob Kling Introduction to the EFT Symposium . . . 639--640
Kenneth L. Kraemer and
Kent W. Colton Overview of the EFT Symposium . . . . . 641--643
Allen H. Lipis Costs of the Current U.S. Payments
System . . . . . . . . . . . . . . . . . 644--647
Robert H. Long Public Protection and Education with EFT 648--654
Donn B. Parker Vulnerabilities of EFTs to intentionally
caused losses . . . . . . . . . . . . . 654--660
Kenneth L. Kraemer and
Kent W. Colton Policy, values, and EFT research:
anatomy of a research agenda . . . . . . 660--671
M. van der Nat On Interpolation Search . . . . . . . . 681
Peter K. Pearson Fast Hashing of Variable-Length Text
Strings . . . . . . . . . . . . . . . . 677--680
Daniel M. Sunday A Very Fast Substring Search Algorithm 132--142
I. Dittmer Note on Fast Hashing of Variable Length
Text Strings . . . . . . . . . . . . . . 118
Jacques Savoy Note on Fast Hashing of Variable Length
Text Strings . . . . . . . . . . . . . . 118--119
James Litsios Note on Fast Hashing of Variable Length
Text Strings . . . . . . . . . . . . . . 118--120
Peter Pearson Note on Fast Hashing of Variable Length
Text Strings . . . . . . . . . . . . . . 120
Ricardo Baeza-Yates and
Gaston H. Gonnet A new approach to text searching . . . . 74--82
Sun Wu and
Udi Manber Fast text searching allowing errors . . 83--91
Donald E. Knuth Structured Programming with go to
Statements . . . . . . . . . . . . . . . 261--301
Susan L. Graham and
Mark Wegman A Fast and Usually Linear Algorithm for
Global Flow Analysis . . . . . . . . . . 172--202
R. J. Brown Chromatic scheduling and the chromatic
number problem . . . . . . . . . . . . . 451--463
Donald E. Knuth and
J. H. Morris and
V. R. Pratt Fast pattern matching in strings . . . . 323--350
A. L. Tharp and
K.-C. Tai The practicality of text signatures for
accelerating string searching . . . . . 35--44
Ove Skovgaard Remark on ``Algorithm 236: Bessel
Functions of the First Kind [S17]'' . . 282--284
Jayadev Misra Remark on ``Algorithm 246: Graycode
[Z]'' . . . . . . . . . . . . . . . . . 285--285
Robert Feinstein Remark on ``Algorithm 483: Masked
Three-Dimensional Plot Program with
Rotations [J6]'' . . . . . . . . . . . . 285--285
D. M. Boulton Remark on ``Algorithm 434: Exact
Probabilities for $R\times{C}$
Contingency Tables [G2]'' . . . . . . . 108--108
Lucian D. Duta Remark on ``Algorithm 475: Visible
Surface Plotting Program [J6]'' . . . . 109--110
G. M. White and
S. Goudreau and
J. L. Legros Remark on ``Algorithm 479: A Minimal
Spanning Tree Clustering Method [Z]'' 110--111
J. Pomeranz Remark on ``Algorithm 487: Exact
Cumulative Distribution of the
Kolmogorov--Smirnov Statistic for Small
Samples [S14]'' . . . . . . . . . . . . 111--111
Robert Morris Remark on ``Algorithm 490: The
Dilogarithm Function of a Real Argument
[S22]'' . . . . . . . . . . . . . . . . 112--112
Malcolm C. Pike and
Jennie SooHoo Remark on ``Algorithm 179: Incomplete
Beta Ratio [S14]'' . . . . . . . . . . . 207--208
Michael R. Anderson Remark on ``Algorithm 433: Interpolation
and Smooth Curve Fitting Based on Local
Procedures [E2]'' . . . . . . . . . . . 208--208
