researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal
Journal: Communications of the ACM
Home
Index
Info
Volume
Volume
33
, Issue
9
21
--
24
Diane Crawford
.
EC Directives Aim for Market Harmony
29
--
36
Larry Press
.
Compuvision or Teleputer?
38
--
39
John D. McGregor
,
Timothy D. Korson
.
Object-Oriented Design (Introduction to the Special Issue)
40
--
60
John D. McGregor
,
Timothy D. Korson
.
Understanding Object-Oriented: A Unifying Paradigm
61
--
64
David Jordan
.
Implementation Benefits of C++ Language Mechanisms
65
--
67
Michael F. Kilian
.
Trellis: Turning Designs into Programs
68
--
88
Bertrand Meyer
.
Lessons from the Design of the Eiffel Libraries
90
--
103
Simon J. Gibbs
,
Dennis Tsichritzis
,
Eduardo Casais
,
Oscar Nierstrasz
,
Xavier Pintado
.
Class Management for Software Communities
104
--
124
Rebecca Wirfs-Brock
,
Ralph E. Johnson
.
Surveying Current Research in Object-Oriented Design
125
--
141
Gul Agha
.
Concurrent Object-Oriented Programming
142
--
159
Brian Henderson-Sellers
,
Julian M. Edwards
.
The Object-Oriented Systems Life Cycle
160
--
169
David Gries
,
Dorothy Marsh
.
The 1988-89 Taulbee Survey Report
202
--
0
Peter G. Neumann
.
A Few Old Coincidences
Volume
33
, Issue
8
19
--
21
Maurice V. Wilkes
.
The Bandwidth Famine
23
--
27
Pamela Samuelson
.
Should Program Algorithms be Patented?
30
--
49
Douglas B. Lenat
,
Ramanathan V. Guha
,
Karen Pittman
,
Dexter Pratt
,
Mary Shepherd
.
CYC: Toward Programs With Common Sense
50
--
71
Jim Barnett
,
Kevin Knight
,
Inderjeet Mani
,
Elaine Rich
.
Knowledge and Natural Language Processing
72
--
82
George M. White
.
Natural Language Understanding and Speech Recognition
84
--
95
Karen A. Frenkel
.
Highlights from The Second Annual Computer Bowl
97
--
102
Mark D. Hill
,
James R. Larus
.
Cache Considerations for Multiprocessor Programmers
103
--
111
Leslie G. Valiant
.
A Bridging Model for Parallel Computation
112
--
119
Theodor D. Sterling
,
James J. Weinkam
.
Sharing Scientific Data
120
--
131
Mark L. Gillenson
.
Physical Design Equivalencies in Database Conversion
132
--
142
Daniel Sunday
.
A Very Fast Substring Search Algorithm
170
--
0
Peter G. Neumann
.
Insecurity about Security?
Volume
33
, Issue
7
21
--
26
Larry Press
.
Simple Complexity and COMDEX
27
--
29
Diane Crawford
.
Budget FY 1991 - The Numbers Tell the Story
30
--
37
Thomas E. Linehan
.
Digital Image - Digital Cinema
41
--
51
Karen A. Frenkel
.
The Politics of Standards and the EC
52
--
68
Jacques Cohen
.
Constraint Logic Programming Languages
69
--
90
Alain Colmerauer
.
An Introduction to Prolog III
93
--
104
Monty Newborn
.
The 20th Annual ACM North American Computer Chess Championship
105
--
116
S. Jerrold Kaplan
,
Mitchell Kapor
,
Edward J. Belove
,
Richard A. Landsman
,
Todd D. Drake
.
Agenda: A Personal Information Manager
117
--
127
David Chenho Kung
.
Object Subclass Hierarchy in SQL: A Simple Approach
154
--
0
Peter G. Neumann
.
Some Reflections on a Telephone Switching Problem
Volume
33
, Issue
6
631
--
633
Maurice V. Wilkes
.
Networks, Email, and FAX
636
--
648
David Lorge Parnas
,
A. John van Schouwen
,
Shu Po Kwan
.
Evaluation of Safety-Critical Software
652
--
657
Renate Rohde
,
Jim Haskett
.
Disaster Recovery Planning For Academic Computing Centers
658
--
667
E. Burton Swanson
,
Cynthia Mathis Beath
.
Departmentalization in Software Development and Maintenance
668
--
676
William Pugh
.
