Journal: Communications of the ACM

Volume 27, Issue 9

865 -- 871Jon Louis Bentley. Algorithm Design Techniques
872 -- 900David K. Gifford, Alfred Z. Spector. The Space Shuttle Primary Computer System
901 -- 0Edward Ng, Paul B. Schneck. Introduction to the Special Section on Computing in Space
902 -- 913Charles E. Trevathan, Thomas D. Taylor, Raymond G. Hartenstein, Ann. C. Merwarth, William N. Stewart. Development and Application of NASA s First Standard Spacecraft Computer
926 -- 936Gene D. Carlow. Architecture of the Space Shuttle Primary Avionics Software System
938 -- 949Hassan Gomaa. A Software Design Method for Real-Time Systems
950 -- 959Tim Maude, Derwent Maude. Hardware Protection Against Software Piracy

Volume 27, Issue 8

748 -- 756Yair M. Babad, Jeffrey A. Hoffer. Even no Data has a Value
758 -- 760Dennis Ritchie. Reflections on Software Research
761 -- 763Ken Thompson. Reflections on Trusting Trust
764 -- 776Nazim H. Madhavji. Visibility Aspects of Programmed Dyamic Data Structures
777 -- 781James A. Haskett. Pass-Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms
782 -- 784Douglas W. Jones. Improved Interpretation of UNIX-Like File Names Embedded in Data
785 -- 799Harry M. Markowitz, Ashok Malhotra, Donald P. Pazel. The EAS-E Application Development System: Principles and Language Summary
800 -- 806John M. Carroll, Caroline Carrithers. Training Wheels in a User Interface
807 -- 818D. R. K. Brownrigg. The Weighted Median Filter
819 -- 825D. Julian M. Davies. Memory Occupancy Patterns in Garbage Collection Systems
826 -- 832Lee L. Gremillion. Determinants of Program Repair Maintenance Requirements

Volume 27, Issue 7

630 -- 636Jon Louis Bentley. Updates
636 -- 637Rosalie Steier. An MCC Update
638 -- 648Andries van Dam. Computer Graphics Comes of Age (Interview)
649 -- 665David K. Gifford, Alfred Z. Spector. The TWA Reservation System
670 -- 677Per-Åke Larson, Ajay Kajla. File Organization: Implementation of a Method Guaranteeing Retrieval in One Access
678 -- 683John Kaunitz, Louis van Ekert. Audit Trail Compaction for Database Recovery
684 -- 694Robert B. Tilove. A Null-Object Detection Algorithm for Constructive Solid Geometry
695 -- 702Hsi Chang, S. Sitharama Iyengar. Efficient Algorithms to Globally Balance a Binary Search Tree
703 -- 718Jeffrey Scott Vitter. Faster Methods for Random Sampling

Volume 27, Issue 6

529 -- 536Jon Louis Bentley. Graphic Output
537 -- 545Gene Dallaire, John Shattuck, Richard P. Kusserow. Computer Matching: Should It Be Banned?
556 -- 563Maryam Alavi. An Assessment of the Prototyping Approach to Information Systems Development
564 -- 566Anthony I. Hinxman. Updating a Database in an Unsafe Environment
567 -- 572Ephraim P. Glinert, Richard E. Ladner. A Large Font Virtual Terminal Interface, A Software Prothesis for Visually Impaired
574 -- 593Robert Wilensky, Yigal Arens, David N. Chin. Talking to UNIX in English: An Overview of UC
594 -- 602Ten-Hwang Lai, Sartaj Sahni. Anomalies in Parallel Branch-and-Bound Algorithms

