Journal: Communications of the ACM

Volume 26, Issue 9

623 -- 628Jon Louis Bentley. Aha! Algorithms
629 -- 630Pamela McCorduck. Introduction to the Fifth Generation
631 -- 636Paul S. Licker. The Japanese Approach: A Better Way to Manage Programmers?
637 -- 641Ehud Y. Shapiro. The Fifth Generation Project - Trip Report
642 -- 645Rosalie Steier. Cooperation is the Key: An Interview with B. R. Inman
646 -- 653. A Simple Database Language for Personal Computers
654 -- 660Andrew S. Tanenbaum, Hans van Staveren, E. G. Keizer, Johan W. Stevenson. A Practicel Tool Kit for Making Portable Compilers
663 -- 669Jeffrey L. Eppinger. An Empirical Study of Insertion an Deletion in Binary Search Trees
670 -- 676Ronald Prescott Loui. Optimal Paths in Graphs with Stochastic or Multidimensional Weights
677 -- 679Piraye Bayman, Richard E. Mayer. A Diagnosis of Beginning Programmers Misconceptions of BASIC Programming Statements
680 -- 693Hanan Samet. A Quadtree Medial Axis Transform

Volume 26, Issue 8

549 -- 552Jon Louis Bentley. Cracking the Oyster
554 -- 561William E. Burr. An Overview of the Proposed American National Standard for Local Distributed Data Interfaces
562 -- 569James V. Hansen. Audit Considerations in Distributed Processing Systems
570 -- 571James K. Mullin. A Second Look at Bloom Filters
572 -- 581David Lorge Parnas. A Generalized Control Structure and Its Formal Definition
582 -- 589Frank Milne, Ron Weber. The Economics of Designing Generalized Software
590 -- 594Stephen C. Hora. Estimation of the Inverse Function for Randim Variate Generation
595 -- 597Jürgen Peemöller. A Correction to Brelaz s Modification of Brown s Coloring Algorithm

Volume 26, Issue 7

467 -- 478David P. Gardner, Yvonne W. Larsen. A Nation At Risk: The Imperative for Educational Reform, Report by The National Commission on Excellence in Education
479 -- 482Eric A. Weiss. Self-Assessment Procedure XI: A Self-Assessment Procedure Dealing with One Part of Early Computing History
484 -- 494D. Verne Morland. Human Factors Guidlines for Terminal Interface Design
495 -- 503Thomas K. Landauer, Kathleen M. Galotti, S. Hartwell. Natural Command Names and Initial Learning: A Study of Text-Editing Terms
504 -- 515Mann-May Yau, Sargur N. Srihari. A Hierarchical Data Structure for Multidimensional Digital Images
516 -- 523Masanori Fushimi, Shu Tezuka. The k-Distribution of Generalized Feedback Shift Register Pseudorandom Numbers
525 -- 529Mark J. Cloutier, Matthew J. Friedman. Precision Averaging for Real-Time Analysis

Volume 26, Issue 6

400 -- 408Stephen A. Cook. An Overview of Computational Complexity
409 -- 417Jonathan Jacky, Ira Kalet. A General Purpose Data Entry Program
418 -- 0Robert W. Bemer. Coordinated Text and Transparencies
419 -- 429Henry Lieberman, Carl Hewitt. A Real-Time Garbage Collector Based on the Lifetimes of Objects
430 -- 444M. Lynne Markus. Power, Politics, and MIS Implementation
445 -- 449H. Rudy Ramsey, Michael E. Atwood, James R. Van Doren. Flowcharts Versus Program Design Languages: An Experimental Comparison

Volume 26, Issue 5

328 -- 337T. R. Girill, Clement H. Luk. Document: An Interactive, Online Solution to Four Documentation Problems
339 -- 0Michael J. Ginzberg. Introduction: Three Papers from the Third International Conference on Information Systems
340 -- 346Tarek K. Abdel-Hamid, Stuart E. Madnick. The Dynamics of Software Project Scheduling
347 -- 354R. E. A. Mason, T. T. Carey. Prototyping Interactive Information Systems
356 -- 361H. J. Will. ACL: A Language Specific for Auditors
362 -- 376Richard N. Taylor. A General-Purpose Algorithm for Analyzing Concurrent Programs
377 -- 382John Konvalina, Stanley A. Wileman, Larry J. Stephens. Math Proficiency: A Key to Success for Computer Science Students

