993 | -- | 999 | Roger M. Needham, Michael D. Schroeder. Using Encryption for Authentication in Large Networks of Computers |
999 | -- | 1003 | David Gries, Jayadev Misra. A Linear Sieve Algorithm for Finding Prime Numbers |
1004 | -- | 1007 | James L. Peterson, James R. Bitner, John H. Howard. The Selection of Optimal Tab Settings |
1008 | -- | 1015 | James C. Wetherbe, V. Thomas Dock. A Strategic Planning Methodology for the Computing Effort in Higher Education: An Empirical Evaluation |
1016 | -- | 1025 | M. Ibramsha, V. Rajaraman. Detection of Logical Errors in Decition Table Programs |
1025 | -- | 1039 | Alberto Martelli, Ugo Montanari. Optimizing Decision Trees Through Heuristically Guided Search |
1040 | -- | 1048 | Yogen K. Dalal, Robert Metcalfe. Reverse Path Forwarding of Broadcast Packets |
1048 | -- | 1064 | John V. Guttag, Ellis Horowitz, David R. Musser. Abstract Data Types and Software Validation |
1064 | -- | 1075 | Jay M. Spitzen, Karl N. Levitt, Lawrence Robinson. An Example of Hierarchical Design and Proof |