Last update:
Tue Oct 1 07:07:01 MDT 2024
G. M. Stacey The role of virtual memory in the
handling of application files . . . . . 1--3
F. G. Duncan and
D. Zissos Programmed simulation of sequential
circuits . . . . . . . . . . . . . . . . 4--6
H. A. Maurer The solution of a problem by Ginsburg 7--11 (or 7--10??)
D. Zissos and
F. G. Duncan Programmed simulation of race hazards in
sequential circuits . . . . . . . . . . 11--13
W. Henhapl and
C. B. Jones A run-time mechanism for referencing
variables . . . . . . . . . . . . . . . 14--16
T. H. Merret General programs for management systems 17--20
H. Karlgren Stacking without really stacking when
reducing categorical expressions . . . . 21--22
Donald E. Knuth and
R. W. Floyd Erratum: ``Notes on avoiding `go to'
statements'' . . . . . . . . . . . . . . 23--31
Donald E. Knuth and
R. W. Floyd Notes on avoiding ``go to'' statements 23--31
J. Hopcroft and
R. E. Tarjan A $ V^2 $ algorithm for determining
isomorphism of planar graphs . . . . . . 32--34
G. Salton The performance of interactive
information retrieval . . . . . . . . . 35--41
D. Tsichritzis A note on comparison of subrecursive
hierarchies . . . . . . . . . . . . . . 42--44
B. F. Caviness and
P. L. Pollack and
C. M. Rubald An existence lemma for canonical forms
in symbolic mathematics . . . . . . . . 45--46
D. L. Milgram and
A. Rosenfeld A note on scattered context grammars . . 47--50
D. G. Corneil An $ n^2 $ algorithm for determining the
bridges of a graph . . . . . . . . . . . 51--55
I. Munro Efficient determination of the
transitive closure of a directed graph 56--58
E. Gelenbe The two-thirds rule for dynamic storage
allocation under equilibrium . . . . . . 59--60
H. Scheiding Representation and equality of modes . . 61--65
A. Borodin and
I. Munro Evaluating polynomials at many points 66--68
S. G. Tzafestas Input-output modeling and identification
of linear automata . . . . . . . . . . . 69--75 (or 69--70??)
J. C. Ogilvie and
C. L. Olson On the use of complete subgraphs in
cluster analysis . . . . . . . . . . . . 76--79
A. van Dam and
F. Wm. Tompa Software data paging and segmentation
for complex systems . . . . . . . . . . 80--86
J. F. Whale The critical value of the basic
parameter of a nonlinear differential
equation . . . . . . . . . . . . . . . . 87--90
N. Solntseff A classification of extensible
programming languages . . . . . . . . . 91--96
N. Solntseff and
A. Yezerski ECT: an extensible-contractable
translator system . . . . . . . . . . . 97--99
D. Gries Programming by induction . . . . . . . . 100--107
R. Zimmer Soft precedence . . . . . . . . . . . . 108--110
G. Chroust Expression evaluation with minimum
average working storage . . . . . . . . 111--114
B. H. Mayoh Recursion and stacks . . . . . . . . . . 115--116
C. Bron Outline of a machine without branch
instructions . . . . . . . . . . . . . . 117--119
R. E. Tarjan Determining whether a groupoid is a
group . . . . . . . . . . . . . . . . . 120--124
D. Tsichritzis Protection in operating systems . . . . 127--131
R. L. Graham An efficient algorithm for determining
the convex hull of a finite planar set 132--133
J. M. Carroll and
W. Fraser and
G. Gill Automatic content analysis in an on-line
environment . . . . . . . . . . . . . . 134--140
P. Branquart and
J. P. Cardinael and
J. P. Delescaille and
J. Lewi A context-free syntax of ALGOL 68 . . . 141--148
L. Siklóssy Fast and read-only algorithms for
traversing trees without an auxiliary
stack . . . . . . . . . . . . . . . . . 149--152
G. T. Toussaint Feature evaluation with quadratic mutual
information . . . . . . . . . . . . . . 153--156
E. Horowitz A fast method for interpolation using
preconditioning . . . . . . . . . . . . 157--163
J. Král A new additive pseudorandom number
generator for extremely short
word-length . . . . . . . . . . . . . . 164--167
I. N. Molchanov and
L. D. Nikolenko On an approach to integrating boundary
problems with a non-unique solution . . 168--172
Donald E. Knuth and
E. B. Kaehler An experiment in optimal sorting . . . . 173--176
E. W. Dijkstra Information streams sharing a finite
buffer . . . . . . . . . . . . . . . . . 179--180
H. Vantilborgh and
A. van Lamsweerde On an extension of Dijkstra's semaphore
primitives . . . . . . . . . . . . . . . 181--186
R. C. Varney Priority processes used for scheduling
within a tree structured operating
system . . . . . . . . . . . . . . . . . 187--190
Nicholas V. Findler Short Note on a Heuristic Search
Strategy in Long-Term Memory Networks 191--196
R. S. Anderssen A refinement procedure for pure random
search . . . . . . . . . . . . . . . . . 197--200
G. Rozenberg The equivalence problem for
deterministic T0L-systems is undecidable 201--204
I. N. Molchanov and
N. I. Stepanets Iterative methods for solving difference
equations of the theory of elasticity
not depending on the spacing of the
difference net . . . . . . . . . . . . . 205--210
G. B. Krepyshev and
Ya. A. Pollack Synthesis of a discrete-time optimal
filter algorithm with reduced
sensitivity to deviations of a priori
statistics . . . . . . . . . . . . . . . 211--215
E. Horowitz Erratum: ``A fast method for
interpolation using preconditioning'' 216--216
J. Král Erratum: ``A new additive pseudorandom
number generator for extremely short
word-length'' . . . . . . . . . . . . . 216--216
A. Brandstetter Storage Requirements in Stochastic Data
Acquisition Systems . . . . . . . . . . 217--219
J. Nievergelt and
J. Pradels and
C. K. Wong and
P. C. Yue Bounds on the Weighted Path Length of
Binary Trees . . . . . . . . . . . . . . 220--225
R. Bayer Oriented balanced trees and equivalence
relations . . . . . . . . . . . . . . . 226--228
J. Engelfriet A note on infinite trees . . . . . . . . 229--232
G. Rozenberg Direct proofs of the undecidability of
the equivalence problem for sentential
forms of linear context-free grammars
and the equivalence problem for 0L
systems . . . . . . . . . . . . . . . . 233--235
S. G. Tzafestas Design parameters for a multiserver
computer processing buffering system
with feedback . . . . . . . . . . . . . 236--243
J. L. Baker An unintentional omission from ALGOL 68 244--245
R. Reddy and
W. Broadley and
L. Erman and
R. Johnsson and
J. Newcomer and
G. Robertson and
J. Wright Xcribl --- a Hardcopy Scan Line Graphics
System for Document Generation . . . . . 246--251
G. Rozenberg Erratum: ``The equivalence problem for
deterministic T0L-systems is
undecidable'' . . . . . . . . . . . . . 252--252
Naftaly H. Minsky Representation of Binary Trees on
Associative Memories . . . . . . . . . . 1--5
G. Salton Experiments in Multi-Lingual Information
Retrieval . . . . . . . . . . . . . . . 6--11
J. M. Robson An improved algorithm for traversing
binary trees without auxiliary stack . . 12--14
E. G. Coffman, Jr. and
C. J. M. Turnbull A note on the relative performance of
two disk scanning policies . . . . . . . 15--17
R. A. Jarvis On the Identification of the Convex Hull
of a Finite Set of Points in the Plane 18--21
J. Král and
J. Demner A note on the number of states of the De
Remer's recognizer . . . . . . . . . . . 22--23
G. Várhegyi Numerical differentiation of
experimental data . . . . . . . . . . . 24--25
W. Henhapl A transformation of marked graphs . . . 26--29
A. B. Cremers and
H. A. Maurer and
O. Mayer A note on leftmost restricted random
context grammars . . . . . . . . . . . . 31--33
S. I. Roschke and
A. L. Furtado An algorithm for obtaining the chromatic
number and an optimal coloring of a
graph . . . . . . . . . . . . . . . . . 34--38
Joel Coffy On Computing the Time Complexity of
Transitive Closure Algorithms . . . . . 39--42
Azriel Rosenfeld and
David L. Milgram Parallel/Sequential Array Automata . . . 43--46
Gary Lindstrom Scanning List Structures Without Stacks
or Tag Bits . . . . . . . . . . . . . . 47--51
Edward N. Adams, III Another Representation of Binary Tree
Traversal . . . . . . . . . . . . . . . 52--54
D. Holnapy and
M. Szöts and
A. Botár A generalization of the method of finite
differences . . . . . . . . . . . . . . 55--59
Gabor T. Herman On Universal Computer-Constructors . . . 61--64
D. T. Tang and
C. K. Wong A modified branch-and-bound strategy . . 65--69
A. Ehrenfeucht and
G. Rozenberg A limit theorem for sets of subwords in
deterministic T0L languages . . . . . . 70--73
Masaharu Mizumoto and
Junichi Toyoda and
Kohkichi Tanaka Examples of Formal Grammars with Weights 74--78
T. B. Boffey Applying the Minimax Rule over Graphs
Which are not Trees . . . . . . . . . . 79--81
C. A. R. Hoare A general conservation law for queueing
disciplines . . . . . . . . . . . . . . 82--85
I. N. Molchanov and
M. F. Iakovlev On One Class of Iterative Methods for
Obtaining the Generalized Solution of
Non-Consistent Systems of Linear
Algebraic Equations . . . . . . . . . . 86--90
Ravi Sethi A note on implementing parallel
assignment instructions . . . . . . . . 91--95
Stein Krogdahl A dynamic storage allocation problem . . 96--99
J. Cohen Syntax-directed unit conversion . . . . 100--102
G. Yuval On a problem connected with topological
sorting . . . . . . . . . . . . . . . . 103--104
R. Devillers and
G. Louchard Realization of Petri Nets without
Conditional Statements . . . . . . . . . 105--107
Nicholas D. Roussopoulos A $ {\rm max}(m, n) $ algorithm for
determining the graph $H$ from its line
graph $G$ . . . . . . . . . . . . . . . 108--112
V. N. Kasyanov Some Properties of Fully Reducible
Graphs . . . . . . . . . . . . . . . . . 113--117
I. N. Molchanov and
E. F. Galba On the Convergence of Difference Schemes
Approximating a Plane Static Problem of
the Theory of Elasticity with Mixed
Boundary Conditions . . . . . . . . . . 118--122
Robert W. Floyd and
Alan J. Smith A linear time two tape merge . . . . . . 123--126 (or 123--125??)
