Journal: Communications of the ACM

Volume 21, Issue 9

715 -- 717R. A. Harris, J. D. Zund. An Algorithm Using Symbolic Techniques for the Bel-Petrov Classification of Gravitational Fields
718 -- 723Herbert D. Schwetman. Hybrid Simulation Models of Computer Systems
724 -- 736Jeffrey M. Barth. A Practical Interprocedural Data Flow Analysis Algorithm
737 -- 749Gerald J. Popek, David A. Farber. A Model for Verification of Data Security in Operating Systems
750 -- 759Peter J. Denning, Donald R. Slutz. Generalized Working Sets for Segment Reference Strings
760 -- 768Glenford J. Myers. A Controlled Experiment in Program Testing and Code Walkthroughs/Inspections
769 -- 776Thomas Ottmann, Hans-Werner Six, Derick Wood. Right Brother Trees
777 -- 785Ernst G. Ulrich. Event Manipulation for Discrete Simulations Requiring Large Numbers of Events
786 -- 787Kurt Maly. A Note on Virtual Memory Indexes
788 -- 790Stephen A. Ward. Real Time Plotting of Approximate Contour Maps
790 -- 791Aaron M. Tenenbaum. Simulations of Dynamic Sequential Search Algorithms

Volume 21, Issue 8

613 -- 641John W. Backus. Can Programming Be Liberated From the von Neumann Style? A Functional Style and its Algebra of Programs
642 -- 657Rob Kling. Value Conflicts and Social Choice in Electronic Funds Transfer System Developments
657 -- 661Daniel S. Hirschberg. Fast Parallel Sorting Algorithms
662 -- 665F. Lockwood Morris. A Time- and Space-Efficient Garbage Compaction Algorithm
666 -- 677C. A. R. Hoare. Communicating Sequential Processes
678 -- 686Richard S. Brice, James C. Browne. Feedback Coupled Resource Allocation Policies in the Multiprogramming-Multicomputer System
687 -- 693Peter Scheuermann, C. Robert Carlson. Self-Assessment Procedure V: Database Systems

Volume 21, Issue 7

526 -- 539David L. Waltz. An English Language Query Answering System for a Large Relational Data Base
540 -- 544Michael L. Fredman, Bruce W. Weide. On the Complexity of Computing the Measure of U[ai, bi]
544 -- 549Francis Y. L. Chin. An O(n) Algorithm for Determining a Near-Optimal Computation Order of Matrix Chain Products
550 -- 553Yehoshua Perl, Alon Itai, Haim Avni. Interpolation Search - A Log Log N Search
554 -- 557Constantine Halatsis, George Philokyprou. Pseudochaining in Hash Tables
558 -- 565Leslie Lamport. Time, Clocks, and the Ordering of Events in a Distributed System
565 -- 569Henry G. Baker. Shallow Binding in LISP 1.5
570 -- 582Hanan Samet. Proving the Correctness of Heuristically Optimized Code
583 -- 585Robert E. Shostak. An Algorithm for Reasoning About Equality
586 -- 591Rahul Chattergy, Udo W. Pooch. Analysis of the Availability of Computer Systems Using Computer-Aided Algebra
592 -- 0Arne Maus. Interlude on signals and semephores revisited
592 -- 0Niklaus Wirth. Interlude on signals and semphores revisited. author's response
592 -- 593Duane Sand. Thoughtless programming
593 -- 0Percy Tzelnic. On LRU stack model suitability
593 -- 0Marc A. Auslander. Thoughtless programming? author's response
594 -- 0Gerald Held, Michael Stonebraker. On B-trees Re-examined - Authors' Response
594 -- 0Rollins Turner. On LRU stack model suitability. author's response
594 -- 0Lawrence Snyder. On B-trees Re-examined

Volume 21, Issue 6

441 -- 445Stuart H. Zweben, M. A. McDonald. An Optimal Method for Deletion in One-Sided Height-Balanced Trees
445 -- 447James R. Driscoll, Y. Edmund Lien. A Selective Traversal Algorithm for Binary Search Trees
448 -- 458Jacques Cohen, Martin A. Roth. Analyses of Deterministic Parsing Algorithms
459 -- 465M. Dennis Mickunas, John A. Modry. Automatic Error Recovery for LR Parsers
466 -- 471Bennet P. Lientz, E. Burton Swanson, G. E. Tompkins. Characteristics of Applications Software Maintenance
472 -- 483Earl Chrysler. Some Basic Determinants of Computer Programming Productivity
484 -- 493Rob Kling. Automated Welfare Client-Tracking and Service Integration: The Political Economy of Computing
493 -- 499Erol Gelenbe, D. Derochette. Performance of Rollback Recovery Systems under Intermittent Failures
500 -- 507Toby J. Teorey. General Equations for Idealized CPU-I/O Overlap Configurations

