Journal: Communications of the ACM

Volume 17, Issue 8

437 -- 442Arthur Evans Jr., William Kantrowitz, Edwin Weiss. A User Authentication Scheme Not Requiring Secrecy in the Computer
442 -- 445George B. Purdy. A High Security Log-in Procedure
445 -- 449Theodore D. Friedman, Lance J. Hoffman. Execution Time Requirements for Encipherment Programs
450 -- 453G. A. Neufeld, John Tartar. Graph Coloring Conditions for the Existence of Solutions to the Timetable Problem
453 -- 455Leslie Lamport. A New Solution of Dijkstra s Concurrent Programming Problem
456 -- 462John C. Cavouras. On the Conversion of Programs to Decision Tables: Method and Objectives
463 -- 467Tom Lyche, Larry L. Schumaker. Procedures for computing Smoothing and Interpolating Natural Splines [E1] (Algorithm 480)
467 -- 469Keith C. Crandall. Arrow to Precedence Network Transformation [H] (Algorithm 481)
470 -- 0John McKay, E. Regener. Transitivity Sets [G7] (Algorithm 482)
470 -- 0Adhemar Bultheel. Rosenbrock Function Minimization (Remark on Algorithm 450)
471 -- 0Kenneth D. Shere. The Complex Method for Constrained Optimization (Remark on Algorithm 454)
471 -- 475A. H. Stroud. Gauss Harmonic Interpolation Formulas
476 -- 497Rolf O. E. Lagerlof. Interpolation with Rounded Ramp Functions