J. K. R. Barnett A technique for reducing comparison
times in certain applications of the
merging method of sorting . . . . . . . 127--128
H. S. Warren, Jr. Minimal comparison sorting by choosing
most efficient comparisons . . . . . . . 129--130
Juhani Karhumäki An example of a PD2L-system with the
growth type $ 2 1 / 2 $ . . . . . . . . 131--134
L. Boasson The inclusion of the substitution
closure of linear and one-counter
languages in the largest sub-AFL of the
family of algebraic languages is proper 135--140
Nissim Francez and
Giora Slutzky On the Non-Compactness of the Class of
Program Schemas . . . . . . . . . . . . 141--142
Barry Dwyer Simple Algorithms for Traversing a Tree
without an Auxiliary Stack . . . . . . . 143--145
H. T. Kung A new upper bound on the complexity of
derivative evaluation . . . . . . . . . 146--147
H. Heuer and
I. N. Molchanov Numerical Solution of a Boundary Problem
for Equations of Elastic Equilibrium of
Bodies in Transferences . . . . . . . . 148--151
Donald E. Knuth and
Jayme L. Szwarcfiter A Structured Program to Generate All
Topological Sorting Arrangements . . . . 153--157
N. Solntseff On a Notational Device for the
Description of Pointer-Free Operations
on Structured Data . . . . . . . . . . . 158--159
R. E. Tarjan A note on finding the bridges of a graph 160--161
Robert B. K. Dewar A stable minimum storage sorting
algorithm . . . . . . . . . . . . . . . 162--164
C. A. R. Hoare Optimization of store size for garbage
collection . . . . . . . . . . . . . . . 165--166
A. G. Middleton Cost-Oriented Program Optimisation . . . 167--170
A. Hansal `Software devices' for processing graphs
using PL/1 compile time facilities . . . 171--179
L. Wayne Jackson and
Subrata Dasgupta The identification of parallel
micro-operations . . . . . . . . . . . . 180--184
K. P. Lee and
G. Rozenberg The length sets of D0L languages are
uniformly bounded . . . . . . . . . . . 185--188
Jack Minker and
Gordon J. VanderBrug The Earley algorithm as a problem
representation . . . . . . . . . . . . . 1--7
K. Noshita Median selection of $9$ elements in $
14$ comparisons . . . . . . . . . . . . 8--12
Robert Endre Tarjan A new algorithm for finding weak
components . . . . . . . . . . . . . . . 13--15
Lee W. Cooprider and
F. Heymans and
P. J. Courtois and
David L. Parnas Information Streams Sharing a Finite
Buffer: Other Solutions . . . . . . . . 16--21
J. van Leeuwen and
C. H. Smith An improved bound for detecting looping
configurations in deterministic DPA's 22--24
Oscar H. Ibarra A note on semilinear sets and
bounded-reversal multihead pushdown
automata . . . . . . . . . . . . . . . . 25--28
David A. Fisher Bounded Workspace Garbage Collection in
an Address-Order Preserving List
Processing Environment . . . . . . . . . 29--32
A. D. Jovanovich Note on a modification of the
fundamental cycles finding algorithm . . 33
T. Takaoka A note on the ambiguity of context-free
grammars . . . . . . . . . . . . . . . . 35--36
J. A. Campbell Optimal use of storage in a simple model
of garbage collection . . . . . . . . . 37--38
M. V. Zelkowitz Structured operating system organization 39--42
L. E. Deimel, Jr. Remark on the computational power of a
Turing machine variant . . . . . . . . . 43--45
Stefan Arnborg Abstract Computation Model Used for a
Production Compiler . . . . . . . . . . 46--50
R. E. Tarjan A good algorithm for edge-disjoint
branching . . . . . . . . . . . . . . . 51--53
Kojiro Kobayashi A note on extending equivalence theories
of algorithms . . . . . . . . . . . . . 54--56
N. S. Sridharan Computer Generation of Vertex Graphs . . 57--63
Donald E. Knuth and
Jayme L. Szwarcfiter Erratum: ``A Structured Program to
Generate All Topological Sorting
Arrangements'' . . . . . . . . . . . . . 64--64
Richard J. Lipton and
Robert W. Tuttle A synchronization anomaly . . . . . . . 65--66
Chiharu Hosono On the Cardinality of Some Lattices . . 67--68
S. H. Von Solms On T0L Languages over Terminals . . . . 69--70
Subrata Dasgupta and
John Tartar On the Minimization of Control Memories 71--74
T. Kameda On the Vector Representation of the
Reachability in Planar Directed Graphs 75--77
S. Crespi-Reghizzi and
D. Mandrioli A decidability theorem for a class of
vector-addition systems . . . . . . . . 78--80
P. M. Camerini and
F. Maffioli Bounds for $3$-matroid intersection
problems . . . . . . . . . . . . . . . . 81--83
John F. Reiser and
Donald E. Knuth Evading the Drift in Floating-Point
Addition . . . . . . . . . . . . . . . . 84--87
Ivan Dal Bono and
Mauro Diligenti and
Concetta Mosca and
Antonio Ricci and
Antonio Villani A simple FORTRAN support for
computer-assisted instruction . . . . . 88--90
Klaus Weihrauch Program Schemata with Polynomial Bounded
Counters . . . . . . . . . . . . . . . . 91--96
S. Galand and
C. Loncour Structured Implementation of Symbolic
Execution: a First Part in a Program
Verifier . . . . . . . . . . . . . . . . 97--103
Jacques Cohen Interpretation of Non-Deterministic
Algorithms in Higher-Level Languages . . 104--109
Fanica Gavril An algorithm for testing chordality of
graphs . . . . . . . . . . . . . . . . . 110--112
G. Yuval Finding near neighbours in
$K$-dimensional space . . . . . . . . . 113--114
I. Cahit and
R. Cahit On the Graceful Numbering of Spanning
Trees . . . . . . . . . . . . . . . . . 115--118
B. Wegbreit Retrieval from context trees . . . . . . 119--120
S. de Wolf and
G. de Mey Numerical Methods for Solving Integral
Equations of Potential Problems . . . . 121--124
J. M. Robson A simple solution to the interleaved
memory bandwidth problem . . . . . . . . 125--126
Constantine Lazos A Comparison of Simulation Results and a
Mathematical Model of a Multiprogramming
System . . . . . . . . . . . . . . . . . 127--134
J. Kittler On the divergence and the Joshi
dependence measure in feature selection 135--137
Jan Van Leeuwen The membership question for
ET0L-languages is polynomially complete 138--143
F. P. Preparata and
D. E. Muller The time required to evaluate
division-free arithmetic expressions . . 144--146
H. Asai and
S. C. Lee Design of Queueing Buffer Register Size 147--152
A. Stevens An elementary computer algorithm for the
calculation of the coefficient of
inbreeding . . . . . . . . . . . . . . . 153--163
S. Crespi-Reghizzi and
D. Mandrioli Erratum: ``A decidability theorem for a
class of vector-addition systems'' . . . 164--164
John F. Reiser and
Donald E. Knuth Erratum: ``Evading the Drift in
Floating-Point Addition'' . . . . . . . 164--164
N. S. Sridharan Erratum: ``Computer Generation of Vertex
Graphs'' . . . . . . . . . . . . . . . . 164--164
Per Brinch Hansen Universal Types in Concurrent Pascal . . 165--166
D. A. Zave A fast compacting garbage collector . . 167--169
J. L. Bentley and
D. F. Stanat Analysis of range searches in quad trees 170--173
C. Ghezzi LL(1) grammars supporting an efficient
error handling . . . . . . . . . . . . . 174--176
H. F. de Groote On the complexity of quaternion
multiplication . . . . . . . . . . . . . 177--179
Stefan Pleszczy\'nski On the Generation of Permutations . . . 180--183
M. Rem On the programming of elastic stores . . 184--187
R. A. Keir Should the stable rounding rule be
radix-dependent? . . . . . . . . . . . . 188--189
Andrew C. Yao An $ O(|E|) \log \log |V| $ algorithm
for finding minimum spanning trees . . . 21--23
G. Germano and
A. Maggiolo-Schettini Sequence-to-sequence recursiveness . . . 1--6
K. Ruohonen Three results of comparison between $L$
languages with and without interaction 7--10
Martti Penttonen ET0L-Grammars and $N$-Grammars . . . . . 11--13
J. Nieminen On homomorphic images of transition
graphs . . . . . . . . . . . . . . . . . 14--15
J. Nieminen Some observations on the determination
of an upper bound for the clique number
of a graph . . . . . . . . . . . . . . . 16--17
A. N. C. Kang and
D. A. Ault Some properties of a centroid of a free
tree . . . . . . . . . . . . . . . . . . 18--20
A. C. Yao An $ O(|E|) \log \log |V| $ algorithm
for finding minimum spanning trees . . . 21--23
J. Misra and
R. E. Tarjan Optimal chain partitions of trees . . . 24--26
Andrzej Rowicki A note on optimal scheduling for
two-processor systems . . . . . . . . . 27--30
Stanislaw Jarzabek and
Tomasz Krawczyk LL-regular grammars . . . . . . . . . . 31--37
M. R. Levy Complete operator precedence . . . . . . 38--40
E. Cockayne and
S. Goodman and
S. Hedetniemi A linear algorithm for the domination
number of a tree . . . . . . . . . . . . 41--44
L. Hyafil and
J. P. Van de Wiele On the additive complexity of specific
polynomials . . . . . . . . . . . . . . 45--47
R. S. Anderssen and
A. J. Guttmann A rationale for the numerical
differentiation of experimental data . . 48--50
A. A. Sekey A generating function for entropy . . . 51
Donald B. Johnson Priority Queues with Update and Finding
Minimum Spanning Trees . . . . . . . . . 53--57
D. Rotem On a correspondence between binary trees
and a certain type of permutation . . . 58--61
D. W. Clark A fast algorithm for copying binary
trees . . . . . . . . . . . . . . . . . 62--63
J. Banerjee and
V. Rajaraman A dual link data structure for random
file organization . . . . . . . . . . . 64--69
A. G. Duncan and
L. Yelowitz Loop unravelling: a practical tool in
proving program correctness . . . . . . 70--72
R. Christensen Crossvalidation: Minimizing the entropy
of the future . . . . . . . . . . . . . 73--76
Judea Pearl On the Complexity of Inexact
Computations . . . . . . . . . . . . . . 77--81
H. G. Barrow and
R. M. Burstall Subgraph isomorphism, matching
relational structures and maximal
cliques . . . . . . . . . . . . . . . . 83--84
Zvi Galil Two Fast Simulations Which Imply Some
Fast String Matching and
Palindrome-Recognition Algorithms . . . 85--87
L. Lamport Comments on ``A synchronization
anomaly'' . . . . . . . . . . . . . . . 88--89
Russell L. Wessner Optimal Alphabetic Search Trees with
Restricted Maximal Height . . . . . . . 90--94
Tomas Lang and
Eduardo B. Fernandez Scheduling of Unit-Length Independent
Tasks with Execution Constraints . . . . 95--98
M. S. Krishnamurthy and
H. R. Ramesha Chandra A note on precedence functions . . . . . 99--100
H. D. Ehrich and
W. Lipski, Jr. On the Storage Space Requirement of
Consecutive Retrieval with Redundancy 101--104
Stefan Feyock Noiselike Transforms of $ \omega
$-Events . . . . . . . . . . . . . . . . 105--108
D. R. Hanson A simple variant of the boundary-tag
algorithm for the allocation of
coroutine environments . . . . . . . . . 109--112 (or 109--111??)
