default search action
Communications of the ACM (CACM), Volume 27, 1984
Volume 27, Number 1, January 1984
- Gerald M. Berns:
Assessing Software Maintainability. 14-23 - John W. Geils:
Why Students Reject Engineering Teching Careers. 25-27 - Robert I. Winner, Edward M. Carter:
Self-Assessment Procedure XII: A Self-Assessment Procedure Dealing with Computer Architecture. 29-36
- Peter J. L. Wallis, Brian A. Wichmann:
Requirements Analysis for Ada Compilers. 37-41 - Victor R. Basili, Barry T. Perricone:
Software Errors and Complexity: An Empirical Investigation. 42-52
- Paul Pritchard:
Some Negative Results Concerning Prime Number Generators. 53-57 - Henry C. Lucas Jr.:
Organizational Power and the Information Services Department. 58-65
Volume 27, Number 2, February 1984
- Jon Louis Bentley:
Code Tuning. Commun. ACM 27(2): 91-96 (1984)
- Brian A. Wichmann:
Is Ada Too Big? A designer Answers the Critics. 98-103 - Pamela Zave:
The Operational versus the Conventional Approach to Software Development. 104-118
- Gordon E. Anderson:
The Coordinated Use of Five Performance Evaluation Methodologies. 119-125 - Raymond C. Houghton Jr.:
Online Help Systems: A Conspectus. 126-133
- Eric C. R. Hehner:
Predicative Programming, Part I. 134-143 - Eric C. R. Hehner:
Predicative Programming, Part II. 144-151 - Nicola Santoro:
Chain Multiplication of Matrices of Approximately or Exactly the Same Size. 152-156
Volume 27, Number 3, March 1984
- Jon Louis Bentley:
The Back of the Envelope. 180-184
- Gene Dallaire, Fortney H. Stark, Hal Berghel:
Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools? 185-194 - Jean B. Rogers, David G. Moursund, Gerald L. Engel:
Preparing Precollege Teachers for the Computer Age. 195-200 - Robert W. Blanning:
Conversing with Management Information Systems in Natural Language. 201-207 - Thomas A. D'Auria:
ACM's Visit to The People's Republic of China. 208-214
- Paul J. Jalics:
COBOL vs. PL/1: Some Performance Comparisons. 216-221 - Gerald P. Bozman:
The Software Lookaside Buffer Reduces Search Overhead with Linked Lists. 222-227
- Dov Dori, Moshe Ben-Bassat:
Efficient Nesting of Congruent Convex Figures. 228-235 - T. Y. Zhang, Ching Y. Suen:
A Fast Parallel Algorithm for Thinning Digital Patterns. 236-239 - George Diehr, Bruce Faaland:
Optimal Pagination of B-Trees with Variable-Length Items. 241-247 - Markku Tamminen:
Comment on Quad- and Octtrees. 248-249
Volume 27, Number 4, April 1984
- Jon Louis Bentley:
How to Sort. Commun. ACM 27(4): 287-291 (1984)
- Gene Dallaire:
American Universities Need Greater Access to Supercomputers. 293-298 - Edward F. Hayes:
Access to Supercomputers: An NSF Perspective (Interview). 299-303 - Lotfi A. Zadeh:
Coping with the Imprecision of the Real World (Interview). 304-311 - Peter J. Denning, Donn B. Parker, Susan H. Nycum, Willis H. Ware:
Computers, Crime and Privacy - A National Dilema, Congressional Testimony from the Industry. 312-321 - Allen B. Tucker:
A Perspective on Machine Translation: Theory and Practice. 322-329 - Michael C. Mulder, John F. Dalphin:
Computer Science Program Requirements and Accreditation, An Interim Report of the ACM/IEEE Computer Society Joint Task Force. 330-335 - Jean E. Sammet, Bernard Rous:
Progress Report on the ACM Guide to Computing Literature. 336-341
- Peter G. Neumann:
A Further View of the First Quarter Century, Introduction to the April 1984 Special Section. 343 - Donald E. Knuth:
The Complexity of Songs (April 1984 Special Section). 344-348 - R. Lawrence Clark:
A Linuistic Contribution to Goto-Less Programming (April 1984 Special Section). 349-350 - Preet J. Nedginn, Trebor L. Bworn:
CLOG: An Ada Package for Automatic Footnote Generation in UNIX (April 1984 Special Section). 351 - P. J. Brown:
Languages: Three Interviews (April 1984 Special Section). 352-355 - J. B. Cadwallader-Cohen, W. W. Zysic, R. B. Donnelly:
The Chaostron: An Important Advance in Learning Machines (April 1984 Special Section). 356-357
- Joseph J. Pollock, Antonio Zamora:
Automatic Spelling Correction in Scientific and Scholary Text. 358-368 - David C. Blair:
The Data-Document Distinction in Information Retrieval. 369-374
- Izak Benbasat, Yair Wand:
Command Abbreviation Behavior in Human-Computer Interaction. 376-383 - C. C. Chang:
The Study of an Ordered Minimal Perfect Hashing Scheme. 384-387 - Dorothy E. Denning:
Digital Signatures with RSA and Other Public-Key Cryptosystems. 388-392 - Ronald L. Rivest, Adi Shamir:
How to Expose an Eavesdropper. 393-395
Volume 27, Number 5, May 1984
- Jon Louis Bentley:
Squeezing Space. Commun. ACM 27(5): 416-421 (1984)
- Robert L. Graham:
The Legal Protection of Computer Software. 422-426 - Richard V. Giddings:
Accommodating Uncertainty in Software Design. 428-434 - Gopal K. Gupta:
Self-Assessment Procedure XIII: A Self-Assessment Procedure Dealing with Binary Trees and B-Trees. 435-443
- Ben Tsutom Wada:
A Virtual Memory System for Picture Processing. 444-454 - Gerard D. Finn:
An Algorithm for Optimized Boolean Evaluation in Information Management Systems. 455-464
- John Leslie King, Kenneth L. Kraemer:
Evolution and Organizational Information Systems: An Assessment of Nolan's Stage Model. 466-475 - Izak Benbasat, Albert S. Dexter, Donald H. Drury, Robert C. Goldstein:
A Critique of the Stage Hypothesis: Theory and Empirical Evidence. 476-485 - Richard A. Becker, John M. Chambers:
Design of the S System for Data Analysis. 486-495
Volume 27, Number 6, June 1984
- Jon Louis Bentley:
Graphic Output. 529-536
- Gene Dallaire, John Shattuck, Richard P. Kusserow:
Computer Matching: Should It Be Banned? 537-545 - Larry Fujitani:
Laser Optical Disk: The Coming Revolution in On-Line Storage. 546-554
- Maryam Alavi:
An Assessment of the Prototyping Approach to Information Systems Development. 556-563 - Anthony I. Hinxman:
Updating a Database in an Unsafe Environment. 564-566 - Ephraim P. Glinert, Richard E. Ladner:
A Large Font Virtual Terminal Interface, A Software Prothesis for Visually Impaired. 567-572
- Robert Wilensky, Yigal Arens, David N. Chin:
Talking to UNIX in English: An Overview of UC. 574-593 - Ten-Hwang Lai, Sartaj Sahni:
Anomalies in Parallel Branch-and-Bound Algorithms. 594-602
Volume 27, Number 7, July 1984
- Jon Louis Bentley:
Updates. Commun. ACM 27(7): 630-636 (1984)
- Rosalie Steier:
An MCC Update. 636-637 - Andries van Dam:
Computer Graphics Comes of Age (Interview). 638-648 - David K. Gifford, Alfred Z. Spector:
The TWA Reservation System. 649-665
- Per-Åke Larson, Ajay Kajla:
File Organization: Implementation of a Method Guaranteeing Retrieval in One Access. 670-677 - John Kaunitz, Louis van Ekert:
Audit Trail Compaction for Database Recovery. 678-683
- Robert B. Tilove:
A Null-Object Detection Algorithm for Constructive Solid Geometry. 684-694 - Hsi Chang, S. Sitharama Iyengar:
Efficient Algorithms to Globally Balance a Binary Search Tree. 695-702 - Jeffrey Scott Vitter:
Faster Methods for Random Sampling. 703-718
Volume 27, Number 8, August 1984
- Yair M. Babad, Jeffrey A. Hoffer:
Even no Data has a Value. 748-756
- Dennis Ritchie:
Reflections on Software Research. 758-760 - Ken Thompson:
Reflections on Trusting Trust. 761-763
- Nazim H. Madhavji:
Visibility Aspects of Programmed Dyamic Data Structures. 764-776 - James A. Haskett:
Pass-Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms. 777-781 - Douglas W. Jones:
Improved Interpretation of UNIX-Like File Names Embedded in Data. 782-784 - Harry M. Markowitz, Ashok Malhotra, Donald P. Pazel:
The EAS-E Application Development System: Principles and Language Summary. 785-799
- John M. Carroll, Caroline Carrithers:
Training Wheels in a User Interface. 800-806 - D. R. K. Brownrigg:
The Weighted Median Filter. 807-818 - D. Julian M. Davies:
Memory Occupancy Patterns in Garbage Collection Systems. 819-825 - Lee L. Gremillion:
Determinants of Program Repair Maintenance Requirements. 826-832
Volume 27, Number 9, September 1984
- Jon Louis Bentley:
Algorithm Design Techniques. Commun. ACM 27(9): 865-871 (1984)
- David K. Gifford, Alfred Z. Spector:
The Space Shuttle Primary Computer System. 872-900
- Edward Ng, Paul B. Schneck:
Introduction to the Special Section on Computing in Space. Commun. ACM 27(9): 901 (1984) - Charles E. Trevathan, Thomas D. Taylor, Raymond G. Hartenstein, Ann. C. Merwarth, William N. Stewart:
Development and Application of NASA's First Standard Spacecraft Computer. 902-913 - William A. Madden, Kyle Y. Rone:
Design, Development, Integration: Space Shuttle Primary Flight Software System. 914-925 - Gene D. Carlow:
Architecture of the Space Shuttle Primary Avionics Software System. 926-936
- Hassan Gomaa:
A Software Design Method for Real-Time Systems. 938-949
- Tim Maude, Derwent Maude:
Hardware Protection Against Software Piracy. 950-959
Volume 27, Number 10, October 1984
- Jean Ichbiah:
Ada: Past, Present, Future, An Interview with Jean Ichbiah, the Principle Designer of Ada. 990-997 - Elliot B. Koffman, Philip L. Miller, Caroline E. Wardle:
Recommended Curriculum for CS1, 1984. 998-1001 - Anthony Ralston:
The First Course in Computer Science Needs a Mathematics Corequisite. 1002-1005
- Robert L. Ashenhurst:
A Conference on Information Law and Ethics. 1006-1007
- C. Mani Krishna, Kang G. Shin, Yann-Hang Lee:
Optimization Criteria for Checkpoint Placement. 1008-1012 - Reinhold Weicker:
DHRYSTONE: A Synthetic Systems Programming Benchmark. 1013-1030
- Michael D. Good, John A. Whiteside, Dennis R. Wixon, Sandra J. Jones:
Building a User-Derived Interface. 1032-1043 - Robert Marcus:
An Application of Artificial Intelligence to Operations Research. 1044-1047
Volume 27, Number 11, November 1984
- Jon Louis Bentley:
Perspective on Performance. 1087-1092
- Patricia F. Campbell, George P. McCabe:
Predicting the Success of Freshmen in a Computer Science Major. 1108-1113 - Walter M. Mathews, Kaye Reifers:
The Computer in Cartoons: A Retrospective from the Saturday Review. 1114-1119
- Robert S. Arnold, Norman F. Schneidewind, Nicholas Zvegintzov:
A Software Maintenance Workshop. 1120-1121
- Larry R. Medsker:
An Interactive Decision Support System for Energy Policy Analysis. 1122-1128 - James V. Hansen, William F. Messier:
A Relational Approach to Decision Support for EDP Auditing. 1129-1133
- Leslie G. Valiant:
A Theory of the Learnable. 1134-1142 - Timothy J. Hickey, Jacques Cohen:
Performance Analysis of On-the-Fly Garbage Collection. 1143-1154
Volume 27, Number 12, December 1984
- Jon Louis Bentley:
A Little Program, A Lot of Fun. 1179-1182
- Gordon B. Davis:
Selected Papers from the Fifth International Conference on Information Systems - Introduction. 1183 - Paul Attewell, James Rule:
Computing and Organizations: What We Know and What We Don't Know. 1184-1192 - Blake Ives, Gerard P. Learmonth:
The Information System as a Competitive Weapon. 1193-1201 - Charles R. Franz, Daniel Robey:
An Investigation of User-Led System Design: Rational and Political Perspectives. 1202-1209 - Jon Turner:
Computer Mediated Work: The Interplay Between Technology and Structured Jobs. 1210-1217 - Rob Kling, Suzanne Iacono:
The Control of Information Systems Developments After Implementation. 1218-1226
- John D. Litke:
An Improved Solution to the Traveling Salesman Problem with Thousands of Nodes. 1227-1236 - Richard B. Wilmot:
Foreign Keys Decrease Adaptability of Database Designs. 1237-1243
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.