default search action
Communications of the ACM (CACM), Volume 26, 1983
Volume 26, Number 1, January 1983
- Klaus Samelson, Friedrich L. Bauer:
Sequential Formula Translation (Reprint). 9-13 - Edgar T. Irons:
A Syntax Directed Compiler for ALGOL 60 (Reprint). 14-16 - Edward H. Sussenguth Jr.:
Use of Tree Structures for Processing Files (Reprint). 17-20 - Edsger W. Dijkstra:
Solutions of a Problem in Concurrent Programming Control (Reprint). 21-22 - Joseph Weizenbaum:
ELIZA - A Computer Program For the Study of Natural Language Communication Between Man And Machine (Reprint). 23-28 - Jack B. Dennis, Earl C. Van Horn:
Programming Semantics for Multiprogrammed Computations (Reprint). 29 - W. D. Maurer:
An Improved Hash Code for Scatter Storage (Reprint). 36-38 - Robert H. Morris Sr.:
Scatter Storage Techniques (Reprint). 39-42 - Peter J. Denning:
The Working Set Model for Program Behaviour (Reprint). 43-48 - Edsger W. Dijkstra:
The Structure of "THE"-Multiprogramming System (Reprint). 49-52 - C. A. R. Hoare:
An Axiomatic Basis for Computer Programming (Reprint). 53-56 - Jay Earley:
An Efficient Context-Free Parsing Algorithm (Reprint). 57-61 - James R. Bell:
The Quadratic Quotient Method: a Hash Code Eliminating Secondary Clustering (Reprint). 62-63 - E. F. Codd:
A Relational Model of Data for Large Shared Data Banks (Reprint). 64-69 - Niklaus Wirth:
Program Development by Stepwise Refinement (Reprint). 70-74 - David Lorge Parnas:
A Technique for Software Module Specification with Examples (Reprint). 75-78 - Hirondo Kuki, William J. Cody:
A Statistical Study of the Accuracy of Floating Point Number Systems (Reprint). 79-83 - Dennis Ritchie, Ken Thompson:
The UNIX Time-Sharing System (Reprint). 84-89 - Robert Metcalfe, David R. Boggs:
Ethernet: Distributed Packet Switching for Local Computer Networks (Reprint). 90-95 - Ronald L. Rivest, Adi Shamir, Leonard M. Adleman:
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). 96-99 - C. A. R. Hoare:
Communicating Sequential Processes (Reprint). 100-106
Volume 26, Number 2, February 1983
- Ahmed S. Zaki:
Regulation of Electronic Funds Transfer: Impact and Legal Issues. 112-118 - Gordon Bell:
The Computer Museum Member's First Field Trip: The Northbay AN/FSQ7 Sage Site. 118-119
- William Kent:
A Simple Guide to Five Normal Forms in Relational Database Theory. 120-125 - R. Charles Bell:
Monte Carlo Debugging: A Brief Tutorial. 126-127
- Iris Vessey, Ron Weber:
Some Factors Affecting Program Repair Maintenance: An Empirical Study. 128-134 - B. Srinivasan:
On the Synthesis of Decision Tables. 135-136 - Michael J. Mathey, Bernard M. E. Moret:
The Computational Metaphor and Quantum Physics. 137-145
Volume 26, Number 3, March 1983
- Margrethe H. Olson:
Remote Office Work: Changing Work Patterns in Space and Time. 182-187
- Michael A. Pechura:
Comparing Two Microcomputer Operating Systems: CP/M and HDOS. 188-195
- A. Chesnais, Erol Gelenbe, Isi Mitrani:
On the Modeling of Parallel Access to Shared Data. 196-202 - Simon S. Lam, Luke Yeong-Chang Lien:
A Tree Convolution Algorithm for the Solution of Queueing Networks. 203-215 - Hitohisa Asai, C. K. Cheng:
Speeding Up an Overrelaxation Method of Division in Radix-2^n Machine. 216-220
Volume 26, Number 4, April 1983
- P. J. Brown:
Error Messages: The Neglected Area of the Man/Machine Interface? 246-249 - Dalia Motzkin:
Meansort. 250-251
- Michael L. Schneider, John C. Thomas:
Introduction: The Humanization of Computer Interfaces. 252-253 - Donald A. Norman:
Design Rules Based on Analyses of Human Error. 254-258 - Robert J. K. Jacob:
Using Formal Specifications in the Design of a Human-Computer Interface. 259-264 - Teresa L. Roberts, Thomas P. Moran:
The Evaluation of Text Editors: Methodology and Empirical Results. 265-283 - Steven L. Sauter, Mark S. Gottlieb, Karen C. Jones, Vernon N. Dodson, Kathryn M. Rohrer:
Job and Health Implications of VDT Use: Initial results of the Wisconsin-NIOSH Study. 284-294 - John D. Gould, John Conti, Todd Hovanyecz:
Composing Letters with a Simulated Listening Typewriter. 295-308