Stanislaw Chrobot Layer --- a Language Construction for
Concurrent Structural Program Design . . 113--117
R. J. Cunningham and
M. E. J. Gilford A note on the semantic definition of
side effects . . . . . . . . . . . . . . 118--120
Wolfgang Coy The logical meaning of programs of a
subrecursive language . . . . . . . . . 121--126
G. Rozenberg On slicing of $K$-iteration grammars . . 127--131
Jon Louis Bentley and
Walter A. Burkhard Heuristics for Partial-Match Retrieval
Data Base Design . . . . . . . . . . . . 132--135
S. de Wolf and
G. de Mey Numerical Solution of Integral Equations
for Potential Problems by a Variational
Principle . . . . . . . . . . . . . . . 136--139
P. A. Pritchard A proof rule for multiple coroutine
systems . . . . . . . . . . . . . . . . 141--143
Peter J. A. Reusch Generalized Lattices Applicable in
Retrieval Models . . . . . . . . . . . . 144--148
D. Dobkin and
J. Van Leeuwen The complexity of vector-products . . . 149--154
G. Yuval An algorithm for finding all shortest
paths using $ N^{2.81} $
infinite-precision multiplications . . . 155--156
J. Engelfriet and
S. Skyum Copying theorems . . . . . . . . . . . . 157--161
G. Rozenberg and
D. Wood A note on $K$-iteration grammars . . . . 162--164
Roman Krzemie\'n and
Andrezej \Lukasiewicz Automatic Generation of Lexical
Analyzers in a Compiler-Compiler . . . . 165--168
B. K. Gairola and
V. Rajaraman A distributed index sequential access
method . . . . . . . . . . . . . . . . . 1--5
G. K. Manacher An application of pattern matching to a
problem in geometrical complexity . . . 6--7
E. Arjomandi On finding all unilaterally connected
components of a digraph . . . . . . . . 8--10
H. A. Maurer and
Th. Ottmann and
H.-W. W. Six Implementing Dictionaries Using Binary
Trees of Very Small Height . . . . . . . 11--14
L. Hyafil and
R. L. Rivest Constructing optimal binary decision
trees is NP-complete . . . . . . . . . . 15--17
A. B. Barak On the parallel evaluation of
division-free arithmetic expressions
with fan-in of three . . . . . . . . . . 18--19
L. G. Valiant Relative complexity of checking and
evaluating . . . . . . . . . . . . . . . 20--23
Patrick Shen-Pei Wang Recursiveness of Monotonic Array
Grammars and a Hierarchy of Array
Languages . . . . . . . . . . . . . . . 24--26
G. Marsaglia and
K. Ananthanarayanan and
N. J. Paul Improvements on Fast Methods for
Generating Normal Random Variables . . . 27--30
M. Sassa and
E. Goto A Hashing Method for Fast Set Operations 31--34
C. J. Lucena and
D. D. Cowan Toward a system's environment for
computer assisted programming . . . . . 35--40
Niel K. Madsen and
Garry H. Rodrigue and
Jack I. Karush Matrix Multiplication by Diagonals on a
Vector/Parallel Processor . . . . . . . 41--45
R. L. Probert Commutativity, non-commutativity, and
bilinearity . . . . . . . . . . . . . . 46--49
P. Hansen A cascade algorithm for the logical
closure of a set of binary relations . . 50--54
S. Kundu A linear algorithm for the Hamiltonian
completion number of a tree . . . . . . 55--57
D. Mandrioli $n$-Reconstructability of context-free
grammars . . . . . . . . . . . . . . . . 58--62
G. Yuval Finding nearest neighbours . . . . . . . 63--65
E. L. Lawler A note on the complexity of the
chromatic number problem . . . . . . . . 66--67
F. Luccio and
F. P. Preparata Storage for Consecutive Retrieval . . . 68--71
Nicola Santoro Full Table Search by Polynomial
Functions . . . . . . . . . . . . . . . 72--74
D. A. Zave A series expansion involving the
harmonic numbers . . . . . . . . . . . . 75--77
E. L. Lozinskii On a problem in storage optimization . . 78--80
R. K. Shyamasundar A note on linear precedence functions 81
J. L. Bentley and
A. Chi-Chih Yao An almost optimal algorithm for
unbounded searching . . . . . . . . . . 82--87
K. S. Trivedi On a semaphore anomaly . . . . . . . . . 88--89
Patrick Shen-Pei Wang Erratum: ``Recursiveness of Monotonic
Array Grammars and a Hierarchy of Array
Languages'' . . . . . . . . . . . . . . 90--90
Donald R. Innes and
Shalom Tsur Interval Analysis, Pagination and
Program Locality . . . . . . . . . . . . 91--96
L. Meertens A space-saving technique for assigning
ALGOL 68 multiple values . . . . . . . . 97--99
C. T. Yu and
D. T. Johnson On the complexity of finding the set of
candidate keys for a given set of
functional dependencies . . . . . . . . 100--101
G. Rozenberg More on ET0L systems versus random
context grammars . . . . . . . . . . . . 102--106
Behrokh Samadi $B$-Trees in a System with Multiple
Users . . . . . . . . . . . . . . . . . 107--112
H. N. Gabow Some improved bounds on the number of
$1$-factors of $n$-connected graphs . . 113--115
G. V. Bochmann Comments on monitor definition and
implementation . . . . . . . . . . . . . 116--117
M. Boari and
A. Natali Some properties of deadlock detection
and recovery in readers' and writers'
problems . . . . . . . . . . . . . . . . 118--123 (or 118--122??)
