287 | -- | 291 | Jon Louis Bentley. How to Sort |
293 | -- | 298 | Gene Dallaire. American Universities Need Greater Access to Supercomputers |
304 | -- | 311 | Lotfi A. Zadeh. Coping with the Imprecision of the Real World (Interview) |
312 | -- | 321 | Peter J. Denning, Donn B. Parker, Susan H. Nycum, Willis H. Ware. Computers, Crime and Privacy - A National Dilema, Congressional Testimony from the Industry |
322 | -- | 329 | Allen B. Tucker. A Perspective on Machine Translation: Theory and Practice |
330 | -- | 335 | Michael C. Mulder, John F. Dalphin. Computer Science Program Requirements and Accreditation, An Interim Report of the ACM/IEEE Computer Society Joint Task Force |
336 | -- | 341 | Jean E. Sammet, Bernard Rous. Progress Report on the ACM Guide to Computing Literature |
343 | -- | 0 | Peter G. Neumann. A Further View of the First Quarter Century, Introduction to the April 1984 Special Section |
344 | -- | 348 | Donald E. Knuth. The Complexity of Songs (April 1984 Special Section) |
349 | -- | 350 | R. Lawrence Clark. A Linuistic Contribution to Goto-Less Programming (April 1984 Special Section) |
352 | -- | 355 | P. J. Brown. Languages: Three Interviews (April 1984 Special Section) |
356 | -- | 357 | J. B. Cadwallader-Cohen, W. W. Zysic, R. B. Donnelly. The Chaostron: An Important Advance in Learning Machines (April 1984 Special Section) |
358 | -- | 368 | Joseph J. Pollock, Antonio Zamora. Automatic Spelling Correction in Scientific and Scholary Text |
369 | -- | 374 | David C. Blair. The Data-Document Distinction in Information Retrieval |
376 | -- | 383 | Izak Benbasat, Yair Wand. Command Abbreviation Behavior in Human-Computer Interaction |
384 | -- | 387 | C. C. Chang. The Study of an Ordered Minimal Perfect Hashing Scheme |
388 | -- | 392 | Dorothy E. Denning. Digital Signatures with RSA and Other Public-Key Cryptosystems |
393 | -- | 395 | Ronald L. Rivest, Adi Shamir. How to Expose an Eavesdropper |