Journal: Communications of the ACM

Volume 8, Issue 4

203 -- 206Saul Gorn. Transparent-mode control procedures for data communication, using the American standard code for information interchange - a tutorial
215 -- 216Richard W. Conway, J. J. Delfausse, William L. Maxwell, W. E. Walker. CLP-the Cornell list processor
217 -- 218Peter A. Businger. Algorithm 253 [F2]: eigenvalues of real symmetric matrix by the QR method
217 -- 0J. H. Gunn. Alogorithm 252 [Z]: vector coupling or Clebsch-Gordan coefficients
218 -- 219Peter A. Businger. Algorithm 254 [F2]: eigenvalues and eigenvectors of a real symmetric matrix by the QR method
219 -- 0James Stafford. Certification of algorithm 21 [S17]: Bessel function for a set of integer orders
220 -- 0Mats Ferring. Remark on algorithm 231 [F1]: matrix inversion
221 -- 223Zalman A. Shavell. The use of FORTRAN in subroutines with COBOL main programs
223 -- 226I. C. Pyle. Data input by question and answer
227 -- 228Richard Bellman, June D. Buell, Robert E. Kalaba. Numerical integration of a differential-difference equation with a decreasing time-lag
229 -- 230Richard M. Brown. Use of a conditional base number system for encoding sequences of correlated characters
231 -- 232Richard Bellman, Harriet H. Kagiwada, Robert E. Kalaba. Wengert s numerical method for partial derivatives, orbit determination and quasilinearization
233 -- 0Kazuo Tajiri. The use of COBOL subroutines in FORTRAN main programs
234 -- 0P. H. Arnold. Still another use for FORTRAN II chaining
235 -- 236James T. Day. On the numerical solution of an N-point boundary value problem for linear ordinary differential equations
243 -- 246D. R. Davis, Andrew D. Lin. Secondary key retrieval using an IBM 7090-1301 system