P. Hansen Erratum: ``A cascade algorithm for the
logical closure of a set of binary
relations'' . . . . . . . . . . . . . . 124--124
K. Delcour and
A. J. W. Duijvestein Enclosures: an access control mechanism
with applications in parallel
programming and other areas of system
programming . . . . . . . . . . . . . . 125--135
M. A. Hennell and
M. R. Woodward and
D. Hedley On Program Analysis . . . . . . . . . . 136--140
Giovanni Guida and
Marco Somalvico Semantics in Problem Representation and
Search . . . . . . . . . . . . . . . . . 141--145
Jon Doyle and
Ronald L. Rivest Linear Expected Time of a Simple
Union-Find Algorithm . . . . . . . . . . 146--148
M. Linna The D0L-ness for context-free languages
is decidable . . . . . . . . . . . . . . 149--151
J. Duske and
R. Parchmann and
H. Schumacher A pattern representation of indexed
languages . . . . . . . . . . . . . . . 152--154
Daniel P. Friedman and
David S. Wise Output Driven Interpretation of
Recursive Programs, or Writing Creates
and Destroys Data Structures . . . . . . 155--160
Daniel P. Friedman and
David S. Wise Garbage Collecting a Heap Which Includes
a Scatter Table . . . . . . . . . . . . 161--164
H. N. Gabow A note on degree-constrained star
subgraphs of bipartite graphs . . . . . 165--167
K. Mehlhorn Bracket-languages are recognizable in
logarithmic space . . . . . . . . . . . 168--170
R. Kaye A Gray Code for set partitions . . . . . 171--173
H. Partsch and
P. Pepper A family of rules for recursion removal 174--177
Donald E. Knuth A generalization of Dijkstra's algorithm 1--5
G. Yuval Theil's estimator . . . . . . . . . . . 6--7
E. Goto and
T. Ida and
T. Gunji Parallel Hashing Algorithms . . . . . . 8--13
Narsingh Deo and
M. S. Krishnamoorthy and
Ajit B. Pai Generalizations of line graphs and
applications . . . . . . . . . . . . . . 14--17
F. Chin and
K. Steiglitz A fast error evaluation algorithm for
polynomial approximation . . . . . . . . 18--21
S. S. Reddi Alternate solutions to the cigarette
smokers' problem without conditionals 22--24
A. Rowicki A note on optimal preemptive scheduling
for two-processor systems . . . . . . . 25--28
T. H. Merret Relations as programming language
elements . . . . . . . . . . . . . . . . 29--33
C. P. Schnorr and
H. Klupp A universally hard set of formulae with
respect to non-deterministic Turing
acceptors . . . . . . . . . . . . . . . 35--37
A. P. Ershov On the partial computation principle . . 38--41
R. Zuczek The universal space for parallel
computation . . . . . . . . . . . . . . 42--45
A. Endres and
H.-G. Stork FIFO-optimal placement on pages of
independently referenced sectors . . . . 46--49
Masataka Sassa and
Eiichi Goto ``V-Tape'', a Virtual Memory Oriented
Data Type, and its Resource Requirements 50--55
J. P. Banatre Producing optimised code for coercions 56--59
M. H. Williams Complete operator precedence conditions 60--62
V. Rajaraman and
Om Vikas A first-in-first-out buffered cyclic
memory . . . . . . . . . . . . . . . . . 63--68
T. Hikita and
E. Goto An $ O(N) $ Algorithm for Finding
Periodicity of a Sequence Using Hash
Coding . . . . . . . . . . . . . . . . . 69--71
Daniel P. Friedman and
David S. Wise Erratum: ``Garbage Collecting a Heap
Which Includes a Scatter Table'' . . . . 72--72
E. A. Dinic and
A. K. Kelmans and
M. A. Zaitsev Nonisomorphic trees with the same
$T$-polynomial . . . . . . . . . . . . . 73--76
J. Kittler A method for determining class subspaces 77--79
P. van Emde Boas Preserving order in a forest in less
than logarithmic time and linear space 80--82
A. Javor An adaptive time advancement algorithm
for discrete simulation . . . . . . . . 83--86
H. Würgens Comments on ``Error resynchronisation in
producer consumer systems'' . . . . . . 87--90
W. Lipski, Jr. One more polynomial complete consecutive
retrieval problem . . . . . . . . . . . 91--93
S. Kundu Sorting tree, nestling tree and inverse
permutation . . . . . . . . . . . . . . 94--96
K.-J. Räihä and
M. Saarinen An optimization of the alternating
semantic evaluator . . . . . . . . . . . 97--100
J. Cohen and
J. Katcoff Automatic solution of a certain class of
combinatorial problems . . . . . . . . . 101--104
Jozef Winkowski An algebraic characterization of the
behaviour of non-sequential systems . . 105--109
N. D. Jones A note on linear time simulation of
deterministic two-way pushdown automata 110--112
D. A. Turner Error diagnosis and recovery in one pass
compilers . . . . . . . . . . . . . . . 113--115
S. H. Talbert On the formal specification of the
semantics of processed information . . . 116--119
Y. Kobuchi Two characterization theorems of locally
catenative developmental systems . . . . 120--124
A. Brandwajn and
B. Mouneix A study of a page-on-demand system . . . 125--132
V. V. Raghavan and
C. T. Yu A note on a multidimensional searching
problem . . . . . . . . . . . . . . . . 133--135
G. H. Gonnet and
L. D. Rogers The interpolation-sequential search
algorithm . . . . . . . . . . . . . . . 136--139
M. Shaw and
J. F. Traub Selection of good algorithms from a
family of algorithms for polynomial
derivative evaluation . . . . . . . . . 141--145
L. \Lukaszewicz Functional grammars . . . . . . . . . . 146--150
George E. Collins and
David R. Musser Analysis of the Pope--Stein Division
Algorithm . . . . . . . . . . . . . . . 151--155
J. Grant Null Values in a Relational Data Base 156--157
T. D. Bui On an $L$-stable method for stiff
differential equations . . . . . . . . . 158--161
J. B\lazewicz Simple algorithms for multiprocessor
scheduling to meet deadlines . . . . . . 162--164
S. Matwin On the completeness of a set of
transformations optimizing linear
programs . . . . . . . . . . . . . . . . 165--167
R. S. Bird Two dimensional pattern matching . . . . 168--170
I. Cahit Realization of graceful permutation by a
shuffle-exchange network . . . . . . . . 171--173
P. W. Grant Recognition of E0L languages in less
than quatric time . . . . . . . . . . . 174--176 (or 174--175??)
S. Matwin An experimental investigation of
Geschke's method of global program
optimization . . . . . . . . . . . . . . 177--179
J. M. Steckelberg and
S. C. Seth On a relation between algebraic programs
and Turing machines . . . . . . . . . . 180--183
S. M. Selkow The tree-to-tree editing problem . . . . 184--186
J. Madsen An experiment in formal definition of
operating system facilities . . . . . . 187--189
J. Albert and
H. A. Maurer The class of context-free languages is
not an E0L family . . . . . . . . . . . 190--195
N. Francez A case for a forward predicate
transformer . . . . . . . . . . . . . . 196--198
Fanica Gavril Testing for equality between maximum
matching and minimum node covering . . . 199--202
I. S. Herschberg and
J. C. A. Boekhorst Concurrent file access under
unpredictability . . . . . . . . . . . . 203--208
Jon L. Bentley and
Donald F. Stanat and
E. Hollins Williams, Jr. The complexity of finding fixed-radius
near neighbors . . . . . . . . . . . . . 209--212
I. H. Sudborough A note on weak operator precedence
grammars . . . . . . . . . . . . . . . . 213--218
Yehoshua Perl and
Edward M. Reingold Understanding the complexity of
interpolation search . . . . . . . . . . 219--222
Lyle Ramshaw Binomial coefficients with non-integral
lower index . . . . . . . . . . . . . . 223--226
P. W. Grant Addendum: ``Recognition of E0L languages
in less than quatric time'' . . . . . . 228--228
W\lodzimierz Dobosiewicz Sorting by Distributive Partitioning . . 1--6
Danny Dolev and
Eliahu Shamir Commutation Relations of Slices
Characterize Some Synchronization
Primitives . . . . . . . . . . . . . . . 7--9
P. M. Camerini The Min-Max Spanning Tree Problem and
Some Extensions . . . . . . . . . . . . 10--14
Andreas Karayiannis and
Georghios Loizou Cycle Detection in Critical Path
Networks . . . . . . . . . . . . . . . . 15--19
Shalom Tsur Analysis of Queuing Networks in Which
Processes Exhibit Locality-Transition
Behaviour . . . . . . . . . . . . . . . 20--23
Stefano Crespi-Reghizzi and
Dino Mandrioli A Class of Grammar Generating
Non-Counting Languages . . . . . . . . . 24--26
Motoaki Terashima and
Eiichi Goto Genetic order and compactifying garbage
collectors . . . . . . . . . . . . . . . 27--32
Karel Culik, II The Decidability of $ \nu $-Local
Catenativity and of Other Properties of
D0L systems . . . . . . . . . . . . . . 33--35
W. E. Howden Lindenmayer Grammars and Symbolic
Testing . . . . . . . . . . . . . . . . 36--39
D. S. Hirschberg An Information-Theoretic Lower Bound for
the Longest Common Subsequence Problem 40--41
Jan Bergstra What is an abstract data type? . . . . . 42--43
F. James Rohlf A Probabilistic Minimum Spanning Tree
Algorithm . . . . . . . . . . . . . . . 44--48
Katsushi Inoue and
Itsuo Takanami and
Akira Nakamura A Note on Two-Dimensional Finite
Automata . . . . . . . . . . . . . . . . 49--52
Kenneth R. Anderson A Reevaluation of an Efficient Algorithm
for Determining the Convex Hull of a
Finite Planar Set . . . . . . . . . . . 53--55
J. Koplowitz and
D. Jouppi A More Efficient Convex Hull Algorithm 56--57
Dennis de Champeaux SUBSTAD: For Fast Substitution in LISP,
With an Application on Unification . . . 58--62
J. Winkowski Erratum: ``An algebraic characterization
of the behaviour of non-sequential
systems'' . . . . . . . . . . . . . . . 63--63
Anonymous A tribute to referees . . . . . . . . . 64--64
W. F. McColl The maximum depth of monotone formulae 65
Yahiko Kambayashi and
Takaki Hayashi and
Yoshikazu Tanaka and
Shuzo Yajima A linear storage space algorithm for a
reference structure index . . . . . . . 66--71
A. S. Sethi and
V. Rajaraman and
P. S. Kenjale An error-correcting coding scheme for
alphanumeric data . . . . . . . . . . . 72--77
A. Brandwajn and
Ph. Kruchten and
J. A. Hernandez ARCADE: a system for research and
education in computer architecture . . . 78--85
S. G. Akl Comments on: G. Manacher, ``An
application of pattern matching to a
problem in geometrical complexity'' . . 86
J. L. Bentley and
M. I. Shamos Divide and conquer for linear expected
time . . . . . . . . . . . . . . . . . . 87--91
Eero Peltola and
Hannu Erkiö Insertion Merge Sorting . . . . . . . . 92--99
G. P\uaun On the generative capacity of simple
matrix grammars of finite index . . . . 100--102
H. Samet A canonical form algorithm for proving
equivalence of conditional forms . . . . 103--106
J. Paredaens On the expressive power of the
relational algebra . . . . . . . . . . . 107--111
M. Boari and
A. Natali Multiple access to a tree in the context
of readers and writers problem . . . . . 112--121
B. F. Caviness and
H. I. Epstein A note on the complexity of algebraic
differentiation . . . . . . . . . . . . 122--124
G. A. Cheston A correction to a unilaterally connected
components algorithm . . . . . . . . . . 125
S. G. Akl and
G. T. Toussaint An improved algorithm to check for
polygon similarity . . . . . . . . . . . 127--128
S. Istrail Tag systems generating Thue irreducible
sequences . . . . . . . . . . . . . . . 129--131
Radha Krishan Arora and
R. K. Subramanian An optimal demand prepaging algorithm 132--136
W. J. Hansen A predecessor algorithm for ordered
lists . . . . . . . . . . . . . . . . . 137--138
L. Allison Phrase structures, non-determinism and
backtracking . . . . . . . . . . . . . . 139--143
G. Huet An algorithm to generate the basis of
solutions to homogeneous linear
Diophantine equations . . . . . . . . . 144--147 (or 144--146??)