Volume 27, Issue 5

416 -- 421Jon Louis Bentley. Squeezing Space
422 -- 426Robert L. Graham. The Legal Protection of Computer Software
428 -- 434Richard V. Giddings. Accommodating Uncertainty in Software Design
435 -- 443Gopal K. Gupta. Self-Assessment Procedure XIII: A Self-Assessment Procedure Dealing with Binary Trees and B-Trees
455 -- 464Gerard D. Finn. An Algorithm for Optimized Boolean Evaluation in Information Management Systems
466 -- 475John Leslie King, Kenneth L. Kraemer. Evolution and Organizational Information Systems: An Assessment of Nolan s Stage Model
476 -- 485Izak Benbasat, Albert S. Dexter, Donald H. Drury, Robert C. Goldstein. A Critique of the Stage Hypothesis: Theory and Empirical Evidence
486 -- 495Richard A. Becker, John M. Chambers. Design of the S System for Data Analysis

Volume 27, Issue 4

287 -- 291Jon Louis Bentley. How to Sort
293 -- 298Gene Dallaire. American Universities Need Greater Access to Supercomputers
304 -- 311Lotfi A. Zadeh. Coping with the Imprecision of the Real World (Interview)
312 -- 321Peter J. Denning, Donn B. Parker, Susan H. Nycum, Willis H. Ware. Computers, Crime and Privacy - A National Dilema, Congressional Testimony from the Industry
322 -- 329Allen B. Tucker. A Perspective on Machine Translation: Theory and Practice
330 -- 335Michael C. Mulder, John F. Dalphin. Computer Science Program Requirements and Accreditation, An Interim Report of the ACM/IEEE Computer Society Joint Task Force
336 -- 341Jean E. Sammet, Bernard Rous. Progress Report on the ACM Guide to Computing Literature
343 -- 0Peter G. Neumann. A Further View of the First Quarter Century, Introduction to the April 1984 Special Section
344 -- 348Donald E. Knuth. The Complexity of Songs (April 1984 Special Section)
349 -- 350R. Lawrence Clark. A Linuistic Contribution to Goto-Less Programming (April 1984 Special Section)
352 -- 355P. J. Brown. Languages: Three Interviews (April 1984 Special Section)
356 -- 357J. B. Cadwallader-Cohen, W. W. Zysic, R. B. Donnelly. The Chaostron: An Important Advance in Learning Machines (April 1984 Special Section)
358 -- 368Joseph J. Pollock, Antonio Zamora. Automatic Spelling Correction in Scientific and Scholary Text
369 -- 374David C. Blair. The Data-Document Distinction in Information Retrieval
376 -- 383Izak Benbasat, Yair Wand. Command Abbreviation Behavior in Human-Computer Interaction
384 -- 387C. C. Chang. The Study of an Ordered Minimal Perfect Hashing Scheme
388 -- 392Dorothy E. Denning. Digital Signatures with RSA and Other Public-Key Cryptosystems
393 -- 395Ronald L. Rivest, Adi Shamir. How to Expose an Eavesdropper

Volume 27, Issue 3

180 -- 184Jon Louis Bentley. The Back of the Envelope
185 -- 194Gene Dallaire, Fortney H. Stark, Hal Berghel. Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools?
195 -- 200Jean B. Rogers, David G. Moursund, Gerald L. Engel. Preparing Precollege Teachers for the Computer Age
201 -- 207Robert W. Blanning. Conversing with Management Information Systems in Natural Language
208 -- 214Thomas A. D'Auria. ACM's Visit to The People's Republic of China
216 -- 221Paul J. Jalics. COBOL vs. PL/1: Some Performance Comparisons
222 -- 227Gerald P. Bozman. The Software Lookaside Buffer Reduces Search Overhead with Linked Lists
228 -- 235Dov Dori, Moshe Ben-Bassat. Efficient Nesting of Congruent Convex Figures
236 -- 239T. Y. Zhang, Ching Y. Suen. A Fast Parallel Algorithm for Thinning Digital Patterns
241 -- 247George Diehr, Bruce Faaland. Optimal Pagination of B-Trees with Variable-Length Items
248 -- 249Markku Tamminen. Comment on Quad- and Octtrees