Volume 21, Issue 5

351 -- 357Douglas W. Clark. A Fast Algorithm for Copying List Structures
358 -- 367Anita K. Jones, Barbara Liskov. A Language Extension for Expressing Constraints on Data Access
368 -- 375Matthew M. Geller. Test Data as an Aid in Proving Program Correctness
376 -- 385James R. Low. Automatic Data Structure Selection: An Example and Overview
385 -- 391Michael Karr, David B. Loveman. Incorporation of Units into Programming Languages
392 -- 400David R. Hanson, Ralph E. Griswold. The SL5 Procedure Mechanism
401 -- 410Frederick Hayes-Roth, John P. McDermott. An Interference Matching Technique for Inducing Abstractions
411 -- 418J. M. Fleisher, R. R. Meyer. New Sufficient Optimality Conditions for Integer Programming and their Application
419 -- 422Pandu R. Tadikamalla. Computer Generation of Gamma Random Variables
423 -- 425Richard L. Sites. Optimal Shift Strategy for a Block-Transfer CCD Memory

Volume 21, Issue 4

259 -- 263W. H. Payne, K. L. McMillen. Orderly Enumeration of Nonsingular Binary Matrices Applied to Text Encryption
264 -- 268Paul Heckel. A Technique for Isolating Differences Between Files
269 -- 279Art Lew. Optimal Conversion of Extended-Entry Decision Tables with General Cost Criteria
280 -- 294Henry G. Baker Jr.. List Processing in Real Time on a Serial Computer
294 -- 299Ralph C. Merkle. Secure Communications Over Insecure Channels
300 -- 308Thomas G. Szymanski. Assembling Code for Machines with Span-Dependent Instructions
309 -- 315Jean Vuillemin. A Data Structure for Manipulating Priority Queues
315 -- 317Shimon Even, Michael Rodeh. Economical Encoding of Commas Between Strings
317 -- 322R. C. H. Cheng. Generating Beta Variates with Nonintegral Shape Parameters

Volume 21, Issue 3

197 -- 205Henry C. Lucas Jr.. The Use of an Interactive Information Storage and Retrieval System in Medical Research
206 -- 218William H. Dutton, Kenneth L. Kraemer. Management Utilization of Computers in American Local Governments
218 -- 231Richard A. DeMillo, Stanley C. Eisenstat, Richard J. Lipton. Preserving Average Proximity in Arrays
219 -- 225Ronald E. Anderson. Value Orientation of Computer Science Students
226 -- 227S. Rao Kosaraju. Insertions and Deletions In One-Sided Height-Balanced Trees
232 -- 236Mark A. Franklin, G. Scott Graham, Ram K. Gupta. Anomalies with Variable Partition Paging Algorithms
237 -- 246Andrew S. Tanenbaum. Implications of Structured Programming for Machine Architecture

Volume 21, Issue 2

115 -- 119Sandra A. Mamrak, Richard G. Montanelli Jr.. Computer Science Faculties: The Current Status of Minorities and Woman
120 -- 126Ronald L. Rivest, Adi Shamir, Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
127 -- 134Marc A. Auslander, H. Raymond Strong. Systematic Recursion Removal
135 -- 139Lawrence T. Kou, Larry J. Stockmeyer, C. K. Wong. Covering Edges by Cliques with Regard to Keyword Conflicts and Intersection Graphs
139 -- 143Gerald Held, Michael Stonebraker. B-trees Re-examined
144 -- 152William J. Stewart. A Comparison of Numerical Techniques in Markov Modeling
152 -- 158Gabor T. Herman, Arnold Lent, Peter H. Lutz. Relaxation Method for Image Reconstruction
159 -- 172Zohar Manna, Richard J. Waldinger. Is Sometime Sometimes Better Than Always ? (Intermittent Assertions in Proving Program Correctness)
172 -- 176Bruce J. Schachter, Azriel Rosenfeld. Some New Methods of Detecting Step Edges in Digital Pictures