Alan M. Davies Remark on ``Algorithm 450: Rosenbrock
Function Minimization [E4]'' . . . . . . 300--301
Theodore Brown Remark on ``Algorithm 489: The Algorithm
SELECT --- for Finding the $i$th
Smallest of $n$ Elements [M1]'' . . . . 301--304
M. R. Ito Remark on ``Algorithm 284: Interchange
of Two Blocks of Data [K2]'' . . . . . . 392--393
Mohamed el Lozy Remark on ``Algorithm 299: Chi-Squared
Integral [S15]'' . . . . . . . . . . . . 393--395
Henk Koppelaar and
Peter Molenaar Remark on ``Algorithm 486: Numerical
Inversion of Laplace Transform [D5]'' 395--396
Esko G. Cate and
David W. Twigg Algorithm 513: Analysis of In-Situ
Transposition [F1] . . . . . . . . . . . 104--110
Françoise Veillon Remark on ``Algorithm 486: Numerical
Inversion of Laplace Transform'' . . . . 111--111
J. K. M. Jansen Remark on ``Algorithm 259: Legendre
Functions for Arguments Larger than
One'' . . . . . . . . . . . . . . . . . 204--250
Paolo Sipala Remark on ``Algorithm 408: A Sparse
Matrix Package (Part I) [F4]'' . . . . . 303--303
Dennis Tenney Remark on ``Algorithm 219: Topological
Ordering for PERT Networks'' . . . . . . 303--303
Ove Skovgaard Remark on ``Algorithm 149: Complete
Elliptic Integral [S21]'' . . . . . . . 95--95
John P. Coleman Remark on ``Algorithm 49: Spherical
Neumann Function'' . . . . . . . . . . . 295--295
Fred G. Gustavson Remark on ``Algorithm 408: A Sparse
Matrix Package (Part I) [F4]'' . . . . . 295--295
Andrew Y. Schoene Remark on ``Algorithm 435: Modified
Incomplete Gamma Function [S14]'' . . . 296--304
Mohamed el Lozy Remark on ``Algorithm 395: Student's
$t$-Distribution'' and Remark on
``Algorithm 396: Student's Quantiles
[S14]'' . . . . . . . . . . . . . . . . 238--239
K. O. Geddes Remark on ``Algorithm 424:
Clenshaw--Curtis Quadrature [O1]'' . . . 240--240
M. R. Anderson Remark on ``Algorithm 474: Bivariate
Interpolation and Smooth Surface Fitting
Based on Local Procedures'' . . . . . . 241--241
Burton L. Leathers Remark on ``Algorithm 513: Analysis of
In-Situ Transposition [F1]'' and Remark
on ``Algorithm 467: Matrix Transposition
in Place'' . . . . . . . . . . . . . . . 520--520
A. C. M. van Swieten and
J. Th. M. de Hosson Remark on ``Algorithm 475: Visible
Surface Plotting Program'' . . . . . . . 521--523
U. Harms and
H. Kollakowski and
G. Möller Remark on ``Algorithm 408: A Sparse
Matrix Package (Part 1) [F4]'' . . . . . 456--457
G. W. Hill Remark on ``Algorithm 395: Student's
$t$-Distribution'' . . . . . . . . . . . 247--249
G. W. Hill Remark on ``Algorithm 396: Student's
$t$-Quantiles'' . . . . . . . . . . . . 250--251
Jürgen Peemöller A correction to Brélaz's modification of
Brown's coloring algorithm . . . . . . . 595--597
M. C. Er Remark on ``Algorithm 246: Graycode
[Z]'' . . . . . . . . . . . . . . . . . 441--443
I. D. Hill and
M. C. Pike Remark on ``Algorithm 299: Chi-Squared
Integral'' . . . . . . . . . . . . . . . 185--185
Marek Kubale and
Boguslaw Jackowski A generalized implicit enumeration
algorithm for graph coloring . . . . . . 412--418
Douglas W. Jones An empirical comparison of
priority-queue and event-set
implementations . . . . . . . . . . . . 300--311