Skip Lists: A Probabilistic Alternative to Balanced Trees
677
--
680
Peter K. Pearson
.
Fast Hashing of Variable-Length Text Strings
681
--
694
Vijay Kumar
.
Concurrent Operations on Extendible Hashing and its Performance
Volume
33
, Issue
5
483
--
487
Pamela Samuelson
,
Robert J. Glushko
.
Survey on the Look and Feel Lawsuits
488
--
490
Edgar H. Sibley
.
Alphabets & Languages (Introduction to the Special Section)
491
--
494
Jinan Qiao
,
Yizheng Qiao
,
Sanzheng Qiao
.
Six-Digit Coding Method
495
--
504
Murat Tayli
,
Abdulah I. Al-Salamah
.
Building Bilingual Microcomputer Systems
506
--
520
Paul W. Oman
,
Curtis R. Cook
.
Typographic Style is More than Cosmetic
521
--
527
Subramanian Raman
,
Narayanan Alwar
.
An AI-Based Approach to Machine Translation in Indian Languages
528
--
538
Kuldeep Kumar
,
Niels Bjørn-Andersen
.
A Cross-Cultural Comparison of IS Designer Values
539
--
543
Alan H. Karp
,
Horace P. Flatt
.
Measuring Parallel Processor Performance
544
--
562
Jason L. Frand
,
Julia A. Britt
.
Sixth Annual UCLA Survey of Business School Computer Usage
563
--
576
Brian A. Rudolph
.
Self-Assessment Procedure XXI: A Self-Assessment Procedure on Concurrency
Volume
33
, Issue
4
399
--
401
Maurice V. Wilkes
.
Computer Security in the Business World
404
--
410
Karen A. Frenkel
.
The European Community and Information Technology
412
--
416
Gerrit Jeelof
.
Europe 1992: Fraternity or Fortress?
424
--
425
Eiichi Ono
.
Japan s View of EC 92
439
--
448
Kurt Geihs
,
Ulf Hollberg
.
Retrospective on DACNOS
449
--
459
Daniel S. Hirschberg
,
Debra A. Lelewer
.
Efficient Decoding of Prefix Codes
Volume
33
, Issue
3
274
--
279
Larry Press
.
SIGGRAPH 89 - Tomorrows s PC Today
296
--
310
Jakob Nielsen
.
The Art of Navigating through Hypertext
311
--
321
David A. Carlson
,
Sudha Ram
.
HyperIntelligence: The Next Frontier
323
--
336
Vasant Dhar
,
Nicky Ranganathan
.
Integer Programming vs. Expert Systems: An Experimental Comparison
338
--
348
Rolf Molich
,
Jakob Nielsen
.
Improving a Human-Computer Dialogue
349
--
360
Farahangiz Arefi
,
Charles E. Hughes
,
David A. Workman
.
Automatically Generating Visual Syntax-Directed Editors
361
--
0
Christopher J. Van Wyk
.
Literate Programming: An Assessment
Volume
33
, Issue
2
111
--
114
Pamela Samuelson
.
Interface Specifications, Compatibility, and Intellectual Property Law
115
--
119
Larry Press
.
Wings for the Mind: The 1989 SIGCHI National Conference
120
--
125
Ellen D. Hoadley
.
Investigating the Effects of Color
126
--
139
Dinesh Batra
,
Jeffrey A. Hoffer
,
Robert P. Bostrom
.
Comparing Representations with Relational and EER Models
141
--
151
David K. Gifford
.
Polychannel Systems for Mass Digital Communications
152
--
166
Anders Kierulf
,
Ken Chen
,
Jürg Nievergelt
.
Smart Game Board and Go Explorer: A Study in Software and Knowledge Engineering
168
--
176
Rick Joyce
,
Gopal K. Gupta
.
Identity Authentication Based on Keystroke Latencies
177
--
189
Bezalel Gavish
,
Olivia R. Liu Sheng
.
Dynamic File Migration in Distributed Computer Systems
190
--
201
John Rosenberg
,
Akkihebbal L. Ananda
,
B. Srinivasan
.
Self-Assessment Procedure XX: Operating Systems
203
--
212
Kuldeep Kumar
.
Post Implementation Evaluation of Computer-Based Information Systems: Current Practices
214
--
224
Matthew A. Tillman
,
David Chi-Chung Yen
.
SNA and OSI: Three Strategies for Interconnection
225
--
232
Johnny Martin
,
W. T. Tsai
.