F. P. Preparata and
D. V. Sarwate An Improved Parallel Processor Bound in
Fast Matrix Inversion . . . . . . . . . 148--150
S. Sokolowski A method for proving programming
languages non context-free . . . . . . . 151--153
N. Illies A counterexample to the generalized
Aanderaa-Rosenberg conjecture . . . . . 154--155
R. E. Devillers and
P. E. Lauer A general mechanism for avoiding
starvation with distributed control . . 156--158
A. Reiser A linear selection algorithm for sets of
elements with weights . . . . . . . . . 159--162
G. H. Gonnet Notes on the derivation of asymptotic
expressions from summations . . . . . . 165--169
Joost Engelfriet On tree transducers for partial
functions . . . . . . . . . . . . . . . 170--172
S. M. Selkow New bounds for the clique number of a
graph . . . . . . . . . . . . . . . . . 173--174
M. R. Garey and
D. S. Johnson and
F. P. Preparata and
R. E. Tarjan Triangulating a Simple Polygon . . . . . 175--179
G. Schachtel A noncommutative algorithm for
multiplying $ 5 \times 5 $ matrices
using $ 103 $ multiplications . . . . . 180--182
G. Bongiovanni and
F. Luccio On Cahit's result on graceful
permutations . . . . . . . . . . . . . . 183--184
Richard J. Lipton and
Raymond E. Miller A batching method for coloring planar
graphs . . . . . . . . . . . . . . . . . 185--188
D. T. Lee and
F. P. Preparata The all nearest-neighbor problem for
convex polygons . . . . . . . . . . . . 189--192
R. A. DeMillo and
R. J. Lipton A probabilistic remark on algebraic
program testing . . . . . . . . . . . . 193--195
J. Jaffe Counting productions in context-free
derivations . . . . . . . . . . . . . . 196--200
Charles E. Hughes The equivalence of vector addition
systems to a subclass of Post canonical
systems . . . . . . . . . . . . . . . . 201--204
W. Burton Comments on: Sorting by distributive
partitioning . . . . . . . . . . . . . . 205--206
W. Dobosiewicz Author's reply to Warren Burton's
comments on distributive partitioning
sorting . . . . . . . . . . . . . . . . 206--206
M. Boari and
A. Natali Erratum: ``Multiple access to a tree in
the context of readers and writers
problem'' . . . . . . . . . . . . . . . 207--207
K. Ruohonen A note on language equations involving
morphisms . . . . . . . . . . . . . . . 209--212
I. H. Sudborough A note on weak operator precedence
grammars . . . . . . . . . . . . . . . . 213--218
Selim G. Akl and
Godfried T. Toussaint A fast convex hull algorithm . . . . . . 219--222
I. Bratko Proving correctness of strategies in the
AL1 assertional language . . . . . . . . 223--230
M. R. Brown A storage scheme for height-balanced
trees . . . . . . . . . . . . . . . . . 231--232
Radha Krishan Arora and
R. K. Subramanian Exploiting the Optimal Paging Algorithms 233--236
Kohei Noshita and
Etsuo Masuda and
Hajime Machida On the expected behaviors of the
Dijkstra's shortest path algorithm for
complete graphs . . . . . . . . . . . . 237--243
L. Czaja Implementation approach to parallel
systems . . . . . . . . . . . . . . . . 244--249
T. H. Merret QT logic: simpler and more expressive
than predicate calculus . . . . . . . . 251--255
V. M. Glushkov and
G. E. Tseytlin and
E. L. Yushchenko Certain problems of the theory of
structured programs schemes . . . . . . 256--260
K. S. Natarajan and
Lee J. White Optimum Domination in Weighted Trees . . 261--265
János Demetrovics On the Number of Candidate Keys . . . . 266--269
Miklós Ajtai and
János Komlós and
Endre Szemerédi There is No Fast Single Hashing
Algorithm . . . . . . . . . . . . . . . 270--273
Michael R. Garey and
Robert E. Tarjan A linear-time algorithm for finding all
feedback vertices . . . . . . . . . . . 274--276
V. M. Malhotra and
M. Pramodh Kumar and
S. N. Maheshwari An $ O(V^3) $ algorithm for finding
maximum flows in networks . . . . . . . 277--278
Robert Giegerich and
Reinhard Wilhelm Counter-One-Pass Features in One-Pass
Compilation: a Formalization Using
Attribute Grammars . . . . . . . . . . . 279--284
G. Yuval A simple proof of Strassen's result . . 285--286
E. P. Friedman and
S. A. Greibach On Equivalence and Subclass Containment
Problems for Deterministic Context-Free
Languages . . . . . . . . . . . . . . . 287--290
Ludwik Czaja Parallel Implementation of Path
Expressions . . . . . . . . . . . . . . 291--295
A. Bykat Convex hull of a finite set of points in
two dimensions . . . . . . . . . . . . . 296--298
Joseph Shortt An iterative program to calculate
Fibonacci numbers in $ O(\log n) $
arithmetic operations . . . . . . . . . 299--303
M. Jakobsson Huffman coding in bit-vector compression 304--307
Jukka Teuhola A compression method for clustered
bit-vectors . . . . . . . . . . . . . . 308--311
D. W. Clark and
C. C. Green A note on shared list structure in LISP 312--314
Christos H. Papadimitriou Efficient search for rationals . . . . . 1--4
K. Culik, II Some decidability results about regular
and pushdown translations . . . . . . . 5--8
Aviezri S. Fraenkel Paired Sequential Lists in a Memory
Interval . . . . . . . . . . . . . . . . 9--10
Sylvia L. Osborn Testing for Existence of a Covering
Boyce-Codd Normal Form . . . . . . . . . 11--14
Katsushi Inoue and
Itsuo Takanami A note on cyclic closure operations . . 15--16
Dana Angluin A note on a construction of Margulis . . 17--19
Steve Fortune and
John Hopcroft A note on Rabin's nearest-neighbor
algorithm . . . . . . . . . . . . . . . 20--23
Yossi Shiloach Edge-disjoint branching in directed
multigraphs . . . . . . . . . . . . . . 24--27
Adi Shamir Factoring numbers in $ O(\log n) $
arithmetic steps . . . . . . . . . . . . 28--31
M. Jantzen A note on vector grammars . . . . . . . 32--33
Katsushi Inoue and
Itsuo Takanami A note on bottom-up pyramid acceptors 34--37
A. Buda Generalized ${}^{1, 5}$ Sequential
Machine Maps . . . . . . . . . . . . . . 38--40
Daniel P. Friedman and
David S. Wise Reference Counting Can Manage the
Circular Environments of Mutual
Recursion . . . . . . . . . . . . . . . 41--45
O. M. Makarov Using duality to compute the pair of
matrix products $ Q Y $ and $ Y^T Q $
over a commutative ring . . . . . . . . 46--49
Alberto Bertoni and
Giancarlo Mauri and
Mauro Torelli Three efficient algorithms for counting
problems . . . . . . . . . . . . . . . . 50--53
G. H. Gonnet Erratum to ``Notes on the derivation of
asymptotic expressions from summations''
[Inform. Process. Lett. \bf 7(4), June
1978, pp. 165--169] . . . . . . . . . . 54--54
Gordon Lyon Batch Scheduling from Short Lists . . . 57--59
Jacek B\la\.zewicz Deadline scheduling of tasks with ready
times and resource constraints . . . . . 60--63
Dan A. Simovici and
Gh. Grigora\cedlas Even initial feedback vertex set problem
is NP-complete . . . . . . . . . . . . . 64--66
J. L. W. Kessels and
A. J. Martin Two implementations of the conditional
critical region using a split binary
semaphore . . . . . . . . . . . . . . . 67--71
M. Van Der Nat Binary Merging by Partitioning . . . . . 72--75
J. M. Morris A starvation-free solution to the mutual
exclusion problem . . . . . . . . . . . 76--80
Jayadev Misra Space-time trade off in implementing
certain set operations . . . . . . . . . 81--85
H. W. Lenstra, Jr. Miller's primality test . . . . . . . . 86--88
Steven P. Reiss Rational search . . . . . . . . . . . . 89--90
H. S. M. Kruijer Self-stabilization (in spite of
distributed control) in tree-structured
systems . . . . . . . . . . . . . . . . 91--95
David Dobkin and
Richard J. Lipton and
Steven P. Reiss Linear programming is log-space hard for
$P$ . . . . . . . . . . . . . . . . . . 96--97
T. H. Pequeno and
C. J. Lucena An approach for data type specification
and its use in program verification . . 98--103
Gheorghe P\uaun On Szilard's languages associated to a
matrix grammar . . . . . . . . . . . . . 104--105
J. C. Cherniavsky On finding test data sets for loop free
programs . . . . . . . . . . . . . . . . 106--107
S. G. Akl Two remarks on a convex hull algorithm 108--109
Yu. G. Stoyan and
V. Z. Socolovsky The minimization method for some
permutation functionals . . . . . . . . 110--111
C. C. Rick and
D. J. Evans An Improved Bisection Algorithm . . . . 112--113
Wojciech Cellary A new safety test for deadlock avoidance 115--120
Bengt Aspvall and
Michael F. Plass and
Robert Endre Tarjan A linear-time algorithm for testing the
truth of certain quantified Boolean
formulas . . . . . . . . . . . . . . . . 121--123
Om Vikas Analysis of a Periodically Inspected
Buffer . . . . . . . . . . . . . . . . . 124--130
Rudolf Mathon A note on the graph isomorphism counting
problem . . . . . . . . . . . . . . . . 131--132
Jon Louis Bentley and
Hermann A. Maurer A note on Euclidean near neighbor
searching in the plane . . . . . . . . . 133--136
Gerard J. M. Sang Ajang and
Frank Teer An efficient algorithm for detection of
combined occurrences . . . . . . . . . . 137--140
Sukhamay Kundu An intermediate-value theorem for
optimum tree valuation . . . . . . . . . 141--145
Yossi Shiloach Strong linear orderings of a directed
network . . . . . . . . . . . . . . . . 146--148
Jan van Leeuwen On Compromising Statistical Data-Bases
with a Few Known Elements . . . . . . . 149--153
M. R. Brown Addendum to ``A storage scheme for
height-balanced trees'' . . . . . . . . 154--156
S. G. Akl and
G. T. Toussaint Addendum to ``An improved algorithm to
check for polygon similarity'' . . . . . 157--158
M. A. Bonuccelli and
D. P. Bovet Minimum Node Disjoint Path Covering for
Circular-Arc Graphs . . . . . . . . . . 159--161
Ludwik Czaja A specification of parallel problems . . 162--167
Martin Huits and
Vipin Kumar The Practical Significance of
Distributive Partitioning Sort . . . . . 168--169
W\lodzimierz Dobosiewicz The Practical Significance of D.P. Sort
Revisited . . . . . . . . . . . . . . . 170--172
Alain Fournier Comments on convex hull of a finite set
of points in two dimensions [Inform.
