Journal: Communications of the ACM

Volume 33, Issue 9

21 -- 24Diane Crawford. EC Directives Aim for Market Harmony
29 -- 36Larry Press. Compuvision or Teleputer?
38 -- 39John D. McGregor, Timothy D. Korson. Object-Oriented Design (Introduction to the Special Issue)
40 -- 60John D. McGregor, Timothy D. Korson. Understanding Object-Oriented: A Unifying Paradigm
61 -- 64David Jordan. Implementation Benefits of C++ Language Mechanisms
65 -- 67Michael F. Kilian. Trellis: Turning Designs into Programs
68 -- 88Bertrand Meyer. Lessons from the Design of the Eiffel Libraries
90 -- 103Simon J. Gibbs, Dennis Tsichritzis, Eduardo Casais, Oscar Nierstrasz, Xavier Pintado. Class Management for Software Communities
104 -- 124Rebecca Wirfs-Brock, Ralph E. Johnson. Surveying Current Research in Object-Oriented Design
125 -- 141Gul Agha. Concurrent Object-Oriented Programming
142 -- 159Brian Henderson-Sellers, Julian M. Edwards. The Object-Oriented Systems Life Cycle
160 -- 169David Gries, Dorothy Marsh. The 1988-89 Taulbee Survey Report
202 -- 0Peter G. Neumann. A Few Old Coincidences

Volume 33, Issue 8

19 -- 21Maurice V. Wilkes. The Bandwidth Famine
23 -- 27Pamela Samuelson. Should Program Algorithms be Patented?
30 -- 49Douglas B. Lenat, Ramanathan V. Guha, Karen Pittman, Dexter Pratt, Mary Shepherd. CYC: Toward Programs With Common Sense
50 -- 71Jim Barnett, Kevin Knight, Inderjeet Mani, Elaine Rich. Knowledge and Natural Language Processing
72 -- 82George M. White. Natural Language Understanding and Speech Recognition
84 -- 95Karen A. Frenkel. Highlights from The Second Annual Computer Bowl
97 -- 102Mark D. Hill, James R. Larus. Cache Considerations for Multiprocessor Programmers
103 -- 111Leslie G. Valiant. A Bridging Model for Parallel Computation
112 -- 119Theodor D. Sterling, James J. Weinkam. Sharing Scientific Data
120 -- 131Mark L. Gillenson. Physical Design Equivalencies in Database Conversion
132 -- 142Daniel Sunday. A Very Fast Substring Search Algorithm
170 -- 0Peter G. Neumann. Insecurity about Security?

Volume 33, Issue 7

21 -- 26Larry Press. Simple Complexity and COMDEX
27 -- 29Diane Crawford. Budget FY 1991 - The Numbers Tell the Story
30 -- 37Thomas E. Linehan. Digital Image - Digital Cinema
41 -- 51Karen A. Frenkel. The Politics of Standards and the EC
52 -- 68Jacques Cohen. Constraint Logic Programming Languages
69 -- 90Alain Colmerauer. An Introduction to Prolog III
93 -- 104Monty Newborn. The 20th Annual ACM North American Computer Chess Championship
105 -- 116S. Jerrold Kaplan, Mitchell Kapor, Edward J. Belove, Richard A. Landsman, Todd D. Drake. Agenda: A Personal Information Manager
117 -- 127David Chenho Kung. Object Subclass Hierarchy in SQL: A Simple Approach
154 -- 0Peter G. Neumann. Some Reflections on a Telephone Switching Problem

Volume 33, Issue 6

631 -- 633Maurice V. Wilkes. Networks, Email, and FAX
636 -- 648David Lorge Parnas, A. John van Schouwen, Shu Po Kwan. Evaluation of Safety-Critical Software
652 -- 657Renate Rohde, Jim Haskett. Disaster Recovery Planning For Academic Computing Centers
658 -- 667E. Burton Swanson, Cynthia Mathis Beath. Departmentalization in Software Development and Maintenance
668 -- 676William Pugh. Skip Lists: A Probabilistic Alternative to Balanced Trees
677 -- 680Peter K. Pearson. Fast Hashing of Variable-Length Text Strings
681 -- 694Vijay Kumar. Concurrent Operations on Extendible Hashing and its Performance

