researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal
Journal: Communications of the ACM
Home
Index
Info
Volume
Volume
21
, Issue
9
715
--
717
R. A. Harris
,
J. D. Zund
.
An Algorithm Using Symbolic Techniques for the Bel-Petrov Classification of Gravitational Fields
718
--
723
Herbert D. Schwetman
.
Hybrid Simulation Models of Computer Systems
724
--
736
Jeffrey M. Barth
.
A Practical Interprocedural Data Flow Analysis Algorithm
737
--
749
Gerald J. Popek
,
David A. Farber
.
A Model for Verification of Data Security in Operating Systems
750
--
759
Peter J. Denning
,
Donald R. Slutz
.
Generalized Working Sets for Segment Reference Strings
760
--
768
Glenford J. Myers
.
A Controlled Experiment in Program Testing and Code Walkthroughs/Inspections
769
--
776
Thomas Ottmann
,
Hans-Werner Six
,
Derick Wood
.
Right Brother Trees
777
--
785
Ernst G. Ulrich
.
Event Manipulation for Discrete Simulations Requiring Large Numbers of Events
786
--
787
Kurt Maly
.
A Note on Virtual Memory Indexes
788
--
790
Stephen A. Ward
.
Real Time Plotting of Approximate Contour Maps
790
--
791
Aaron M. Tenenbaum
.
Simulations of Dynamic Sequential Search Algorithms
Volume
21
, Issue
8
613
--
641
John W. Backus
.
Can Programming Be Liberated From the von Neumann Style? A Functional Style and its Algebra of Programs
642
--
657
Rob Kling
.
Value Conflicts and Social Choice in Electronic Funds Transfer System Developments
657
--
661
Daniel S. Hirschberg
.
Fast Parallel Sorting Algorithms
662
--
665
F. Lockwood Morris
.
A Time- and Space-Efficient Garbage Compaction Algorithm
666
--
677
C. A. R. Hoare
.
Communicating Sequential Processes
678
--
686
Richard S. Brice
,
James C. Browne
.
Feedback Coupled Resource Allocation Policies in the Multiprogramming-Multicomputer System
687
--
693
Peter Scheuermann
,
C. Robert Carlson
.
Self-Assessment Procedure V: Database Systems
Volume
21
, Issue
7
526
--
539
David L. Waltz
.
An English Language Query Answering System for a Large Relational Data Base
540
--
544
Michael L. Fredman
,
Bruce W. Weide
.
On the Complexity of Computing the Measure of U[ai, bi]
544
--
549
Francis Y. L. Chin
.
An O(n) Algorithm for Determining a Near-Optimal Computation Order of Matrix Chain Products
550
--
553
Yehoshua Perl
,
Alon Itai
,
Haim Avni
.
Interpolation Search - A Log Log N Search
554
--
557
Constantine Halatsis
,
George Philokyprou
.
Pseudochaining in Hash Tables
558
--
565
Leslie Lamport
.
Time, Clocks, and the Ordering of Events in a Distributed System
565
--
569
Henry G. Baker
.
Shallow Binding in LISP 1.5
570
--
582
Hanan Samet
.
Proving the Correctness of Heuristically Optimized Code
583
--
585
Robert E. Shostak
.
An Algorithm for Reasoning About Equality
586
--
591
Rahul Chattergy
,
Udo W. Pooch
.
Analysis of the Availability of Computer Systems Using Computer-Aided Algebra
592
--
0
Arne Maus
.
Interlude on signals and semephores revisited
592
--
0
Niklaus Wirth
.
Interlude on signals and semphores revisited. author's response
592
--
593
Duane Sand
.
Thoughtless programming
593
--
0
Percy Tzelnic
.
On LRU stack model suitability
593
--
0
Marc A. Auslander
.
Thoughtless programming? author's response
594
--
0
Gerald Held
,
Michael Stonebraker
.
On B-trees Re-examined - Authors' Response
594
--
0
Rollins Turner
.
On LRU stack model suitability. author's response
594
--
0
Lawrence Snyder
.
On B-trees Re-examined
Volume
21
, Issue
6
441
--
445
Stuart H. Zweben
,
M. A. McDonald
.
An Optimal Method for Deletion in One-Sided Height-Balanced Trees
445
--
447
James R. Driscoll
,
Y. Edmund Lien
.
A Selective Traversal Algorithm for Binary Search Trees
448
--
458
Jacques Cohen
,
Martin A. Roth
.
Analyses of Deterministic Parsing Algorithms
459
--
465
M. Dennis Mickunas
,
John A. Modry
.
Automatic Error Recovery for LR Parsers
466
--
471
Bennet P. Lientz
,
E. Burton Swanson
,
G. E. Tompkins
.