Process. Lett. \bf 7 (1978), no. 6,
296--298; MR 80b:68041] . . . . . . . . 173--173
Hirosi Hitotumatu and
Kohei Noshita A technique for implementing backtrack
algorithms and its application . . . . . 174--175
J. Henno The depth of monotone functions in
multivalued logic . . . . . . . . . . . 176--177
Ronald L. Rivest and
Jean-Paul Van de Wiele An $ \Omega ((n / \lg n)^{1 / 2}) $
lower bound on the number of additions
necessary to compute $0$-$1$ polynomials
over the ring of integer polynomials . . 178--180
K. Culik, II and
H. A. Maurer Secure Information Storage and Retrieval
Using New Results in Cryptography . . . 181--186
Esko Ukkonen The nonexistence of some covering
context-free grammars . . . . . . . . . 187--192
C. C. Yang and
D. T. Lee A note on the all nearest-neighbor
problem for convex polygons . . . . . . 193--194
David Harel Two results on process logic . . . . . . 195--198
J. Plesník The NP-completeness of the Hamiltonian
cycle problem in planar digraphs with
degree bound two . . . . . . . . . . . . 199--201
P. S. Pankov and
Si. L. Dolmatov Substantiable evaluations by electronic
computers and their application to one
problem in combinatorial geometry . . . 202--203
Felix J. Fridman and
Glenn H. Holloway and
Naftaly H. Minsky and
Josef Stein Abstract FOR-loops over several
aggregates . . . . . . . . . . . . . . . 204--206
Jörg Mühlbacher $F$-factors of graphs: a generalized
matching problem . . . . . . . . . . . . 207--214
Harold Abelson A note on time-space tradeoffs for
computing continuous functions . . . . . 215--217
T. D. Bui Erratum: ``On an $L$-stable method for
stiff differential equations'' . . . . . 218--218
Y. V. Silva-Filho Average Case Analysis of Region Search
in Balanced $k$-$d$ Trees . . . . . . . 219--223
M. Broy and
M. Wirsing and
J.-P. Finance and
A. Quéré and
J.-L. Remy Methodical Solution of the Problem of
Ascending Subsequences of Maximum Length
Within a Given Sequence . . . . . . . . 224--229
Timo Leipälä On a Generalization of Binary Search . . 230--233
Dario Bini and
Milvio Capovani and
Francesco Romani and
Grazia Lotti $ O(n^{2.7799}) $ complexity for $ n
\times n $ approximate matrix
multiplication . . . . . . . . . . . . . 234--235
Yossi Shiloach A fast equivalence-checking algorithm
for circular lists . . . . . . . . . . . 236--238
Wolfgang Reising A note on the representation of finite
tree automata . . . . . . . . . . . . . 239--240
D. Van der Knijff and
J.-L. Lassez A clarification of the comparison
between some measures of software
science . . . . . . . . . . . . . . . . 241--243
Jon Louis Bentley Decomposable Searching Problems . . . . 244--251
Georghios Loizou Mathematical Solution for a Data
Processing System . . . . . . . . . . . 252--256
Keijo Ruohonen The decidability of the F0L-D0L
equivalence problem . . . . . . . . . . 257--260
C. N. Fischer and
K. C. Tai and
D. R. Milton Immediate error detection in strong $
{\rm LL}(1) $ parsers . . . . . . . . . 261--266
Eitan M. Gurari and
Oscar H. Ibarra On the Space Complexity of Recursive
Algorithms . . . . . . . . . . . . . . . 267--271
Arnold L. Rosenberg A note on paths embedded in trees . . . 272--273
N. Soundararajan Axiomatic proofs of total correctness of
programs . . . . . . . . . . . . . . . . 274--277
G. Yuval Corrigendum: ``A simple proof of
Strassen's result'' (Inform. Process.
Lett. \bf 7 (1978), no. 6, 285--286) . . 278--278
Hamish I. E. Gunn and
Ronald Morrison On the implementation of constants . . . 1--4
P. A. S. Veloso Characterizing the regular prefix codes
and right power-bounded languages . . . 5--7
John C. Cherniavsky and
John Keohane and
Peter B. Henderson A note concerning top down program
development and restricted exit control
structures . . . . . . . . . . . . . . . 8--12
D. M. Berry and
R. L. Schwartz United and discriminated record types in
strongly typed languages . . . . . . . . 13--18
P. J. Eberlein A note on median selection and spider
production . . . . . . . . . . . . . . . 19--22
A. Bykat On polygon similarity . . . . . . . . . 23--25
H. B. M. Jonkers A fast garbage compaction algorithm . . 26--30
Glenn K. Manacher and
Albert L. Zobrist Neither the Greedy nor the Delaunay
triangulation of a planar point set
approximates the optimal triangulation 31--34
R. A. De Millo and
R. E. Miller Implicit computation of synchronization
primitives . . . . . . . . . . . . . . . 35--38
Marek J. Lao A new data structure for the UNION-FIND
problem . . . . . . . . . . . . . . . . 39--45
Dario Bini and
Milvio Capovani Lower bounds of the complexity of linear
algebras . . . . . . . . . . . . . . . . 46--47
Andrew C. Yao A note on a conjecture of Kam and Ullman
concerning statistical databases . . . . 48--50
A. Nijholt From left-regular to Greibach normal
form grammars . . . . . . . . . . . . . 51--55
M. R. Brown Some observations on random $2$-$3$
trees . . . . . . . . . . . . . . . . . 57--59
Jan Grabowski The unsolvability of some Petri net
language problems . . . . . . . . . . . 60--63
F. N. Teskey Document retrieval using associative
processors . . . . . . . . . . . . . . . 64--67
F. Frances Yao Graph $2$-isomorphism is NP-complete . . 68--72
Akihiro Nozaki A note on the complexity of
approximative evaluation of polynomials 73--75
R. L. Schwartz Aliasing among pointers in EUCLID . . . 76--79
W. S. Luk `Possible' membership of a multivalued
dependency in a relational database . . 80--83
Andrzej Ehrenfeucht and
Grzegorz Rozenberg An observation on scattered grammars . . 84--85
Andrzej Ehrenfeucht and
Grzegorz Rozenberg Finding a homomorphism between two words
is NP-complete . . . . . . . . . . . . . 86--88
B. Srinivasan and
V. Rajaraman On the normalization of relational
databases . . . . . . . . . . . . . . . 89--92
A. Sengupta and
S. Bandyopadhyay and
P. K. Srimani On identification of CR property in file
organisation . . . . . . . . . . . . . . 93--96
John Grant Partial Values in a Tabular Database
Model . . . . . . . . . . . . . . . . . 97--99
Boguslaw L. Jackowski and
Ryszard Kubiak and
Stefan Soko\lowski Complexity of sorting by distributive
partitioning . . . . . . . . . . . . . . 100--100
Daniel P. Friedman and
David S. Wise Erratum: ``Output Driven Interpretation
of Recursive Programs, or Writing
Creates and Destroys Data Structures'' 101--101
Eike Best A note on the proof of a concurrent
program . . . . . . . . . . . . . . . . 103--104
Alain Fournier and
Zvi Kedem Comments on the all nearest-neighbor
problem for convex polygons . . . . . . 105--107
Charles J. Colbourn The complexity of symmetrizing matrices 108--109
Sandra L. Mitchell and
Stephen Hedetniemi Linear algorithms for edge-coloring
trees and unicyclic graphs . . . . . . . 110--112
R. K. Arora and
S. P. Rana On module assignment in two-processor
distributed systems . . . . . . . . . . 113--117
Alon Itai A randomized algorithm for checking
equivalence of circular lists . . . . . 118--121
M. H. Williams and
A. R. Bulmer A transportable code generator generator
system . . . . . . . . . . . . . . . . . 122--125
M. Ferrari and
G. Guida DB: A LISP-type data base system . . . . 126--134
Amiram Yehudai A note on the pumping lemma for regular
languages . . . . . . . . . . . . . . . 135--136
K. Itano Reduction of page swaps on the two
dimensional transforms in a paging
environment . . . . . . . . . . . . . . 137--140
F. Dévai and
T. Szendrényi Comments on convex hull of a finite set
of points in two dimensions . . . . . . 141--142
Gianfranco Prini Stack implementation of shallow binding
in languages with mixed scoping . . . . 143--154
Hans Langmaack and
Wolfram Lippe and
Franz Wagner The formal termination problem for
programs with finite ALGOL $ 68$-modes 155--159
D. Harel Erratum: ``Two results on process
logic'' . . . . . . . . . . . . . . . . 160--160
W. Randolph Franklin Padded lists: set operations in expected