Volume 26, Issue 4

246 -- 249P. J. Brown. Error Messages: The Neglected Area of the Man/Machine Interface?
250 -- 251Dalia Motzkin. Meansort
252 -- 253Michael L. Schneider, John C. Thomas. Introduction: The Humanization of Computer Interfaces
254 -- 258Donald A. Norman. Design Rules Based on Analyses of Human Error
259 -- 264Robert J. K. Jacob. Using Formal Specifications in the Design of a Human-Computer Interface
265 -- 283Teresa L. Roberts, Thomas P. Moran. The Evaluation of Text Editors: Methodology and Empirical Results
284 -- 294Steven L. Sauter, Mark S. Gottlieb, Karen C. Jones, Vernon N. Dodson, Kathryn M. Rohrer. Job and Health Implications of VDT Use: Initial results of the Wisconsin-NIOSH Study
295 -- 308John D. Gould, John Conti, Todd Hovanyecz. Composing Letters with a Simulated Listening Typewriter

Volume 26, Issue 3

182 -- 187Margrethe H. Olson. Remote Office Work: Changing Work Patterns in Space and Time
188 -- 195Michael A. Pechura. Comparing Two Microcomputer Operating Systems: CP/M and HDOS
196 -- 202A. Chesnais, Erol Gelenbe, Isi Mitrani. On the Modeling of Parallel Access to Shared Data
203 -- 215Simon S. Lam, Y. Luke Lien. A Tree Convolution Algorithm for the Solution of Queueing Networks
216 -- 220Hitohisa Asai, C. K. Cheng. Speeding Up an Overrelaxation Method of Division in Radix-2^n Machine

Volume 26, Issue 2

112 -- 118Ahmed S. Zaki. Regulation of Electronic Funds Transfer: Impact and Legal Issues
118 -- 119Gordon Bell. The Computer Museum Member s First Field Trip: The Northbay AN/FSQ7 Sage Site
120 -- 125William Kent. A Simple Guide to Five Normal Forms in Relational Database Theory
126 -- 127R. Charles Bell. Monte Carlo Debugging: A Brief Tutorial
128 -- 134Iris Vessey, Ron Weber. Some Factors Affecting Program Repair Maintenance: An Empirical Study
135 -- 136B. Srinivasan. On the Synthesis of Decision Tables
137 -- 145Michael J. Mathey, Bernard M. E. Moret. The Computational Metaphor and Quantum Physics

Volume 26, Issue 12

1040 -- 1045Jon Louis Bentley. Writing Correct Programs
1046 -- 1050Stephen S. Yau, Robert W. Ritchie, Warren Semon, J. F. Traub, Andries van Dam, Stanley Winkler. Meeting the Crisis in Comuter Science
1058 -- 1064Marc Eisenstadt. A User-Friendly Software Environment for the Novice Programmer
1066 -- 1072Paul J. Jalics, Thomas S. Heines. Transporting a Portable Operating System: UNIX to an IBM Minicomputer
1074 -- 1081Gaston H. Gonnet. Balancing Binary Trees by Internal Path Reduction
1082 -- 1088Seiichi Nishihara, Katsuo Ikeda. Reducing the Retrieval Time of Hashing Method by Using Predictors

Volume 26, Issue 11

832 -- 843James F. Allen. Maintaining Knowledge about Temporal Intervals
844 -- 852Wolfgang Bibel. Matings in Matrices
853 -- 860Elliot Soloway, Jeffrey Bonar, Kate Ehrlich. Cognitive Strategies and Looping Constructs: An Empirical Study
861 -- 867Richard J. Miara, Joyce A. Musselman, Juan A. Navarro, Ben Shneiderman. Program Indentation and Comprehensibility
868 -- 877You-Dong Liang, Brian A. Barsky. An Analysis and Algorithm for Polygon Clipping
878 -- 881J. T. Postmus, A. H. G. Rinnooy Kan, G. T. Timmer. An Efficient Dynamic Selection Method
882 -- 894Russell J. Abbott. Program design by Informal English Descriptions
895 -- 901Joep L. W. Kessels. On-the-Fly Optimization of Data Structures
902 -- 911David S. Wile. Program Developments: Formal Explanations of Implementations
912 -- 920Gaston H. Gonnet, Frank Wm. Tompa. A Constructive Approach to the Design of Algorithms and Their Data Structures
921 -- 923James F. Korsh, Gary Laison. A Multiple-Stack Manipulation Procedure
924 -- 925R. Charles Bell, Bryan Floyd. A Monte Carlo Study of Cichelli Hash-Function Solvability
926 -- 932Jack P. C. Kleijnen, Anton J. Van Reeken. Principles of Computer Charging in a University-Type Organization
933 -- 938Antoni Olivé. Information Derivability Analysis In Logical Information Systems
940 -- 944Kyu-Young Whang, Gio Wiederhold, Daniel Sagalowicz. Estimating Block Accesses in Database Organizations: A Closed Noniterative Formula
945 -- 947W. S. Luk. On Estimating Block Accesses in Database Organizations
948 -- 956Nicholas P. Vitalari, Gary W. Dickson. Problem Solving for Effective Systems Analysis: An Experimental Exploration
957 -- 963Lee Schruben. Simulation Modeling with Event Graphs
964 -- 971George S. Fishman, Baosheng D. Huang. Antithetic Variates Revisited
972 -- 986Raymond E. Barber, Henry C. Lucas Jr.. System Response Time, Operator Productivity, and Job Satisfaction
987 -- 997Ron Dagwell, Ron Weber. System Designers User Models: A Comparative Study and Methodological Critique
999 -- 1007Gabriel M. Silberman. Stack Processing Techniques in Delayed-Staging Storage Hierarchies
1008 -- 1021W. P. Petersen. Vector Fortran for Numerical Problems on GRAY-1
1022 -- 1036Gerard Salton, Edward A. Fox, Harry Wu. Extended Boolean Information Retrieval