Characteristics of Applications Software Maintenance
472
--
483
Earl Chrysler
.
Some Basic Determinants of Computer Programming Productivity
484
--
493
Rob Kling
.
Automated Welfare Client-Tracking and Service Integration: The Political Economy of Computing
493
--
499
Erol Gelenbe
,
D. Derochette
.
Performance of Rollback Recovery Systems under Intermittent Failures
500
--
507
Toby J. Teorey
.
General Equations for Idealized CPU-I/O Overlap Configurations
Volume
21
, Issue
5
351
--
357
Douglas W. Clark
.
A Fast Algorithm for Copying List Structures
358
--
367
Anita K. Jones
,
Barbara Liskov
.
A Language Extension for Expressing Constraints on Data Access
368
--
375
Matthew M. Geller
.
Test Data as an Aid in Proving Program Correctness
376
--
385
James R. Low
.
Automatic Data Structure Selection: An Example and Overview
385
--
391
Michael Karr
,
David B. Loveman
.
Incorporation of Units into Programming Languages
392
--
400
David R. Hanson
,
Ralph E. Griswold
.
The SL5 Procedure Mechanism
401
--
410
Frederick Hayes-Roth
,
John P. McDermott
.
An Interference Matching Technique for Inducing Abstractions
411
--
418
J. M. Fleisher
,
R. R. Meyer
.
New Sufficient Optimality Conditions for Integer Programming and their Application
419
--
422
Pandu R. Tadikamalla
.
Computer Generation of Gamma Random Variables
423
--
425
Richard L. Sites
.
Optimal Shift Strategy for a Block-Transfer CCD Memory
Volume
21
, Issue
4
259
--
263
W. H. Payne
,
K. L. McMillen
.
Orderly Enumeration of Nonsingular Binary Matrices Applied to Text Encryption
264
--
268
Paul Heckel
.
A Technique for Isolating Differences Between Files
269
--
279
Art Lew
.
Optimal Conversion of Extended-Entry Decision Tables with General Cost Criteria
280
--
294
Henry G. Baker Jr.
.
List Processing in Real Time on a Serial Computer
294
--
299
Ralph C. Merkle
.
Secure Communications Over Insecure Channels
300
--
308
Thomas G. Szymanski
.
Assembling Code for Machines with Span-Dependent Instructions
309
--
315
Jean Vuillemin
.
A Data Structure for Manipulating Priority Queues
315
--
317
Shimon Even
,
Michael Rodeh
.
Economical Encoding of Commas Between Strings
317
--
322
R. C. H. Cheng
.
Generating Beta Variates with Nonintegral Shape Parameters
Volume
21
, Issue
3
197
--
205
Henry C. Lucas Jr.
.
The Use of an Interactive Information Storage and Retrieval System in Medical Research
206
--
218
William H. Dutton
,
Kenneth L. Kraemer
.
Management Utilization of Computers in American Local Governments
218
--
231
Richard A. DeMillo
,
Stanley C. Eisenstat
,
Richard J. Lipton
.
Preserving Average Proximity in Arrays
219
--
225
Ronald E. Anderson
.
Value Orientation of Computer Science Students
226
--
227
S. Rao Kosaraju
.
Insertions and Deletions In One-Sided Height-Balanced Trees
232
--
236
Mark A. Franklin
,
G. Scott Graham
,
Ram K. Gupta
.
Anomalies with Variable Partition Paging Algorithms
237
--
246
Andrew S. Tanenbaum
.
Implications of Structured Programming for Machine Architecture
Volume
21
, Issue
2
115
--
119
Sandra A. Mamrak
,
Richard G. Montanelli Jr.
.
Computer Science Faculties: The Current Status of Minorities and Woman
120
--
126
Ronald L. Rivest
,
Adi Shamir
,
Leonard M. Adleman
.
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
127
--
134
Marc A. Auslander
,
H. Raymond Strong
.
Systematic Recursion Removal
135
--
139
Lawrence T. Kou
,
Larry J. Stockmeyer
,
C. K. Wong
.
Covering Edges by Cliques with Regard to Keyword Conflicts and Intersection Graphs
139
--
143
Gerald Held
,
Michael Stonebraker
.
B-trees Re-examined
144
--
152
William J. Stewart
.
A Comparison of Numerical Techniques in Markov Modeling
152
--
158
Gabor T. Herman
,
Arnold Lent
,
Peter H. Lutz
.
Relaxation Method for Image Reconstruction
159
--
172
Zohar Manna
,
Richard J. Waldinger
.
Is Sometime Sometimes Better Than Always ? (Intermittent Assertions in Proving Program Correctness)
172
--
176
Bruce J. Schachter
,
Azriel Rosenfeld
.
