![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Communications of the ACM (CACM), Volume 29, 1986
Volume 29, Number 1, January 1986
- Kenneth C. Laudon:
Data Quality and Due Process in Large Interorganizational Record Systems. 4-11
- Jason L. Frand, Ephraim R. McLean:
Summary of the Second Annual UCLA Survey of Business School Computer Usage. 12-18
- Jean-Pierre Banâtre, Michel Banâtre, Guy Lapalme, Florimond Ployette:
The Design and Building of Enchère, a Distributed Electronic Marketing System. 19-29 - Mike Heck, Martin Plaehn:
A Workstation Model for an Interactive Graphics System. 30-37
- Gordon B. Davis:
Selected Papers from the Sixth International Conference on Information Systems - Introduction. 39 - Gary W. Dickson, Gerardine DeSanctis, D. J. McBride:
Understanding The Effectiveness of Computer Graphics for Decision Support: A Cumulative Experimental Approach. 40-47 - Iris Vessey, Ron Weber:
Structured Tools and Conditional Logic: An Empirical Investigation. 48-57
Volume 29, Number 2, February 1986
- Jon Louis Bentley:
Cutting the Gordian Knot. 92-96
- Richard M. Karp:
Combinatorics, Complexity, and Randomness. 97-109 - Karen A. Frenkel:
Piecing Together Complexity. 110-111 - Karen A. Frenkel:
Complexity and Parallel Processing: An Interview with Richard Karp. 112-117
- Simon L. Peyton Jones:
Parsing Distfix Operators. 118-122 - Warren Harrison, Curtis R. Cook:
A Note on the Berry-Meekings Style Metric. 123-125 - K. A. Redish, W. F. Smyth:
Program Style Analysis: A Natural By-Product of Program Compilation. 126-133
- D. Yun Yeh, Toshinori Munakata:
Dynamic Initial Allocation and Local Reallocation Procedures for Multiple Stacks. 134-141 - Carol S. Saunders, Richard W. Scamell:
Organizational Power and the Information Services Department: A Reexamination. 142-147
Volume 29, Number 3, March 1986
- James H. Morris, Mahadev Satyanarayanan
, Michael H. Conner, John H. Howard, David S. H. Rosenthal, F. Donelson Smith:
Andrew: A Distributed Personal Computing Environment. 184-201 - Norman E. Gibbs, Allen B. Tucker:
A Model Curriculum for a Liberal Arts Degree in Computer Science. 202-210
- Sumit Sircar, Dinesh Dave:
The Relationship Between Benchmark Tests and Microcomputer Price. 212-217 - Philip J. Fleming, John J. Wallace:
How Not To Lie With Statistics: The Correct Way To Summarize Benchmark Results. 218-221 - Donald G. Golden, Michael A. Pechura:
The Structure of Microcomputer File Systems. 222-230
- Jack J. Baroudi, Margrethe H. Olson, Blake Ives
:
An Empirical Study of the Impact of User Involvement on System Usage and Information Satisfaction. 232-238 - H. E. Lü, Patrick Shen-Pei Wang:
A Comment on "A Fast Parallel Algorithm for Thinning Digital Patterns". 239-242
Volume 29, Number 4, April 1986
- Alfred Z. Spector, David K. Gifford:
A Computer Science Perspective of Bridge Design. 267-283 - Karen A. Frenkel:
Computers, Complexity, and the Statue of Liberty Restoration. 284-296
- John A. N. Lee, Gerald Segal, Rosalie Steier:
Positive Alternatives: A Report on an ACM Panel on Hacking. 297-299
- Douglas W. Jones:
An Empirical Comparison of Priority-Queue and Event-Set Implementations. 300-311 - Larry Koved, Ben Shneiderman:
Embedded Menus: Selecting Items in Context. 312-318
- Jon Louis Bentley, Daniel Dominic Sleator, Robert Endre Tarjan, Victor K. Wei:
A Locally Adaptive Data Compression Scheme. 320-330
Volume 29, Number 5, May 1986
- Jon Louis Bentley:
Literate Programming. Commun. ACM 29(5): 364-369 (1986)
- Marek J. Sergot, Fariba Sadri, Robert A. Kowalski, F. Kriwaczek, Peter Hammond, H. T. Cory:
The British Nationality Act as a Logic Program. 370-386
- John S. Gourlay:
A Language for Music Printing. 388-401 - Valdis Berzins, Michael Gray, J. David Naumann:
Abstraction-Based Software Development. 402-415 - Richard J. Botting:
Novel Security Techniques for On-Line Systems. 416-417
- David S. Scott, S. Sitharama Iyengar
:
TID - A Translation Invariant Data Structure for Storing Images. 418-429
Volume 29, Number 6, June 1986
- Jon Louis Bentley:
A Literate Program. 471-483
- Herbert J. Bernstein:
Special Section on Factory Automation and Robotics. 484-485 - John E. Hopcroft:
The Impact of Robotics on Computer Science. 486-498 - Marc H. Raibert:
Legged Robots. 499-514 - David D. Grossman:
Opportunities for Research on Numerical Control Machining. 515-522
- Stefano Ceri, Georg Gottlob
:
Normalization of Relations and PROLOG. 524-544
- Jack J. Baroudi, Michael J. Ginzberg:
Impact of the Technological Environment on Programmer/Analyst Job Outcomes. 546-555
Volume 29, Number 7, July 1986
- Clark D. Thompson:
Military Direction of Academic CS Research (Viewpoint). 583-585
- Henry F. Ledgard:
Special Section on The Human Aspects of Computing: A Note on This Collection. 593 - Avi Rushinek, Sara F. Rushinek:
What Makes Users Happy? 594-598 - Brian M. Slator, Matthew P. Anderson, Walt Conley:
Pygmalion at the Interface. 599-604 - Richard E. Mayer, Jennifer L. Dyck, William Vilberg:
Learning to Program and Learning to Think: What's the Connection? 605-610 - Geoffry S. Howard, Robert D. Smith:
Computer Anxiety in Management: Myth or Reality? 611-615 - John D. Gannon, Elizabeth E. Katz, Victor R. Basili:
Metrics for Ada Packages: An Initial Study. 616-623 - James C. Spohrer, Elliot Soloway:
Novice Mistakes: Are the Folk Wisdoms Correct? 624-632 - James L. Peterson:
A Note on Undetected Typing Errors. 633-637 - Moira LeMay, Eric Hird:
Operator Work Load: When is Enough Enough? 638-642 - Neal S. Coulter, Norman H. Kelly:
Computer Instruction Set Usage by Programmers: An Empirical Investigation. 643-647
- Gerard Salton:
Another Look at Automatic Text-Retrieval Systems. 648-656 - Hassan Gomaa:
Software Development of Real-Time Systems. 657-668
- Neil Sarnak, Robert Endre Tarjan:
Planar Point Location Using Persistent Search Trees. 669-679
Volume 29, Number 8, August 1986
- Jon Louis Bentley:
Little Languages. 711-721
- Jean E. Sammet:
Why Ada is Not Just Another Programming Language. 722-732 - Edward Lieblein:
The Department of Defense Software Initiative - A Status Report. 734-744 - Martin K. Solomon, Riva Wenig Bickel:
Self-Assessment Procedure XV: A Self-Assessment Procedure Dealing with File Processing. 745-751
- Karen A. Frenkel:
Evaluating Two Massively Parallel Machines. 752-758
- Russell M. Clapp, Louis Duchesneau, Richard A. Volz, Trevor N. Mudge, Timothy Schultze:
Toward Real-Time Performance Benchmarks for Ada. 760-778 - Young Moo Kang, Robert B. Miller, Roger Alan Pick:
Comments on "Grosch's Law Re-Revisited: CPU Power and the Cost of Computation". 779-781 - Jon Louis Bentley, Brian W. Kernighan:
GRAP - A Language for Typesetting Graphs. 782-792