N-Fold Inspection: A Requirements Analysis Technique
Volume
33
, Issue
12
16
--
0
Maurice V. Wilkes
.
The Rise of the VLSI Processor
18
--
31
John F. Muratore
,
Troy A. Heindel
,
Terri B. Murphy
,
Arthur N. Rasmussen
,
Robert Z. McFarland
.
Real-Time Data Acquisition at Mission Control
32
--
44
Barton P. Miller
,
Lars Fredriksen
,
Bryan So
.
An Empirical Study of the Reliability of UNIX Utilities
46
--
63
Andrew S. Tanenbaum
,
Robbert van Renesse
,
Hans van Staveren
,
Gregory J. Sharp
,
Sape J. Mullender
.
Experiences with the Amoeba Distributed Operating System
65
--
75
Vijay Gurbaxani
.
Diffusion in Computing Networks: The Case of BITNET
138
--
0
Jonathan Jacky
.
Inside Risks: Risks in Medical Electronics
Volume
33
, Issue
11
19
--
26
Larry Press
.
Windows, DOS and the Mac
27
--
33
Pamela Samuelson
.
How to Interpret the Lotus Decision (And How Not To)
34
--
46
Karen A. Frenkel
.
Women and Computing
47
--
57
Amy Pearl
,
Martha E. Pollack
,
Eve A. Riskin
,
Becky Thomas
,
Elizabeth Wolf
,
Alice Wu
.
Becoming A Computer Scientist
58
--
74
Kevin Knight
.
Connectionist Ideas and Algorithms
75
--
86
Philip A. Bernstein
.
Transaction Processing Monitors
88
--
97
Paul S. Jacobs
,
Lisa F. Rau
.
SCISOR: Extracting Information from On-Line News
99
--
109
William J. Premerlani
,
James E. Rumbaugh
,
Michael R. Blaha
,
Thomas A. Varwig
.
An Object-Oriented Relational Database
110
--
132
Eric A. Weiss
.
The XXII Self-Assessment: The Ethics of Computing
170
--
0
Peter G. Neumann
.
Risks in Computerized Elections
Volume
33
, Issue
10
19
--
21
Maurice V. Wilkes
.
It s All Software Now
23
--
27
Marc Rettig
.
Software Teams
28
--
29
Philip Heidelberger
.
Discrete Event Simulation (Introduction to the Special Section)
30
--
53
Richard Fujimoto
.
Parallel Discrete Event Simulation
54
--
60
Sanjay Jain
,
Karon Barber
,
David Osterfeld
.
Expert Simulation for On-Line Scheduling
63
--
74
Alexander Dupuy
,
Jed Schwartz
,
Yechiam Yemini
,
David F. Bacon
.
NEST: A Network Simulation and Prototyping Testbed
75
--
84
Peter W. Glynn
.
Likelihood Ratio Gradient Estimation for Stochastic Systems
85
--
97
Pierre L Ecuyer
.
Random Numbers for Simulation
98
--
108
David J. Miller
.
Simulation of a Semiconductor Manufacturing Line
109
--
118
Jakob Nielsen
.
Traditional Dialogue Design Applied to Modern User Interfaces
119
--
129
Brian D. Lynch
,
H. Raghav Rao
,
Winston T. Lin
.
Economic Analysis of Microcomputer Hardware
170
--
0
Peter G. Neumann
.
Ghosts, Mysteries and Uncertainty
Volume
33
, Issue
1
6
--
10
Forouzan Golshani
,
Thaddeus Regulinski
.
On the Synergism of Computers and Communication (Introduction to the Special Section)
11
--
19
Michael W. Marcellin
,
Thomas R. Fischer
.
Generalized Predictive TCQ of Speech
20
--
28
S. S. Gaitonde
,
Doug Jacobson
,
A. V. Pohm
.
Bounding Delay on a Multifarious Token Ring Network
29
--
42
Philip K. McKinley
,
Jane W.-S. Liu
.
Multicast Tree Construction in Bus-Based Networks
43
--
52
Krishnan Padmanabhan
.
Cube Structures for Multiprocessors
54
--
63
Bjørn N. Freeman-Benson
,
John Maloney
,
Alan Borning
.
An Incremental Constraint Solver
70
--
80
Chin-Wan Chung
.
DATAPLEX: An Access to Heterogeneous Distributed Databases
81
--
86
Jason Gait
.
Phoenix: A Safe In-Memory File System