Some New Methods of Detecting Step Edges in Digital Pictures
Volume
21
, Issue
12
993
--
999
Roger M. Needham
,
Michael D. Schroeder
.
Using Encryption for Authentication in Large Networks of Computers
999
--
1003
David Gries
,
Jayadev Misra
.
A Linear Sieve Algorithm for Finding Prime Numbers
1004
--
1007
James L. Peterson
,
James R. Bitner
,
John H. Howard
.
The Selection of Optimal Tab Settings
1008
--
1015
James C. Wetherbe
,
V. Thomas Dock
.
A Strategic Planning Methodology for the Computing Effort in Higher Education: An Empirical Evaluation
1016
--
1025
M. Ibramsha
,
V. Rajaraman
.
Detection of Logical Errors in Decition Table Programs
1025
--
1039
Alberto Martelli
,
Ugo Montanari
.
Optimizing Decision Trees Through Heuristically Guided Search
1040
--
1048
Yogen K. Dalal
,
Robert Metcalfe
.
Reverse Path Forwarding of Broadcast Packets
1048
--
1064
John V. Guttag
,
Ellis Horowitz
,
David R. Musser
.
Abstract Data Types and Software Validation
1064
--
1075
Jay M. Spitzen
,
Karl N. Levitt
,
Lawrence Robinson
.
An Example of Hierarchical Design and Proof
Volume
21
, Issue
11
889
--
895
Norman R. Lyons
.
Systems Design Education: A Gaming Approach
904
--
913
B. Kumar
,
Edward S. Davidson
.
Performance Evaluation of Highly Concurrent Computers by Deterministic Simulation
914
--
924
Berthold K. P. Horn
,
Brett L. Bachman
.
Using Synthetic Images to Register Real Images with Surface Models
925
--
928
Pandu R. Tadikamalla
.
Computer Generation of Gamma Random Variables - II
928
--
930
G. David Ripley
.
A Simple Recovery-Only Procedure For Simple Precedence Parsers
931
--
933
Daniel P. Friedman
,
David S. Wise
.
A Note on Conditional Expressions
934
--
941
Per Brinch Hansen
.
Distributed Processes: A Concurrent Programming Concept
941
--
947
Fabrizio Luccio
,
Linda Pagli
.
Power Trees
947
--
958
B. A. Sheil
.
Median Split Trees: A Fast Lookup Technique for Frequently Occurring Keys
958
--
966
Eugene C. Freuder
.
Synthesizing Constraint Expressions
966
--
975
Edsger W. Dijkstra
,
Leslie Lamport
,
Alain J. Martin
,
Carel S. Scholten
,
Elisabeth F. M. Steffens
.
On-the-Fly Garbage Collection: An Exercise in Cooperation
Volume
21
, Issue
10
806
--
820
Walter S. Brainerd
.
FORTRAN 77
821
--
831
Donald F. Towsley
,
K. Mani Chandy
,
James C. Browne
.
Models for Parallel Processing Within Programs: Application to CPU: I/O and I/O: I/O Overlap
831
--
834
Ben Shneiderman
.
Jump Searching: A Fast Sequential Search Technique
835
--
840
Shi-Kuo Chang
,
Yin-Wah Wong
.
Optimal Histogram Matching by Monotone Gray Level Transformation
840
--
842
Robert Morris
.
Counting Large Numbers of Events in Small Registers
847
--
857
Robert Sedgewick
.
Implementing Quicksort Programs
857
--
865
Gordon Lyon
.
Packed Scatter Tables
866
--
872
Malcolm C. Easton
,
Ronald Fagin
.
Cold-Start vs. Warm-Start Miss Ratios
873
--
875
William R. Franta
,
Kurt Maly
.
A Comparison of Heaps and the TL Structure for the Simulation Event Set
Volume
21
, Issue
1
3
--
0
Gordon Bell
,
Samuel H. Fuller
,
Daniel P. Siewiorek
.
Forword to the Special Issue on Computer Architecture
4
--
12
Simon H. Lavington
.
The Manchester Mark I and Atlas: A Historical Perspective
13
--
24
Roland N. Ibbett
,
P. C. Capon
.
The Development of the MU5 Computer System
25
--
43
B. R. Borgerson
,
M. L. Hanson
,
P. A. Hartley
.
The Evolution of the Sperry Univac 1100 Series: A History, Analysis, and Projection
44
--
63
Gordon Bell
,
A. Kotok
,
Thomas N. Hastings
,
R. Hill
.
The Evolution of the DECsystem 10
73
--
96
Richard P. Case
,
Andris Padegs
.
Architecture of the IBM System/370