Volume 26, Number 5, May 1983
- T. R. Girill, Clement H. Luk:
Document: An Interactive, Online Solution to Four Documentation Problems. 328-337
- Michael J. Ginzberg:
Introduction: Three Papers from the Third International Conference on Information Systems. 339 - Tarek K. Abdel-Hamid, Stuart E. Madnick:
The Dynamics of Software Project Scheduling. 340-346 - R. E. A. Mason, Tom T. Carey:
Prototyping Interactive Information Systems. 347-354 - H. J. Will:
ACL: A Language Specific for Auditors. 356-361
- Richard N. Taylor:
A General-Purpose Algorithm for Analyzing Concurrent Programs. 362-376 - John Konvalina, Stanley A. Wileman, Larry J. Stephens:
Math Proficiency: A Key to Success for Computer Science Students. 377-382
Volume 26, Number 6, June 1983
- Stephen A. Cook:
An Overview of Computational Complexity. 400-408
- Jonathan Jacky, Ira Kalet:
A General Purpose Data Entry Program. 409-417 - Robert W. Bemer:
Coordinated Text and Transparencies. 418
- Henry Lieberman, Carl Hewitt:
A Real-Time Garbage Collector Based on the Lifetimes of Objects. 419-429 - M. Lynne Markus:
Power, Politics, and MIS Implementation. 430-444 - H. Rudy Ramsey, Michael E. Atwood, James R. Van Doren:
Flowcharts Versus Program Design Languages: An Experimental Comparison. 445-449
Volume 26, Number 7, July 1983
- David P. Gardner, Yvonne W. Larsen:
A Nation At Risk: The Imperative for Educational Reform, Report by The National Commission on Excellence in Education. Commun. ACM 26(7): 467-478 (1983) - Eric A. Weiss:
Self-Assessment Procedure XI: A Self-Assessment Procedure Dealing with One Part of Early Computing History. 479-482
- D. Verne Morland:
Human Factors Guidlines for Terminal Interface Design. 484-494
- Thomas K. Landauer, Kathleen M. Galotti, S. Hartwell:
Natural Command Names and Initial Learning: A Study of Text-Editing Terms. 495-503 - Mann-May Yau, Sargur N. Srihari:
A Hierarchical Data Structure for Multidimensional Digital Images. 504-515 - Masanori Fushimi, Shu Tezuka:
The k-Distribution of Generalized Feedback Shift Register Pseudorandom Numbers. 516-523 - Mark J. Cloutier, Matthew J. Friedman:
Precision Averaging for Real-Time Analysis. 525-529
Volume 26, Number 8, August 1983
- Jon Louis Bentley:
Cracking the Oyster. 549-552
- William E. Burr:
An Overview of the Proposed American National Standard for Local Distributed Data Interfaces. 554-561
- James V. Hansen:
Audit Considerations in Distributed Processing Systems. 562-569 - James K. Mullin:
A Second Look at Bloom Filters. 570-571
- David Lorge Parnas:
A Generalized Control Structure and Its Formal Definition. 572-581 - Frank Milne, Ron Weber:
The Economics of Designing Generalized Software. 582-589 - Stephen C. Hora:
Estimation of the Inverse Function for Randim Variate Generation. 590-594 - Jürgen Peemöller:
A Correction to Brelaz's Modification of Brown's Coloring Algorithm. 595-597
Volume 26, Number 9, September 1983
- Jon Louis Bentley:
Aha! Algorithms. 623-628
- Pamela McCorduck:
Introduction to the Fifth Generation. 629-630 - Paul S. Licker:
The Japanese Approach: A Better Way to Manage Programmers? 631-636 - Ehud Y. Shapiro:
The Fifth Generation Project - Trip Report. 637-641 - Rosalie Steier:
Cooperation is the Key: An Interview with B. R. Inman. 642-645
- Tan Watanabe, Tsuneharu Ohsawa, Takaji Suzuki:
A Simple Database Language for Personal Computers. 646-653 - Andrew S. Tanenbaum, Hans van Staveren, E. G. Keizer, Johan W. Stevenson:
A Practicel Tool Kit for Making Portable Compilers. 654-660
- Jeffrey L. Eppinger:
An Empirical Study of Insertion an Deletion in Binary Search Trees. 663-669 - Ronald Prescott Loui:
Optimal Paths in Graphs with Stochastic or Multidimensional Weights. 670-676
- Piraye Bayman, Richard E. Mayer:
A Diagnosis of Beginning Programmers' Misconceptions of BASIC Programming Statements. 677-679 - Hanan Samet:
A Quadtree Medial Axis Transform. 680-693
Volume 26, Number 10, October 1983
- Jon Louis Bentley:
Data Structures Programs. 726-730
- Gerardine DeSanctis, James F. Courtney:
Toward Friendly User MIS Implementation. 732-738 - Tor Guimaraes:
Managing Application Program Maintenance Expenditures. 739-746 - Douglas Comer:
The Computer Science Research Network CSNET: A History and Status Report. 747-753
- Michael A. Pechura, James D. Schoeffler:
Estimating File Access Time of Floppy Disks. 754-763 - Ivor Durham, David Alex Lamb, James B. Saxe:
Spelling Correction in User Interfaces. 764-773
- Gordon B. Davis, M. H. Schwartz:
Introduction to the Special Section on Information Systems Management. 775 - John F. Rockart, Lauren S. Flannery:
The Management of End User Computing. 776-784 - Blake Ives, Margrethe H. Olson, Jack J. Baroudi:
The Measurement of User Information Satisfaction. 785-793 - Beverly K. Kahn:
Some Realities of Data Administration. 794-799 - John M. Ivancevich, H. Albert Napier, James C. Wetherbe:
Occupational Stress, Attidudes, and Health Problems in the Information Systems Professionals. 800-806 - Kathryn M. Bartol:
Turnover Among DP Personnel: A Causal Analysis. 807-811
Volume 26, Number 11, November 1983
- James F. Allen:
Maintaining Knowledge about Temporal Intervals. 832-843 - Wolfgang Bibel:
Matings in Matrices. 844-852 - Elliot Soloway, Jeffrey Bonar, Kate Ehrlich:
Cognitive Strategies and Looping Constructs: An Empirical Study. 853-860 - Richard J. Miara, Joyce A. Musselman, Juan A. Navarro, Ben Shneiderman:
Program Indentation and Comprehensibility. 861-867 - You-Dong Liang, Brian A. Barsky:
An Analysis and Algorithm for Polygon Clipping. 868-877 - J. T. Postmus, A. H. G. Rinnooy Kan, G. T. Timmer:
An Efficient Dynamic Selection Method. 878-881 - Russell J. Abbott:
Program design by Informal English Descriptions. 882-894 - Joep L. W. Kessels:
On-the-Fly Optimization of Data Structures. 895-901 - David S. Wile:
Program Developments: Formal Explanations of Implementations. 902-911 - Gaston H. Gonnet, Frank Wm. Tompa:
A Constructive Approach to the Design of Algorithms and Their Data Structures. 912-920 - James F. Korsh, Gary Laison:
A Multiple-Stack Manipulation Procedure. 921-923 - R. Charles Bell, Bryan Floyd:
A Monte Carlo Study of Cichelli Hash-Function Solvability. 924-925 - Jack P. C. Kleijnen, Anton J. Van Reeken:
Principles of Computer Charging in a University-Type Organization. 926-932 - Antoni Olivé:
Information Derivability Analysis In Logical Information Systems. 933-938 - Kyu-Young Whang, Gio Wiederhold, Daniel Sagalowicz:
Estimating Block Accesses in Database Organizations: A Closed Noniterative Formula. 940-944 - W. S. Luk:
On Estimating Block Accesses in Database Organizations. 945-947 - Nicholas P. Vitalari, Gary W. Dickson:
Problem Solving for Effective Systems Analysis: An Experimental Exploration. 948-956 - Lee Schruben:
Simulation Modeling with Event Graphs. 957-963 - George S. Fishman, Baosheng D. Huang:
Antithetic Variates Revisited. 964-971 - Raymond E. Barber, Henry C. Lucas Jr.:
System Response Time, Operator Productivity, and Job Satisfaction. 972-986 - Ron Dagwell, Ron Weber:
System Designers' User Models: A Comparative Study and Methodological Critique. 987-997 - Gabriel M. Silberman:
Stack Processing Techniques in Delayed-Staging Storage Hierarchies. 999-1007 - W. P. Petersen:
Vector Fortran for Numerical Problems on GRAY-1. 1008-1021 - Gerard Salton, Edward A. Fox, Harry Wu:
Extended Boolean Information Retrieval. 1022-1036
Volume 26, Number 12, December 1983
- Jon Louis Bentley:
Writing Correct Programs. 1040-1045
- Stephen S. Yau, Robert W. Ritchie, Warren L. Semon, Joseph F. Traub, Andries van Dam, Stanley Winkler:
Meeting the Crisis in Computer Science. 1046-1050 - Perry R. Morrison:
A Survey of Attitudes Toward Computers. 1051-1057 - Marc Eisenstadt:
A User-Friendly Software Environment for the Novice Programmer. 1058-1064
- Paul J. Jalics, Thomas S. Heines:
Transporting a Portable Operating System: UNIX to an IBM Minicomputer. 1066-1072
- Gaston H. Gonnet:
Balancing Binary Trees by Internal Path Reduction. 1074-1081 - Seiichi Nishihara, Katsuo Ikeda:
Reducing the Retrieval Time of Hashing Method by Using Predictors. 1082-1088
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.