Journal: Communications of the ACM

Volume 27, Issue 4

287 -- 291Jon Louis Bentley. How to Sort
293 -- 298Gene Dallaire. American Universities Need Greater Access to Supercomputers
304 -- 311Lotfi A. Zadeh. Coping with the Imprecision of the Real World (Interview)
312 -- 321Peter J. Denning, Donn B. Parker, Susan H. Nycum, Willis H. Ware. Computers, Crime and Privacy - A National Dilema, Congressional Testimony from the Industry
322 -- 329Allen B. Tucker. A Perspective on Machine Translation: Theory and Practice
330 -- 335Michael C. Mulder, John F. Dalphin. Computer Science Program Requirements and Accreditation, An Interim Report of the ACM/IEEE Computer Society Joint Task Force
336 -- 341Jean E. Sammet, Bernard Rous. Progress Report on the ACM Guide to Computing Literature
343 -- 0Peter G. Neumann. A Further View of the First Quarter Century, Introduction to the April 1984 Special Section
344 -- 348Donald E. Knuth. The Complexity of Songs (April 1984 Special Section)
349 -- 350R. Lawrence Clark. A Linuistic Contribution to Goto-Less Programming (April 1984 Special Section)
352 -- 355P. J. Brown. Languages: Three Interviews (April 1984 Special Section)
356 -- 357J. B. Cadwallader-Cohen, W. W. Zysic, R. B. Donnelly. The Chaostron: An Important Advance in Learning Machines (April 1984 Special Section)
358 -- 368Joseph J. Pollock, Antonio Zamora. Automatic Spelling Correction in Scientific and Scholary Text
369 -- 374David C. Blair. The Data-Document Distinction in Information Retrieval
376 -- 383Izak Benbasat, Yair Wand. Command Abbreviation Behavior in Human-Computer Interaction
384 -- 387C. C. Chang. The Study of an Ordered Minimal Perfect Hashing Scheme
388 -- 392Dorothy E. Denning. Digital Signatures with RSA and Other Public-Key Cryptosystems
393 -- 395Ronald L. Rivest, Adi Shamir. How to Expose an Eavesdropper