Journal: Communications of the ACM

Volume 24, Issue 9

556 -- 561Barry Dwyer. A User-Friendly Algorithm
563 -- 573Tim Teitelbaum, Thomas W. Reps. The Cornell Program Synthesizer: A Syntax-Directed Programming Environment
579 -- 583Páe Quittner, S. Csóka, S. Halász, D. Kotsis, K. Várnai. Comparison of Synonym Handling and Bucket Organization Methods
583 -- 584Robert J. McEliece, Dilip V. Sarwate. On Sharing Secrets and Reed-Solomon Codes
585 -- 586Jane Fedorowicz. Comments on Price/Performance Patterns of U.S. Computer Systems
587 -- 593Gail E. Kaiser. Automatic Extension of an ATN Knowledge Base
597 -- 605Jay L. Gischer. Shuffle Languages, Petri Nets, and Context-Sensitive Grammars

Volume 24, Issue 8

494 -- 501Richard A. Demers. System Design for Usability
502 -- 509William L. Ash. Mxec: Parallel Processing with an Advanced Macro Facility
511 -- 520Richard E. Mayer, Piraye Bayman. Psychology of Calculator Languages: A Framework for Describing Differences in Users Knowledge
521 -- 532Alan Jay Smith. Long Term File Migration: Development and Evaluation of Algorithms
533 -- 536Dorothy E. Denning, Giovanni Maria Sacco. Timestamps in Key Distribution Protocols

Volume 24, Issue 7

412 -- 418Michael Stonebraker. Operating System Support for Database Management
419 -- 433Anthony Ralston. The Proposed New Computing Reviews Classification Scheme, A Report of the Computing Reviews Category Revision Committee
434 -- 450Peter J. Denning. Report of the Public Cryptography Study Group
451 -- 456Harvey J. Greenberg, Richard P. O Neill. Representing Super-Sparse Matrices with Perturbed Values
457 -- 465Brian Billard. Polynomial Manipulation with APL
465 -- 467Ralph C. Merkle, Martin E. Hellman. On the Security of Multiple Encryption

Volume 24, Issue 6

351 -- 369J. F. Traub. Quo Vadimus: Computer Science in a Decade
370 -- 374Peter J. Denning, Edward A. Feigenbaum, Paul C. Gilmore, Anthony C. Hearn, Robert W. Ritchie, J. F. Traub. A Discipline in Crisis
375 -- 380John A. N. Lee. Response to the Federal Trade Commission s Proposed Ruling on Standards and Certification
381 -- 395Martin A. Fischler, Robert C. Bolles. Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography

Volume 24, Issue 5

288 -- 295Charles R. Litecky, Larry E. Rittenberg. The External Auditor s Review of Computer Controls
296 -- 297P. J. Robinson, Dave Singer. Another Spelling Correction Program
297 -- 298Robert P. Nix. Experiments With a Space Efficient Way to Store a Dictionary
299 -- 0J. Inglis. Pracniques: Updating A Master File - Yet One More Time
300 -- 309Franco P. Preparata, Jean Vuillemin. The Cube-Connected Cycles: A Versatile Network for Parallel Computation
310 -- 321Dana H. Ballard. Strip Trees: A Hierarchical Representation for Curves

Volume 24, Issue 4

173 -- 179Richard E. Nance. The Time and State Relationships in Simulation Modeling
180 -- 189Tuncer I. Ören. Concepts and Criteria to Access Acceptability of Simulation Studies: A Frame of References
190 -- 197Osman Balci, Robert G. Sargent. A Methodology for Cost-Risk Analysis in the Statistical Validation of Simulation Models
198 -- 206K. Mani Chandy, Jayadev Misra. Asynchronous Distributed Simulation via a Sequence of Parallel Computations
206 -- 217Gordon M. Clark. Use of Polya Distributions in Approximate Solutions to Nonstationary M/M/s Queues
218 -- 232Thomas J. Schriber, Richard W. Andrews. A Conceptual Framework for Research in the Analysis of Simulation Output
233 -- 245Philip Heidelberger, Peter D. Welch. A Spectral Method for Confidence Interval Generation and Run Length Control in Simulations
246 -- 252Lee Schruben. Control of Initialization Bias in Multivariate Simulation Response
253 -- 259James H. Donnelly, Robert E. Shannon. Minimum Mean-Squared-Error Estimators for Simulation Experiments
260 -- 273Philip Heidelberger, Peter A. W. Lewis. Regression-Adjusted Estimates for Regenerative Simulations, with Graphics

