Journal: Communications of the ACM

Volume 21, Issue 12

993 -- 999Roger M. Needham, Michael D. Schroeder. Using Encryption for Authentication in Large Networks of Computers
999 -- 1003David Gries, Jayadev Misra. A Linear Sieve Algorithm for Finding Prime Numbers
1004 -- 1007James L. Peterson, James R. Bitner, John H. Howard. The Selection of Optimal Tab Settings
1008 -- 1015James C. Wetherbe, V. Thomas Dock. A Strategic Planning Methodology for the Computing Effort in Higher Education: An Empirical Evaluation
1016 -- 1025M. Ibramsha, V. Rajaraman. Detection of Logical Errors in Decition Table Programs
1025 -- 1039Alberto Martelli, Ugo Montanari. Optimizing Decision Trees Through Heuristically Guided Search
1040 -- 1048Yogen K. Dalal, Robert Metcalfe. Reverse Path Forwarding of Broadcast Packets
1048 -- 1064John V. Guttag, Ellis Horowitz, David R. Musser. Abstract Data Types and Software Validation
1064 -- 1075Jay M. Spitzen, Karl N. Levitt, Lawrence Robinson. An Example of Hierarchical Design and Proof