Volume 26, Issue 10

726 -- 730Jon Louis Bentley. Data Structures Programs
732 -- 738Gerardine DeSanctis, James F. Courtney. Toward Friendly User MIS Implementation
739 -- 746Tor Guimaraes. Managing Application Program Maintenance Expenditures
747 -- 753Douglas Comer. The Computer Science Research Network CSNET: A History and Status Report
754 -- 763Michael A. Pechura, J. D. Schoeffler. Estimating File Access Time of Floppy Disks
764 -- 773Ivor Durham, David Alex Lamb, James B. Saxe. Spelling Correction in User Interfaces
775 -- 0Gordon B. Davis, M. H. Schwartz. Introduction to the Special Section on Information Systems Management
776 -- 784John F. Rockart, Lauren S. Flannery. The Management of End User Computing
785 -- 793Blake Ives, Margrethe H. Olson, Jack J. Baroudi. The Measurement of User Information Satisfaction
794 -- 799Beverly K. Kahn. Some Realities of Data Administration
800 -- 806John M. Ivancevich, H. Albert Napier, James C. Wetherbe. Occupational Stress, Attidudes, and Health Problems in the Information Systems Professionals
807 -- 811Kathryn M. Bartol. Turnover Among DP Personnel: A Causal Analysis

Volume 26, Issue 1

9 -- 13Klaus Samelson, Friedrich L. Bauer. Sequential Formula Translation (Reprint)
14 -- 16Edgar T. Irons. A Syntax Directed Compiler for ALGOL 60 (Reprint)
17 -- 20Edward H. Sussenguth Jr.. Use of Tree Structures for Processing Files (Reprint)
21 -- 22Edsger W. Dijkstra. Solutions of a Problem in Concurrent Programming Control (Reprint)
23 -- 28Joseph Weizenbaum. ELIZA - A Computer Program For the Study of Natural Language Communication Between Man And Machine (Reprint)
29 -- 29Jack B. Dennis, Earl C. Van Horn. Programming Semantics for Multiprogrammed Computations (Reprint)
36 -- 38W. D. Maurer. An Improved Hash Code for Scatter Storage (Reprint)
39 -- 42Robert Morris. Scatter Storage Techniques (Reprint)
43 -- 48Peter J. Denning. The Working Set Model for Program Behaviour (Reprint)
49 -- 52Edsger W. Dijkstra. The Structure of THE -Multiprogramming System (Reprint)
53 -- 56C. A. R. Hoare. An Axiomatic Basis for Computer Programming (Reprint)
57 -- 61Jay Earley. An Efficient Context-Free Parsing Algorithm (Reprint)
62 -- 63James R. Bell. The Quadratic Quotient Method: a Hash Code Eliminating Secondary Clustering (Reprint)
64 -- 69E. F. Codd. A Relational Model of Data for Large Shared Data Banks (Reprint)
70 -- 74Niklaus Wirth. Program Development by Stepwise Refinement (Reprint)
75 -- 78David Lorge Parnas. A Technique for Software Module Specification with Examples (Reprint)
79 -- 83H. Kuki, W. J. Cody. A Statistical Study of the Accuracy of Floating Point Number Systems (Reprint)
84 -- 89Dennis Ritchie, Ken Thompson. The UNIX Time-Sharing System (Reprint)
90 -- 95Robert Metcalfe, David Boggs. Ethernet: Distributed Packet Switching for Local Computer Networks (Reprint)
96 -- 99Ronald L. Rivest, Adi Shamir, Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint)
100 -- 106C. A. R. Hoare. Communicating Sequential Processes (Reprint)