researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal
Journal: Communications of the ACM
Home
Index
Info
Issue
Volume
17
, Issue
8
437
--
442
Arthur Evans Jr.
,
William Kantrowitz
,
Edwin Weiss
.
A User Authentication Scheme Not Requiring Secrecy in the Computer
442
--
445
George B. Purdy
.
A High Security Log-in Procedure
445
--
449
Theodore D. Friedman
,
Lance J. Hoffman
.
Execution Time Requirements for Encipherment Programs
450
--
453
G. A. Neufeld
,
John Tartar
.
Graph Coloring Conditions for the Existence of Solutions to the Timetable Problem
453
--
455
Leslie Lamport
.
A New Solution of Dijkstra s Concurrent Programming Problem
456
--
462
John C. Cavouras
.
On the Conversion of Programs to Decision Tables: Method and Objectives
463
--
467
Tom Lyche
,
Larry L. Schumaker
.
Procedures for computing Smoothing and Interpolating Natural Splines [E1] (Algorithm 480)
467
--
469
Keith C. Crandall
.
Arrow to Precedence Network Transformation [H] (Algorithm 481)
470
--
0
John McKay
,
E. Regener
.
Transitivity Sets [G7] (Algorithm 482)
470
--
0
Adhemar Bultheel
.
Rosenbrock Function Minimization (Remark on Algorithm 450)
471
--
0
Kenneth D. Shere
.
The Complex Method for Constrained Optimization (Remark on Algorithm 454)
471
--
475
A. H. Stroud
.
Gauss Harmonic Interpolation Formulas
476
--
497
Rolf O. E. Lagerlof
.
Interpolation with Rounded Ramp Functions