Volume 24, Issue 3

106 -- 113Marilyn M. Mantai. The Effect of Programming Team Structures on Programming Tasks
115 -- 123Kenneth I. Magel, Richard H. Austing, Alfs T. Berztiss, Gerald L. Engel, John W. Hamblen, A. A. J. Hoffmann, Robert F. Mathis. Recommendations for Master s Level Programs in Computer Science
124 -- 133Jay F. Nunamaker. Educational Programs in Information Systems
134 -- 139Jack Minker. Computer Scientists Whose Scientific Freedom and Human Rights Have Been Violated: A Report of the ACM Commitee on Scientific Freedom and Human Rights
140 -- 146Gregory R. Andrews. Parallel Programs: Proofs, Principles, and Practice
146 -- 155Abbe Mowshowitz. On Approaches to the Study of Social Issues in Computing

Volume 24, Issue 2

66 -- 72Fred N. Krull. Experience With ILIAD: A High-Level Process Control Language
73 -- 0E. J. Gauss. Pracniques: Built-In Checklist Reduces File Destruction
75 -- 83C. A. R. Hoare. The Emperor s Old Clothes
84 -- 88David Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
88 -- 90Arnold L. Rosenberg. On Uniformly Inserting One Data Structure into Another

Volume 24, Issue 12

796 -- 800Leonard J. Bass, Ralph E. Bunker. A Generalized User Interface for Applications Programs
801 -- 812William M. McCormack, Robert G. Sargent. Analysis of Future Event Set Algorithms for Discrete Event Simulation
813 -- 825Per Galle. An Algorithm for Exhaustive Generation of Building Floor Plans
825 -- 829John H. Blackstone Jr., Gary L. Hogg, Don T. Phillips. A Two-List Synchronization Procedure for Discrete Event Simulation
829 -- 833Gerhard Jaeschke. Reciprocal Hashing: A Method for Generating Minimal Perfect Hashing Functions

Volume 24, Issue 11

728 -- 733Saul I. Gass, Karla L. Hoffman, Richard Henry Frymuth Jackson, Lambert S. Joel, Patsy B. Saunders. Documentation for a Model: A Hierarchical Approach
734 -- 738Michael A. Pechura. Microcomputers as Remote Nodes of a Distributed System
739 -- 751Starr Roxanne Hiltz, Murray Turoff. The Evolution of User Behavior in a Computerized Conferencing System
752 -- 762Izak Benbasat, Albert S. Dexter, Paul S. Masulis. An Experimental Study of the Human/Computer Interface
763 -- 769Bennet P. Lientz, E. Burton Swanson. Problems in Application Software Maintenance
770 -- 772Leslie Lamport. Password Authentification with Insecure Communication
772 -- 774Kellogg S. Booth. Authentication of Signature Using Public Key Encryption

Volume 24, Issue 10

632 -- 646Donald D. Chamberlin, Morton M. Astrahan, Mike W. Blasgen, Jim Gray, W. Frank King III, Bruce G. Lindsay, Raymond A. Lorie, James W. Mehl, Thomas G. Price, Gianfranco R. Putzolu, Patricia G. Selinger, Mario Schkolnick, Donald R. Slutz, Irving L. Traiger, Bradford W. Wade, Robert A. Yost. A History and Evaluation of System R
647 -- 678Peter Wegner. Self-Assessment Procedure VIII: A Self-Assessment Procedure Dealing with the Programming Language Ada
679 -- 687Daniel Robey. Computer Information Systems and Organization Structure
687 -- 699Peter J. Denning, T. Don Dennis, Jeffrey A. Brumfield. Low Contention Semaphores and Ready Lists
699 -- 709David A. Patterson. An Experiment in High Level Language Microprogramming and Verification

Volume 24, Issue 1

3 -- 8Barry Dwyer. One More Time - How to Update a Master File
9 -- 17Glenn Ricart, Ashok K. Agrawala. An Optimal Algorithm for Mutual Exclusion in Computer Networks
18 -- 23Paul Pritchard. A Sublinear Additive Sieve for Finding Prime Numbers
24 -- 33Peter G. W. Keen. Information Systems and Organizational Change