Volume 33, Issue 5

483 -- 487Pamela Samuelson, Robert J. Glushko. Survey on the Look and Feel Lawsuits
488 -- 490Edgar H. Sibley. Alphabets & Languages (Introduction to the Special Section)
491 -- 494Jinan Qiao, Yizheng Qiao, Sanzheng Qiao. Six-Digit Coding Method
495 -- 504Murat Tayli, Abdulah I. Al-Salamah. Building Bilingual Microcomputer Systems
506 -- 520Paul W. Oman, Curtis R. Cook. Typographic Style is More than Cosmetic
521 -- 527Subramanian Raman, Narayanan Alwar. An AI-Based Approach to Machine Translation in Indian Languages
528 -- 538Kuldeep Kumar, Niels Bjørn-Andersen. A Cross-Cultural Comparison of IS Designer Values
539 -- 543Alan H. Karp, Horace P. Flatt. Measuring Parallel Processor Performance
544 -- 562Jason L. Frand, Julia A. Britt. Sixth Annual UCLA Survey of Business School Computer Usage
563 -- 576Brian A. Rudolph. Self-Assessment Procedure XXI: A Self-Assessment Procedure on Concurrency

Volume 33, Issue 4

399 -- 401Maurice V. Wilkes. Computer Security in the Business World
404 -- 410Karen A. Frenkel. The European Community and Information Technology
412 -- 416Gerrit Jeelof. Europe 1992: Fraternity or Fortress?
424 -- 425Eiichi Ono. Japan s View of EC 92
439 -- 448Kurt Geihs, Ulf Hollberg. Retrospective on DACNOS
449 -- 459Daniel S. Hirschberg, Debra A. Lelewer. Efficient Decoding of Prefix Codes

Volume 33, Issue 3

274 -- 279Larry Press. SIGGRAPH 89 - Tomorrows s PC Today
296 -- 310Jakob Nielsen. The Art of Navigating through Hypertext
311 -- 321David A. Carlson, Sudha Ram. HyperIntelligence: The Next Frontier
323 -- 336Vasant Dhar, Nicky Ranganathan. Integer Programming vs. Expert Systems: An Experimental Comparison
338 -- 348Rolf Molich, Jakob Nielsen. Improving a Human-Computer Dialogue
349 -- 360Farahangiz Arefi, Charles E. Hughes, David A. Workman. Automatically Generating Visual Syntax-Directed Editors
361 -- 0Christopher J. Van Wyk. Literate Programming: An Assessment

Volume 33, Issue 2

111 -- 114Pamela Samuelson. Interface Specifications, Compatibility, and Intellectual Property Law
115 -- 119Larry Press. Wings for the Mind: The 1989 SIGCHI National Conference
120 -- 125Ellen D. Hoadley. Investigating the Effects of Color
126 -- 139Dinesh Batra, Jeffrey A. Hoffer, Robert P. Bostrom. Comparing Representations with Relational and EER Models
141 -- 151David K. Gifford. Polychannel Systems for Mass Digital Communications
152 -- 166Anders Kierulf, Ken Chen, Jürg Nievergelt. Smart Game Board and Go Explorer: A Study in Software and Knowledge Engineering
168 -- 176Rick Joyce, Gopal K. Gupta. Identity Authentication Based on Keystroke Latencies
177 -- 189Bezalel Gavish, Olivia R. Liu Sheng. Dynamic File Migration in Distributed Computer Systems
190 -- 201John Rosenberg, Akkihebbal L. Ananda, B. Srinivasan. Self-Assessment Procedure XX: Operating Systems
203 -- 212Kuldeep Kumar. Post Implementation Evaluation of Computer-Based Information Systems: Current Practices
214 -- 224Matthew A. Tillman, David Chi-Chung Yen. SNA and OSI: Three Strategies for Interconnection
225 -- 232Johnny Martin, W. T. Tsai. N-Fold Inspection: A Requirements Analysis Technique

