Journal: Communications of the ACM

Volume 27, Issue 8

748 -- 756Yair M. Babad, Jeffrey A. Hoffer. Even no Data has a Value
758 -- 760Dennis Ritchie. Reflections on Software Research
761 -- 763Ken Thompson. Reflections on Trusting Trust
764 -- 776Nazim H. Madhavji. Visibility Aspects of Programmed Dyamic Data Structures
777 -- 781James A. Haskett. Pass-Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms
782 -- 784Douglas W. Jones. Improved Interpretation of UNIX-Like File Names Embedded in Data
785 -- 799Harry M. Markowitz, Ashok Malhotra, Donald P. Pazel. The EAS-E Application Development System: Principles and Language Summary
800 -- 806John M. Carroll, Caroline Carrithers. Training Wheels in a User Interface
807 -- 818D. R. K. Brownrigg. The Weighted Median Filter
819 -- 825D. Julian M. Davies. Memory Occupancy Patterns in Garbage Collection Systems
826 -- 832Lee L. Gremillion. Determinants of Program Repair Maintenance Requirements