Journal: Communications of the ACM

Volume 23, Issue 9

495 -- 502Dennis E. Hall, Deborah K. Scherrer, Joseph S. Sventek. A Virtual Operating System
503 -- 510Hitohisa Asai. An Overrelaxation for Numerical Inverse of a Constant
511 -- 521B. Kumar, Edward S. Davidson. Computer System Design Using a Hierarchical Approach to Performance Evaluation
522 -- 528John L. Pfaltz, William J. Berman, Edgar M. Cagley. Partial-Match Retrieval Using Indexed Descriptor Files

Volume 23, Issue 8

432 -- 439J. M. Triance, J. F. S. Yow. MCOBOL - A Prototype Macro Facility for Cobol
440 -- 442Michael T. Compton. Easing Fault Location in Large Systems
444 -- 465Kenneth E. Iverson. Notation as a Tool of Thought
466 -- 474Giles Peterson, Aaron B. Budgor. The Computer Language Mathsy and Applications to Solid State Physics
475 -- 480Maurice H. Halstead, Victor B. Schneider. Self-Assessment Procedure VII: A Self-Assessment Precedure Dealing with Software Science

Volume 23, Issue 7

368 -- 378Y. Banno, Hideaki Hirose, Y. Karita, H. Mawatari, H. Murakami, H. Takahashi, S. Yashiro, H. Yoshiki, N. Hagiwara, Yoshio Sakurai. KEKOPEN, An Open Batch Processing System at KEK
379 -- 389David Harel. On Folk Theorems
389 -- 394R. C. H. Cheng, G. M. Feast. Gamma Variate Generators with Increased Shape Parameter Range
394 -- 395Fabrizio Luccio, Linda Pagli. Comment on Generalized AVL Trees
396 -- 410Stuart K. Card, Thomas P. Moran, Allen Newell. The Keystroke-Level Model for User Performance Time with Interactice Systems

Volume 23, Issue 6

332 -- 342Jack A. Chambers, Jerry W. Sprecher. Computer Assisted Instruction: Current Trends
343 -- 349Turner Whitted. An Improved Illumination Model for Shaded Display
350 -- 351John G. Fletcher. A More General Algorithm for Computing Closed Semiring Costs Between Vertices of a Directed Graph

Volume 23, Issue 5

264 -- 271Robert L. Glass. Real-Time: The Lost World Of Software Debugging and Testing
272 -- 277Joshua Turner. The Structure Of Modular Programs
279 -- 285Ishwar K. Sethi, B. Chatterjee. Conversion of Decision Tables to Efficient Sequential Testing Procedures
286 -- 293Rik Maes. An Algorithmic Approach to the Conversion of Decision Grid Charts into Compressed Decision Tables
294 -- 300Arthur Gill. Hierarchical Binary Search

Volume 23, Issue 4

199 -- 207Charles L. Gold, Seymour E. Goodman, Benjamin G. Walker. Software: Recommendataions for an Export Control Policy
207 -- 213Ruven E. Brooks. Studying Programmer Behavior Experimentally: The Problems of Proper Methodology
214 -- 229Jon Louis Bentley. Multidimensional Divide-and-Conquer
229 -- 239Jean Vuillemin. A Unifying Look at Data Structures

Volume 23, Issue 3

143 -- 0Daniel D. McCracken. John W. Mauchly
144 -- 0Isaac L. Auerbach. A Tribute to John William Mauchly
145 -- 146J. Presper Eckert. Eulogy
147 -- 154Robert F. Ling. General Considerations on the Design of an Interactive System for Data Analysis
154 -- 158Christopher W. Fraser. A Generalized Text Editor
159 -- 162K. P. Lee. A Linear Algorithm for Copying Binary Trees Using Bounded Workspace
163 -- 170Hanan Samet. Region Representation: Quadtrees from Boundary Codes
171 -- 179Charles R. Dyer, Azriel Rosenfeld, Hanan Samet. Region Representation: Boundary Codes from Quadtrees

Volume 23, Issue 2

67 -- 70Anthony Ralston, Mary Shaw. Curriculum 78 - Is Computer Science Really that Unmathematical?
71 -- 80M. D. Canon, D. H. Fritz, John H. Howard, T. D. Howell, Michael F. Mitoma, Juan Rodriguez-Rossel. A Virtual Machine Emulator for Performance Evaluation
81 -- 92David D. Redell, Yogen K. Dalal, Thomas R. Horsley, Hugh C. Lauer, William C. Lynch, Paul R. McJones, Hal G. Murray, Stephen C. Purcell. Pilot: An Operating System for a Personal Computer
92 -- 105John K. Ousterhout, Donald A. Scelza, Pradeep S. Sindhu. Medusa: An Experiment in Distributed Operating System Structure
105 -- 117Butler W. Lampson, David D. Redell. Experience with Processes and Monitors in Mesa
118 -- 131Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek. Specification and Verification of the UCLA Unix Security Kernel

Volume 23, Issue 12

676 -- 687James L. Peterson. Computer Programs for Detecting and Correcting Spelling Errors
689 -- 703Patrick H. Winston. Learning and Reasoning by Analogy
703 -- 710Hanan Samet. Deletion in Two-Dimensional Quad Trees
711 -- 721John F. Shoch, Jon A. Hupp. Measured Performance of an Ethernet Local Network

Volume 23, Issue 11

620 -- 624Curtis R. Cook, Do Jin Kim. Best Sorting Algorithm for Nearly Sorted Lists
625 -- 626Michael L. V. Pitteway, D. J. Watkinson. Bresnham s Algorithm with Grey Scale
627 -- 628Daniel S. Hirschberg, J. B. Sinclair. Decentralized Extrema-Finding in Circular Configurations of Processors
628 -- 645Guy L. Steele Jr., Gerald Jay Sussman. Design of a LISP-Based Microprocessor
645 -- 653Micha Hofri. Disk Scheduling: FCFS vs. SSTF Revisited

Volume 23, Issue 10

546 -- 555Donald R. Chand, Surya B. Yadav. Logical Construction of Software
556 -- 563Henry F. Ledgard, John A. Whiteside, Andrew Singer, William Seymour. The Natural Language of Interactive Systems
564 -- 572Yonathan Bard. A Model of Shared DASD and Multipathing
573 -- 583K. Mani Chandy, Charles H. Sauer. Computational Algorithms for Product Form Queueing Networks
584 -- 593Dominique Potier, Ph. Leblanc. Analysis of Locking Policies in Database Management Systems

Volume 23, Issue 1

10 -- 13Paul O Neill, Avis O Neil. Performance Statistics of a Time Sharing Network at a Small University
14 -- 17Lawrence J. Mazlack. Identifying Potential to Acquire Programming Skill
17 -- 19Richard J. Cichelli. Minimal Perfect Hash Functions Made Simple
20 -- 23Harold Abelson, Peter Andreae. Information Transfer and Area-Time Tradeoffs for VLSI Multiplication
23 -- 34Jeffrey M. Lane, Loren C. Carpenter, Turner Whitted, James F. Blinn. Scan Line Methods for Displaying Parametrically Defined Surfaces