$ \theta (\log \log N) $ time . . . . . 161--166
Joseph Y.-T.-T. Leung Bounds on list scheduling of UET tasks
with restricted resource constraints . . 167--170
E. J. Cockayne and
F. Ruskey and
A. G. Thomason An algorithm for the most economic link
addition in a tree communications
network . . . . . . . . . . . . . . . . 171--175
J. Strother Moore A mechanical proof of the termination of
Takeuchi's function . . . . . . . . . . 176--181
A. G. Akritas On the solution of polynomial equations
using continued fractions . . . . . . . 182--184
K. M. Chandy and
J. Misra Deadlock absence proofs for networks of
communicating processes . . . . . . . . 185--189
D. T. Lee and
C. C. Yang Location of multiple points in a planar
subdivision . . . . . . . . . . . . . . 190--193
J. L. Szwarcfiter Systems of distinct representatives for
$k$ families of sets . . . . . . . . . . 195--196
J. M. Morris Traversing binary trees simply and
cheaply . . . . . . . . . . . . . . . . 197--200
Duncan McCallum and
David Avis A linear algorithm for finding the
convex hull of a simple polygon . . . . 201--206
G. Oulsnam Cyclomatic numbers do not measure
complexity of unstructured programs . . 207--211
Nachum Dershowitz A note on simplification orderings . . . 212--215
A. M. Andrew Another efficient algorithm for convex
hulls in two dimensions . . . . . . . . 216--219
J. M. Robson The emptiness of complement problem for
semi extended regular expressions
requires $ c^n $ space . . . . . . . . . 220--222
Kevin Q. Brown Voronoi diagrams from convex hulls . . . 223--228
Sandra L. Mitchell Linear algorithms to recognize
outerplanar and maximal outerplanar
graphs . . . . . . . . . . . . . . . . . 229--232
R. S\lowi\'nski Cost-minimal preemptive scheduling of
independent jobs with release and due
dates on open shop under resource
constraints . . . . . . . . . . . . . . 233--237
Errol L. Lloyd List Scheduling Bounds for UET Systems
with Resources . . . . . . . . . . . . . 28--31
Jan van Leeuwen and
Derick Wood Dynamization of decomposable searching
problems . . . . . . . . . . . . . . . . 51--56
Peter van Emde Boas On the $ \Omega (n \log n) $ lower bound
for convex hull and maximal vector
determination . . . . . . . . . . . . . 132--136
A. M. Andrew Corrigendum: ``Another efficient
algorithm for convex hulls in two
dimensions'' (Inform. Process. Lett. \bf
9 (1979), no. 5, 216--219) . . . . . . . 168--168
F. Luccio and
S. Mazzone A cryptosystem for multiple
communication . . . . . . . . . . . . . 180--183
Mark H. Overmars and
Jan van Leeuwen Further comments on A. Bykat's convex
hull algorithm: ``Convex hull of a
finite set of points in two dimensions''
[Inform. Process. Lett. \bf 7 (1978),
no. 6, 296--298; MR 80b:68041] . . . . . 209--212
Henk Meijer and
Selim G. Akl The Design and Analysis of a New Hybrid
Sorting Algorithm . . . . . . . . . . . 213--218
Akira Nakamura and
Katsushi Inoue A remark on two-dimensional finite
automata: ``Some properties of
two-dimensional on-line tessellation
acceptors'' [Inform. Sci. \bf 13 (1977),
no. 2, 95--121; MR 80e:68143] . . . . . 219--222
A. Ehrenfeucht and
G. Rozenberg On the emptiness of the intersection of
two D0S languages problem . . . . . . . 223--225
K. M. Chung and
F. Luccio and
C. K. Wong A new permutation algorithm for bubble
memories . . . . . . . . . . . . . . . . 226--230
Corrado Böhm and
Antonio Mach\`i and
Giovanna Sontacchi Complexity bounds for equivalence and
isomorphism of Latin squares . . . . . . 231--233
Ludwik Czaja Deadlock and Fairness in Parallel
Schemas: a Set-Theoretic
Characterization and Decision Problems 234--239
Kellogg S. Booth Lexicographically least circular
substrings . . . . . . . . . . . . . . . 240--242
Peter Buneman and
Leon Levy The Towers of Hanoi problem . . . . . . 243--244
Katsushi Inoue and
Itsuo Takanami A note on decision problems for
three-way two-dimensional finite
automata . . . . . . . . . . . . . . . . 245--248
Edsger W. Dijkstra and
C. S. Scholten Termination detection for diffusing
computations . . . . . . . . . . . . . . 1--4
W\lodzimierz Dobosiewicz An Efficient Variation of Bubble Sort 5--6
D. C. S. Allison and
M. T. Noga Selection by distributive partitioning 7--8
Tomasz Krawczyk Error correction by mutational grammars 9--15
Kabekode V. S. Bhat On the complexity of testing a graph for
$n$-cube . . . . . . . . . . . . . . . . 16--19
Jan Grabowski The decidability of persistence for
vector addition systems . . . . . . . . 20--23
Michael C. Loui A note on the pebble game . . . . . . . 24--26
J. D. Day On the internal $S$-stability of
Rosenbrock methods . . . . . . . . . . . 27--30
J. D. Day Comments on: ``On an $L$-stable method
for stiff differential equations''
[Inform. Process. Lett. 6 (1977), no. 5,
158--161; MR \bf 56 #10015] by T. D. Bui 31--32
G. Loizou On a cycle finding algorithm . . . . . . 33--36
Donna J. Brown An improved BL lower bound . . . . . . . 37--39
J. L. Peterson A note on colored Petri nets . . . . . . 40--43
L. G. Valiant Computing multivariate polynomials in
parallel . . . . . . . . . . . . . . . . 44--45
R. P. Brent On the area of binary tree layouts . . . 46--48
Charles R. Dyer A fast parallel algorithm for the
closest pair problem . . . . . . . . . . 49--52
Luc Devroye A note on finding convex hulls via
maximal vectors . . . . . . . . . . . . 53--56
E. L. Lloyd Errata: ``List scheduling bounds for UET
systems with resources'' [Inform.
Process. Lett. \bf 10 (1980), no. 1,
28--31; MR 81a:68042] . . . . . . . . . 57--57
J. van Leeuwen and
D. Wood Errata: ``List scheduling bounds for UET
systems with resources'' [Inform.
Process. Lett. \bf 10 (1980), no. 1,
28--31; MR 81a:68042] . . . . . . . . . 57--57
Lech Banachowski A complement to Tarjan's result about
the lower bound on the complexity of the
set union problem . . . . . . . . . . . 59--65
Friedrich J. Urbanek An $ O(\log n) $ algorithm for computing
the $n$ th element of the solution of a
difference equation . . . . . . . . . . 66--67
David Gries and
Gary Levin Computing Fibonacci numbers (and
similarly defined functions) in log time 68--69
Jürgen Ebert A note on odd and even factors of
undirected graphs . . . . . . . . . . . 70--72
Lishing Liu and
Alan Demers An algorithm for testing lossless join
property in relational databases . . . . 73--76
Franco P. Preparata and
Jean E. Vuillemin Area-Time Optimal VLSI Networks for
Multiplying Matrices . . . . . . . . . . 77--80
K. M. Chung and
F. Luccio and
C. K. Wong Minimum number of steps for permutation
in a bubble memory . . . . . . . . . . . 81--83
Andrew C. Yao A Note on the Analysis of Extendible
Hashing . . . . . . . . . . . . . . . . 84--86
M. Broy Transformational Semantics for
Concurrent Programs . . . . . . . . . . 87--91
Robert B. Johnson, Jr. The complexity of a VLSI adder . . . . . 92--93
J. Calmet and
R. Loos An improvement of Rabin's probabilistic
algorithm for generating irreducible
polynomials over GF($p$) . . . . . . . . 94--95
Charles J. Colbourn and
Brendan D. McKay A correction to Colbourn's paper on the
complexity of matrix symmetrizability:
``The complexity of symmetrizing
matrices'' [Inform. Process. Lett. \bf 9
(1979), no. 3, 108--109; MR 81a:68045] 96--97
Paris C. Kanellakis On the computational complexity of
cardinality constraints in relational
databases . . . . . . . . . . . . . . . 98--101
E. Luque and
A. Ripoll Tuning Architecture via Microprogramming 102--109
E. Leiss A note on a signature system based on
probabilistic logic . . . . . . . . . . 110--113
Joseph Y.-T. Leung and
M. L. Merrill A note on preemptive scheduling of
periodic, real-time tasks . . . . . . . 115--118
J. M. Robson Storage allocation is NP-hard . . . . . 119--125
David Avis Comments on a lower bound for convex
hull determination: ``On the $ \Omega (n
\log n) $ lower bound for convex hull
and maximal vector determination'' by
van Emde Boas [Inform. Process. Lett.
