Journal: Communications of the ACM

Volume 19, Issue 9

491 -- 500Philip Wadler. Analysis of an Algorithm for Real Time Garbage Collection
501 -- 508Chee-Keng Yap. New Upper Bounds for Selection
509 -- 513Michael C. Loui. Weighted Derivation Trees
514 -- 516Kenneth G. Walter. Recursion Analysis for Compiler Optimization
517 -- 521James R. Bitner, Gideon Ehrlich, Edward M. Reingold. Efficient Generation of the Binary Reflected Gray Code and Its Applications
522 -- 526L. Peter Deutsch, Daniel G. Bobrow. An Efficient, Incremental, Automatic Garbage Collector
526 -- 529Ben Wegbreit. Faster Retrieval from Context Trees

Volume 19, Issue 8

430 -- 436John J. Donovan. Tools and Philosophy for Software Education
437 -- 453Robert D. Tennent. The Denotational Semantics of Programming Languages
454 -- 460James H. Clark. Designing Surfaces in 3-D
461 -- 471Michael A. Harrison, Walter L. Ruzzo, Jeffrey D. Ullman. Protection in Operating Systems
471 -- 473Daniel S. Hirschberg. An Insertion Technique for One-Sided Height-Balanced Trees

Volume 19, Issue 7

369 -- 370Samuel D. Conte, Maurice H. Halstead. The Technology of Computer Center Management: A Proposed Course for Graduate Professional Programs in Computer Science or in Information Systems
371 -- 384Robert M. Keller. Formal Verification of Parallel Programs
385 -- 394James C. King. Symbolic Execution and Program Testing
395 -- 404Robert Metcalfe, David Boggs. Ethernet: Distributed Packet Switching for Local Computer Networks
404 -- 406Cheng-Wen Cheng, Jonas Rabin. Synthesis of Decision Rules
407 -- 409George S. Fishman. Sampling from the Gamma Distribution on a Computer
409 -- 415Kurt Maly. Compressed Tries
416 -- 417Warren Burton. A Buddy System Variation for Disk Storage Allocation
417 -- 418Gaston H. Gonnet. Heaps Applied to Event Driven Mechanisms

Volume 19, Issue 6

311 -- 313Orrin E. Taulbee, Samuel D. Conte. Production and Employment of Ph.D. s in Computer Science
314 -- 326Dennis G. Severance, Richardo Duhne. A Practitioner s Guide To Addressing Algorithms
327 -- 334Forest Baskett, Alan Jay Smith. Interference in Multiprocessor Computer Systems with Interleaved Memory
335 -- 338Gideon Frieder, Harry J. Saal. A Process for the Determination of Addresses in Variable Length Addressing
338 -- 342David S. Wise. Referencing Lists by an Edge
343 -- 351Helmut Schumacher, Kenneth C. Sevcik. The Synthetic Approach to Decision Table Conversion
352 -- 354Douglas W. Clark. An Efficient List-Moving Algorithm Using Constant Workspace
355 -- 356Gary D. Knott. A Numbering System for Permutations of Combinations

Volume 19, Issue 5

236 -- 243Dorothy E. Denning. A Lattice Model of Secure Information Flow
243 -- 250Jonathan K. Millen. Security Kernel Validation in Practice
251 -- 265Butler W. Lampson, Howard E. Sturgis. Reflections on an Operating System Design
266 -- 272A. Nico Habermann, Lawrence Flon, Lee W. Cooprider. Modularization and Hierarchy in a Family of Operating Systems
273 -- 279John H. Howard. Proving Monitors
279 -- 285Susan S. Owicki, David Gries. Verifying Properties of Parallel Programs: An Axiomatic Approach
285 -- 294A. Wayne Madison, Alan P. Batson. Characteristics of Program Localities
295 -- 297Barton G. Prieve, Robert S. Fabry. VMIN-An Optimal Variable-Space Page Replacement Algorithm
298 -- 304Wesley W. Chu, Holger Opderbeck. Analysis of the PFF Replacement Algorithm via a Semi-Markov Model

Volume 19, Issue 4

171 -- 174Oliver R. Smoot. Development of an International System for Legal Protection of Computer Programs
175 -- 181Bennet P. Lientz. A Comparative Evaluation of Versions of BASIC
182 -- 187J. Raymond. LG: A Language for Analytic Geometry
188 -- 206Shmuel Katz, Zohar Manna. Logical Analysis of Programs