Volume 21, Issue 12

993 -- 999Roger M. Needham, Michael D. Schroeder. Using Encryption for Authentication in Large Networks of Computers
999 -- 1003David Gries, Jayadev Misra. A Linear Sieve Algorithm for Finding Prime Numbers
1004 -- 1007James L. Peterson, James R. Bitner, John H. Howard. The Selection of Optimal Tab Settings
1008 -- 1015James C. Wetherbe, V. Thomas Dock. A Strategic Planning Methodology for the Computing Effort in Higher Education: An Empirical Evaluation
1016 -- 1025M. Ibramsha, V. Rajaraman. Detection of Logical Errors in Decition Table Programs
1025 -- 1039Alberto Martelli, Ugo Montanari. Optimizing Decision Trees Through Heuristically Guided Search
1040 -- 1048Yogen K. Dalal, Robert Metcalfe. Reverse Path Forwarding of Broadcast Packets
1048 -- 1064John V. Guttag, Ellis Horowitz, David R. Musser. Abstract Data Types and Software Validation
1064 -- 1075Jay M. Spitzen, Karl N. Levitt, Lawrence Robinson. An Example of Hierarchical Design and Proof

Volume 21, Issue 11

889 -- 895Norman R. Lyons. Systems Design Education: A Gaming Approach
904 -- 913B. Kumar, Edward S. Davidson. Performance Evaluation of Highly Concurrent Computers by Deterministic Simulation
914 -- 924Berthold K. P. Horn, Brett L. Bachman. Using Synthetic Images to Register Real Images with Surface Models
925 -- 928Pandu R. Tadikamalla. Computer Generation of Gamma Random Variables - II
928 -- 930G. David Ripley. A Simple Recovery-Only Procedure For Simple Precedence Parsers
931 -- 933Daniel P. Friedman, David S. Wise. A Note on Conditional Expressions
934 -- 941Per Brinch Hansen. Distributed Processes: A Concurrent Programming Concept
941 -- 947Fabrizio Luccio, Linda Pagli. Power Trees
947 -- 958B. A. Sheil. Median Split Trees: A Fast Lookup Technique for Frequently Occurring Keys
958 -- 966Eugene C. Freuder. Synthesizing Constraint Expressions
966 -- 975Edsger W. Dijkstra, Leslie Lamport, Alain J. Martin, Carel S. Scholten, Elisabeth F. M. Steffens. On-the-Fly Garbage Collection: An Exercise in Cooperation

Volume 21, Issue 10

806 -- 820Walter S. Brainerd. FORTRAN 77
821 -- 831Donald F. Towsley, K. Mani Chandy, James C. Browne. Models for Parallel Processing Within Programs: Application to CPU: I/O and I/O: I/O Overlap
831 -- 834Ben Shneiderman. Jump Searching: A Fast Sequential Search Technique
835 -- 840Shi-Kuo Chang, Yin-Wah Wong. Optimal Histogram Matching by Monotone Gray Level Transformation
840 -- 842Robert Morris. Counting Large Numbers of Events in Small Registers
847 -- 857Robert Sedgewick. Implementing Quicksort Programs
857 -- 865Gordon Lyon. Packed Scatter Tables
866 -- 872Malcolm C. Easton, Ronald Fagin. Cold-Start vs. Warm-Start Miss Ratios
873 -- 875William R. Franta, Kurt Maly. A Comparison of Heaps and the TL Structure for the Simulation Event Set

Volume 21, Issue 1

3 -- 0Gordon Bell, Samuel H. Fuller, Daniel P. Siewiorek. Forword to the Special Issue on Computer Architecture
4 -- 12Simon H. Lavington. The Manchester Mark I and Atlas: A Historical Perspective
13 -- 24Roland N. Ibbett, P. C. Capon. The Development of the MU5 Computer System
25 -- 43B. R. Borgerson, M. L. Hanson, P. A. Hartley. The Evolution of the Sperry Univac 1100 Series: A History, Analysis, and Projection
44 -- 63Gordon Bell, A. Kotok, Thomas N. Hastings, R. Hill. The Evolution of the DECsystem 10
73 -- 96Richard P. Case, Andris Padegs. Architecture of the IBM System/370