Volume 33, Issue 12

16 -- 0Maurice V. Wilkes. The Rise of the VLSI Processor
18 -- 31John F. Muratore, Troy A. Heindel, Terri B. Murphy, Arthur N. Rasmussen, Robert Z. McFarland. Real-Time Data Acquisition at Mission Control
32 -- 44Barton P. Miller, Lars Fredriksen, Bryan So. An Empirical Study of the Reliability of UNIX Utilities
46 -- 63Andrew S. Tanenbaum, Robbert van Renesse, Hans van Staveren, Gregory J. Sharp, Sape J. Mullender. Experiences with the Amoeba Distributed Operating System
65 -- 75Vijay Gurbaxani. Diffusion in Computing Networks: The Case of BITNET
138 -- 0Jonathan Jacky. Inside Risks: Risks in Medical Electronics

Volume 33, Issue 11

19 -- 26Larry Press. Windows, DOS and the Mac
27 -- 33Pamela Samuelson. How to Interpret the Lotus Decision (And How Not To)
34 -- 46Karen A. Frenkel. Women and Computing
47 -- 57Amy Pearl, Martha E. Pollack, Eve A. Riskin, Becky Thomas, Elizabeth Wolf, Alice Wu. Becoming A Computer Scientist
58 -- 74Kevin Knight. Connectionist Ideas and Algorithms
75 -- 86Philip A. Bernstein. Transaction Processing Monitors
88 -- 97Paul S. Jacobs, Lisa F. Rau. SCISOR: Extracting Information from On-Line News
99 -- 109William J. Premerlani, James E. Rumbaugh, Michael R. Blaha, Thomas A. Varwig. An Object-Oriented Relational Database
110 -- 132Eric A. Weiss. The XXII Self-Assessment: The Ethics of Computing
170 -- 0Peter G. Neumann. Risks in Computerized Elections

Volume 33, Issue 10

19 -- 21Maurice V. Wilkes. It s All Software Now
23 -- 27Marc Rettig. Software Teams
28 -- 29Philip Heidelberger. Discrete Event Simulation (Introduction to the Special Section)
30 -- 53Richard Fujimoto. Parallel Discrete Event Simulation
54 -- 60Sanjay Jain, Karon Barber, David Osterfeld. Expert Simulation for On-Line Scheduling
63 -- 74Alexander Dupuy, Jed Schwartz, Yechiam Yemini, David F. Bacon. NEST: A Network Simulation and Prototyping Testbed
75 -- 84Peter W. Glynn. Likelihood Ratio Gradient Estimation for Stochastic Systems
85 -- 97Pierre L Ecuyer. Random Numbers for Simulation
98 -- 108David J. Miller. Simulation of a Semiconductor Manufacturing Line
109 -- 118Jakob Nielsen. Traditional Dialogue Design Applied to Modern User Interfaces
119 -- 129Brian D. Lynch, H. Raghav Rao, Winston T. Lin. Economic Analysis of Microcomputer Hardware
170 -- 0Peter G. Neumann. Ghosts, Mysteries and Uncertainty

Volume 33, Issue 1

6 -- 10Forouzan Golshani, Thaddeus Regulinski. On the Synergism of Computers and Communication (Introduction to the Special Section)
11 -- 19Michael W. Marcellin, Thomas R. Fischer. Generalized Predictive TCQ of Speech
20 -- 28S. S. Gaitonde, Doug Jacobson, A. V. Pohm. Bounding Delay on a Multifarious Token Ring Network
29 -- 42Philip K. McKinley, Jane W.-S. Liu. Multicast Tree Construction in Bus-Based Networks
43 -- 52Krishnan Padmanabhan. Cube Structures for Multiprocessors
54 -- 63Bjørn N. Freeman-Benson, John Maloney, Alan Borning. An Incremental Constraint Solver
70 -- 80Chin-Wan Chung. DATAPLEX: An Access to Heterogeneous Distributed Databases
81 -- 86Jason Gait. Phoenix: A Safe In-Memory File System