Volume 27, Issue 2

91 -- 96Jon Louis Bentley. Code Tuning
98 -- 103Brian A. Wichmann. Is Ada Too Big? A designer Answers the Critics
104 -- 118Pamela Zave. The Operational versus the Conventional Approach to Software Development
119 -- 125Gordon E. Anderson. The Coordinated Use of Five Performance Evaluation Methodologies
126 -- 133Raymond C. Houghton Jr.. Online Help Systems: A Conspectus
134 -- 143Eric C. R. Hehner. Predicative Programming, Part I
144 -- 151Eric C. R. Hehner. Predicative Programming, Part II
152 -- 156Nicola Santoro. Chain Multiplication of Matrices of Approximately or Exactly the Same Size

Volume 27, Issue 12

1179 -- 1182Jon Louis Bentley. A Little Program, A Lot of Fun
1183 -- 0Gordon B. Davis. Selected Papers from the Fifth International Conference on Information Systems - Introduction
1184 -- 1192Paul Attewell, James Rule. Computing and Organizations: What We Know and What We Don t Know
1193 -- 1201Blake Ives, Gerard P. Learmonth. The Information System as a Competitive Weapon
1202 -- 1209Charles R. Franz, Daniel Robey. An Investigation of User-Led System Design: Rational and Political Perspectives
1210 -- 1217Jon Turner. Computer Mediated Work: The Interplay Between Technology and Structured Jobs
1218 -- 1226Rob Kling, Suzanne Iacono. The Control of Information Systems Developments After Implementation
1227 -- 1236John D. Litke. An Improved Solution to the Traveling Salesman Problem with Thousands of Nodes
1237 -- 1243Richard B. Wilmot. Foreign Keys Decrease Adaptability of Database Designs

Volume 27, Issue 11

1087 -- 1092Jon Louis Bentley. Perspective on Performance
1108 -- 1113Patricia F. Campbell, George P. McCabe. Predicting the Success of Freshmen in a Computer Science Major
1114 -- 1119Walter M. Mathews, Kaye Reifers. The Computer in Cartoons: A Retrospective from the Saturday Review
1120 -- 1121Robert S. Arnold, Norman F. Schneidewind, Nicholas Zvegintzov. A Software Maintenance Workshop
1122 -- 1128Larry R. Medsker. An Interactive Decision Support System for Energy Policy Analysis
1129 -- 1133James V. Hansen, William F. Messier. A Relational Approach to Decision Support for EDP Auditing
1134 -- 1142Leslie G. Valiant. A Theory of the Learnable
1143 -- 1154Timothy J. Hickey, Jacques Cohen. Performance Analysis of On-the-Fly Garbage Collection

Volume 27, Issue 10

990 -- 997Jean Ichbiah. Ada: Past, Present, Future, An Interview with Jean Ichbiah, the Principle Designer of Ada
998 -- 1001Elliot B. Koffman, Philip L. Miller, Caroline E. Wardle. Recommended Curriculum for CS1, 1984
1002 -- 1005Anthony Ralston. The First Course in Computer Science Needs a Mathematics Corequisite
1006 -- 1007Robert L. Ashenhurst. A Conference on Information Law and Ethics
1008 -- 1012C. Mani Krishna, Kang G. Shin, Yann-Hang Lee. Optimization Criteria for Checkpoint Placement
1013 -- 1030Reinhold Weicker. DHRYSTONE: A Synthetic Systems Programming Benchmark
1032 -- 1043Michael D. Good, John A. Whiteside, Dennis R. Wixon, Sandra J. Jones. Building a User-Derived Interface
1044 -- 1047Robert Marcus. An Application of Artificial Intelligence to Operations Research

Volume 27, Issue 1

29 -- 36Robert I. Winner, Edward M. Carter. Self-Assessment Procedure XII: A Self-Assessment Procedure Dealing with Computer Architecture
37 -- 41Peter J. L. Wallis, Brian A. Wichmann. Requirements Analysis for Ada Compilers
42 -- 52Victor R. Basili, Barry T. Perricone. Software Errors and Complexity: An Empirical Investigation
53 -- 57Paul Pritchard. Some Negative Results Concerning Prime Number Generators
58 -- 65Henry C. Lucas Jr.. Organizational Power and the Information Services Department