\bf 10(3), 18 April 1980, pp. 132--136] 126--126
Arnaldo Moura A note on grammatical covers . . . . . . 127--129
T. A. Bailey and
R. G. Dromey Fast string searching by finding subkeys
in subtext . . . . . . . . . . . . . . . 130--133
Francesco Romani Shortest-path problem is not harder than
matrix multiplication . . . . . . . . . 134--136
H. Erkio Internal merge sorting with delayed
selection . . . . . . . . . . . . . . . 137--140
N. Dershowitz The Schorr--Waite marking algorithm
revisited . . . . . . . . . . . . . . . 141--143
E. B. Kinber On inclusion problem for deterministic
multitape automata . . . . . . . . . . . 144--146
A. Laut Safe procedural implementations of
algebraic types . . . . . . . . . . . . 147--151
J. Paredaens and
F. Ponsaert Grant levels in an authorization
mechanism . . . . . . . . . . . . . . . 152--155
Greg N. Frederickson Probabilistic analysis for simple one-
and two-dimensional bin packing
algorithms . . . . . . . . . . . . . . . 156--161
Oscar H. Ibarra and
Shlomo Moran and
Louis E. Rosier A note on the parallel complexity of
computing the rank of order $n$ matrices 162--162
D. R. Hanson Code improvement via lazy evaluation . . 163--167
J. H. ter Bekke Convertibility in databases . . . . . . 168--171
Alberto Pettorossi Derivation of an $ O(k^2 \, \log n) $
algorithm for computing order-$k$
Fibonacci numbers from the $ O(k^3 \,
\log n)$ matrix multiplication method 172--179
M. H. Williams Cubic map configurations . . . . . . . . 180--185
M. H. Williams Batch sizes for the batching method of
colouring planar maps . . . . . . . . . 186--189
Mila E. Majster-Cederbaum A simple relation between relational and
predicate transformer semantics for
nondeterministic programs . . . . . . . 190--192
Rossella Petreschi and
Bruno Simeone A switching algorithm for the solution
of quadratic Boolean equations . . . . . 193--198
R. K. Arora and
S. P. Rana Heuristic algorithms for process
assignment in distributed computing
systems . . . . . . . . . . . . . . . . 199--203
Hiroya Kawai A formal system for parallel programs in
discrete time and space . . . . . . . . 204--210
J. ten Hoopen Consecutive retrieval with redundancy:
an optimal linear and an optimal cyclic
arrangement and their storage space
requirements . . . . . . . . . . . . . . 211--217
Peter Kandzia and
Margret Mangelmann On covering Boyce-Codd normal forms . . 218--223
Seppo Pajunen On two theorems of Lenstra . . . . . . . 224--228
Alfons J. Jammel and
Helmut G. Stiegler On expected costs of deadlock detection 229--231
S. Mauceri and
A. Restivo A family of codes commutatively
equivalent to prefix codes . . . . . . . 1--4
Nai Kuan Tsao The numerical instability of Bini's
algorithm . . . . . . . . . . . . . . . 17--19
Dorothy E. Denning and
Fred B. Schneider Master keys for group sharing . . . . . 23--25
R. Petreschi and
B. Simeone Erratum: ``A switching algorithm for the
solution of quadratic Boolean
equations'' . . . . . . . . . . . . . . 109--109
H. Meijer A note on ``A cryptosystem for multiple
communication'' [Inform. Process. Lett.
\bf 10(4--5), 5 July 1980, pp. 180--183] 179--181
M. E. Hellman Another cryptanalytic attack on ``A
cryptosystem for multiple
communication'' [Inform. Process. Lett.
\bf 10(4--5), 5 July 1980, pp. 180--183] 182--183
Shlomo Moran A note on: ``Shortest-path problem is
not harder than matrix multiplication''
[Inform. Process. Lett. \bf 11 (1980),
no. 3, 134--136; MR 81k:68036] by F.
Romani. With a reply by Romani . . . . . 85--86
Alfred Schmitt On the computational power of the floor
function . . . . . . . . . . . . . . . . 1--3
Ben-Zion Chor Arithmetic of finite fields . . . . . . 4--6
Dhruva Nath and
S. N. Maheshwari Parallel Algorithms for the Connected
Components and Minimal Spanning Tree
Problems . . . . . . . . . . . . . . . . 7--11
Andries E. Brouwer and
Peter van Emde Boas A note on: ``Master keys for group
sharing'' [Inform. Process. Lett. \bf 12
(1981), no. 1, 23--25; MR 82d:94046] by
D. E. Denning and F. B. Schneider . . . 12--14
Ronald Backhouse Writing a number as the sum of two
squares: a new solution . . . . . . . . 15--17
E. Gelenbe and
D. Gardy On the size of projections . . . . . . . 18--21
Hamish I. E. Gunn Compile Time Type Checking of Structure
Field Accessing . . . . . . . . . . . . 22--25
R. Endre Tarjan A hierarchical clustering algorithm
using strong components . . . . . . . . 26--29
Robert Endre Tarjan Sensitivity analysis of minimum spanning
trees and shortest path trees . . . . . 30--33
Jan van Leeuwen and
Maurice Nivat Efficient recognition of rational
relations . . . . . . . . . . . . . . . 34--38
Ker-I Ko Some observations on the probabilistic
algorithms and NP-hard problems . . . . 39--43
Shmuel Zaks Generation and ranking of $K$-ary trees 44--48
L. Fariñas Del Cerro A simple deduction method for modal
logic . . . . . . . . . . . . . . . . . 49--51
A. O. Slisenko Context-free grammars as a tool for
describing polynomial-time subclasses of
hard problems . . . . . . . . . . . . . 52--56
M. H. Graham and
A. O. Mendelzon Strong equivalence of relational
expressions under dependencies . . . . . 57--62
J. C. Lagarias and
D. E. Swartwout Minimal storage representations for
binary relations . . . . . . . . . . . . 63--66
Guiseppina Gini The automatic synthesis of iterative
programs . . . . . . . . . . . . . . . . 67--73
H. Edelsbrunner and
H. A. Maurer and
D. G. Kirkpatrick Polygonal intersection searching . . . . 74--79
J. A. Bergstra and
J.-J. Ch. Meyer A simple transfer lemma for algebraic
specifications . . . . . . . . . . . . . 80--85
Eliezer Upfal Formal correctness proofs of a
nondeterministic program . . . . . . . . 86--92
Lud\vek Ku\vcera Parallel computation and conflicts in
memory access . . . . . . . . . . . . . 93--96
Takashi Yokomori and
Derick Wood and
Klaus-Jörn Lange A three-restricted normal form theorem
for ETOL languages . . . . . . . . . . . 97--100
Jorma Tarhio LR Parsing of Some Ambiguous Grammars 101--103
Dietmar Wätjen and
Werner Struckmann An algorithm for verifying equations of
morphisms in a category . . . . . . . . 104--108
K. N. King and
Barbara Smith-Thomas An optimal algorithm for sink-finding 109--111
J.-L. Lassez and
V. L. Nguyen and
E. A. Sonenberg Fixed point theorems and semantics: a
folk tale . . . . . . . . . . . . . . . 112--116
R. H. Barlow and
D. J. Evans and
J. Shanehchi Parallel multisection for the
determination of the eigenvalues of
symmetric quindiagonal matrices . . . . 117--118
Johannes Röhrich A hybrid of Quicksort with $ O(n \log n)
$ worst case complexity . . . . . . . . 119--123
Herbert Edelsbrunner and
Mark H. Overmars On the equivalence of some rectangle
problems . . . . . . . . . . . . . . . . 124--127
Calvin C. Elgot and
Alan J. Perlis and
Lawrence Snyder A syntax-free semantics for the APL
operators . . . . . . . . . . . . . . . 128--131
Dzenan Ridjanovic and
Michael L. Brodie Defining Database Dynamics with
Attribute Grammars . . . . . . . . . . . 132--138
J. F. Korsh Growing nearly optimal binary search
trees . . . . . . . . . . . . . . . . . 139--143
Dario Bini Reply to the paper: ``The numerical
instability of Bini's algorithm''
[Inform. Process. Lett. \bf 12 (1981),
no. 1, 17--19; MR 82i:65029] by N. K.
Tsao . . . . . . . . . . . . . . . . . . 144--145
M. Jakobsson Evaluation of a hierarchical bit-vector
compression technique . . . . . . . . . 147--149
Jack A. Orenstein Multidimensional Tries Used for
Associative Searching . . . . . . . . . 150--157
Hiroshi Umeo and
Kenichi Morita and
Kazuhiro Sugata Deterministic One-Way Simulation of
Two-Way Real-Time Cellular Automata and
its Related Problems . . . . . . . . . . 158--161
G. Beretta Monte Carlo estimation of numerical
stability in fast algorithms for systems
of bilinear forms . . . . . . . . . . . 162--167
Paul Franchi-Zannettacci An extension to trees of the Sardinas
and Patterson algorithm . . . . . . . . 168--173
R. Demolombe Generalized division for relational
algebraic language . . . . . . . . . . . 174--178
Ernst-E. E. Doberkat Asymptotic estimates for the higher
moments of the expected behavior of
straight insertion sort . . . . . . . . 179--182
Michael J. Fischer and
Nancy A. Lynch A lower bound for the time to assure
interactive consistency . . . . . . . . 183--186
Jiann H. Jou and
Patrick C. Fischer The complexity of recognizing $ 3 {\rm
NF} $ relation schemes . . . . . . . . . 187--190
Jack Minker and
Guy Zanon An extension to linear resolution with
selection function . . . . . . . . . . . 191--194
Bengt Aspvall and
Michael F. Plass and
Robert Endre Tarjan Erratum: ``A linear-time algorithm for
testing the truth of certain quantified
Boolean formulas'' [Inform. Process.
Lett. \bf 8 (1979), no. 3, 121--123; MR
80b:68050] . . . . . . . . . . . . . . . 195--195
R. E. Krichevsky Letter to the editor: ``A family of
codes commutatively equivalent to prefix
codes'' [Inform. Process. Lett. \bf 12
(1981), no. 1, 1--4; MR 82j:94021] by S.
Mauceri and A. Restivo . . . . . . . . . 238--238
Lud\vek Ku\vcera Erratum and addendum to: ``Parallel
computation and conflicts in memory
access'' [Inform. Process. Lett. \bf 14
(1982), no. 2, 93--96; MR 83g:68038] . . 107--107
Takashi Yokomori and
Derick Wood and
Klaus-Jörn Lange Erratum: ``A three-restricted normal
form theorem for ETOL languages''
[Inform. Process. Lett. \bf 14 (1982),
no. 3, 97--100; MR 83g:68115] . . . . . 53--53
J. K. Annot and
M. D. Janssens and
A. J. Van De Goor Comments on Morris's starvation-free
solution to the mutual exclusion problem 91--97
R. E. Tarjan Corrigendum: ``Sensitivity analysis of
minimum spanning trees and shortest path
trees'' [Inform. Process. Lett. \bf
14(1), 27 March 1982, pp. 30--33] . . . 219--219
David Gries and
Ivan Stojmenovic A Note on Graham's Convex Hull Algorithm 323--327
M. T. Noga Sorting in parallel by double
distributive partitioning . . . . . . . 340--348