- R. H. Irving, Christopher A. Higgins, Frank R. Safayeni:
Computerized Performance Monitoring Systems: Use and Abuse. 794-801 - Raymond F. Koopman:
The Orders of Equidistribution of Subsequences of Some Asymptotically Random Sequences. 802-806
Volume 29, Number 9, September 1986
- Jon Louis Bentley:
Document Design. 832-839
- Derek H. Sleeman:
Special Section on The Challenges of Teaching Computer Programming. 840-841 - John R. Anderson, Edward Skwarecki:
The Automated Tutoring of Introductory Computer Programming. 842-849 - Elliot Soloway:
Learning to Program = Learning to Construct Mechanisms and Explanations. 850-858 - Andrea A. diSessa, Harold Abelson:
Boxer: A Reconstructible Computational Medium. 859-868
- David Gries
, Raymond E. Miller, Robert W. Ritchie, Paul Young:
Imbalance Between Growth and Funding in Academic Computing Science: Two Trends Colliding. 870-878
- Daniel G. Bobrow, Sanjay Mittal, Mark Stefik:
Expert Systems: Perils and Promise. 880-894 - M. D. Janssens, J. K. Annot, Ad J. van de Goor:
Adapting UNIX for a Multiprocessor Environment. 895-901
- Quentin F. Stout, Bette L. Warren:
Tree Rebalancing in Optimal Time and Space. 902-908
Volume 29, Number 10, October 1986
- John S. Quarterman, Josiah C. Hoskins:
Notable Computer Networks. 932-971
- David Gries
:
The 1984-1985 Taulbee Survey. 972-977
- Niklaus Wirth:
Microprocessor Architectures: A Comparison Based on Code Generation by Compiler. 978-990 - Manny Hayes:
Accessing Bit Fields in FORTRAN-77. 991-995
- M. D. Atkinson, Jörg-Rüdiger Sack, Nicola Santoro
, Thomas Strothotte:
Min-Max Heaps and Generalized Priority Queues. 996-1000
Volume 29, Number 11, November 1986
- William K. McHenry, Seymour E. Goodman:
MIS in Soviet Industrial Enterprise: The Limits of Reform from Above. 1034-1043 - Joseph K. Kearney, Robert L. Sedlmeyer, William B. Thompson, Michael A. Gray, Michael A. Adler:
Software Complexity Measurement. 1044-1050
- Glen G. Langdon Jr.:
Self-Assessment Procedure XVI: A Self-Assessment Procedure Dealing with Computer Organization and Logic Design. 1051-1060 - Dorothy Deringer, David H. Brandin, Dexter Fletcher, Neil Jacobstein:
The Report of the ACM Longe-Range Planning Committee: A Summary. 1061-1071
- Pierre N. Robillard:
Schematic Pseudocode for Program Constructs and Its Computer Automation by SCHEMACODE. 1072-1089 - Frank G. Landram, James R. Cook, Marvin Johnston:
Spreadsheet Calculations of Probabilities from the F, t, Chi² , and Normal Distribution. 1090-1092
- Izak Benbasat, Albert S. Dexter, Peter A. Todd:
An Experimental Program Investigating Color-Enhanced and Graphical Information Presentation: An Integration of the Findings. 1094-1105
Volume 29, Number 12, December 1986
- Jon Louis Bentley:
Birth of a Cruncher. 1155-1161
- Karen A. Frenkel:
Introduction to the Special Issue on Parallelism. 1168-1169 - W. Daniel Hillis, Guy L. Steele Jr.:
Data Parallel Algorithms. 1170-1183 - David A. Padua, Michael Wolfe:
Advanced Compiler Optimizations for Supercomputers. 1184-1201 - Randall Rettberg, Robert Thomas:
Contention is no Obstacle to Shared-Memory Multiprocessing. 1202-1212 - Craig Stanfill, David L. Waltz:
Toward Memory-Based Reasoning. 1213-1228 - Craig Stanfill, Brewster Kahle:
Parallel Free-Text Search on the Connection Machine System. 1229-1239
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.