Volume 19, Issue 3

113 -- 126Allen Newell, Herbert A. Simon. Computer Science as Empirical Inquiry: Symbols and Search
127 -- 136Jair M. Babad, Mario M. Modiano. Joining Policies in a Multipriority Multiclass Batch Computer System
137 -- 147Frances E. Allen, John Cocke. A Program Data Flow Analysis Procedure
148 -- 159Naftaly H. Minsky. Intentional Resolution of Privacy Protection in Database Systems

Volume 19, Issue 2

55 -- 62Gregor von Bochmann. Semantic Evaluation from Left to Right
63 -- 67Ronald L. Rivest. On Self-Organizing Sequential Search Heuristics
68 -- 72F. M. Ives. Permutation Enumeration: Four New Permutation Algorithms
73 -- 83Alberto Martelli. An Application of Heuristic Search Methods to Edge and Contour Detection
84 -- 95Kenneth F. Siler. A Stochastic Evaluation Model for Database Organization in Data Retrieval Systems
96 -- 97Ronald Fagin. A Counterintuitive Example of Computer Paging
98 -- 101Ehud Artzy, James A. Hinds, Harry J. Saal. A Fast Division Technique for Constant Divisors

Volume 19, Issue 12

655 -- 669Jean E. Sammet. Roster of Programming Languages for 1974-75
670 -- 673Bruce W. Arden. The Computer Science and Engineering Research Study (COSERS)
674 -- 687Jay F. Nunamaker, Benn R. Konsynski, Thomas Ho, Carl Singer. Computer-Aided Analysis and Design of Information Systems
688 -- 695George C. Stockman, Laveen N. Kanal, M. C. Kyle. Structural Pattern Recognition Of Carotid Pulse Waves Using A General Waveform Parsing System

Volume 19, Issue 11

595 -- 600Douglas T. Ross. Homilies for Humble Standards
601 -- 608Henry F. Ledgard, William C. Cave. Cobol Under Control
609 -- 616Thomas R. Wilcox, Alan M. Davis, Michael H. Tindall. The Design and Implementation of a Table Driven, Interactive Diagnostic Programming System
617 -- 623Frank Rubin. Experiments in Text File Compression
624 -- 633Kapali P. Eswaran, Jim Gray, Raymond A. Lorie, Irving L. Traiger. The Notions of Consistency and Predicate Locks in a Database System
634 -- 642K. Maruyama, S. E. Smith. Optimal Reorganization of Distributed Space Disk Files
642 -- 644Richard G. Hamlet. High-Level Binding with Low-Level Linkers

Volume 19, Issue 10

541 -- 0Udo W. Pooch. Papers from SIGGRAPH 76 - Introduction
542 -- 547James F. Blinn, Martin E. Newell. Texture and Reflection in Computer Generated Images
547 -- 554James H. Clark. Hierarchical Geometric Models for Visible Surface Algorithms
555 -- 563Joshua Levin. A Parametric Algorithm for Drawing Pictures of Solid Objects Composed of Quadric Surfaces
564 -- 569N. Burtnyk, M. Wein. Interactive Skeleton Techniques for Enhancing Motion Dynamics in Key Frame Animation
570 -- 576James W. Frane. The BMD and BMDP Series of Statistical Computer Programs
576 -- 577C. Duong-Kien, Hans-Jürgen Hoffmann, D. Muth. An Improvement to Martin s Algorithm for Computation of Linear Precedence Functions
578 -- 581Richard G. Montanelli Jr., Sandra A. Mamrak. The Status of Women and Minorities in Academic Computer Science

Volume 19, Issue 1

3 -- 13Leonard Kleinrock, William E. Naylor, Holger Opderbeck. A Study of Line Overhead in the Arpanet
13 -- 17Neil C. Wilhelm. An Anomaly in Disk Scheduling: A Comparison of FCFS and SSTF Seek Scheduling Using an Empirical Model for Disk Accesses
18 -- 22Carson E. Agnew. On Quadratic Adaptive Routing Algorithms
23 -- 28Philip L. Karlton, Samuel H. Fuller, R. E. Scroggs, E. B. Kaehler. Performance of Height-Balanced Trees
29 -- 33J. J. Florentin. Information Reference Coding
33 -- 37Charles R. Litecky, Gordon B. Davis. A Study of Errors, Error-Proneness, and Error Diagnosis in Cobol