


default search action
Communications of the ACM (CACM), Volume 26, 1983
Volume 26, Number 1, January 1983
- Klaus Samelson, Friedrich L. Bauer:

Sequential Formula Translation (Reprint). 9-13 - Edgar T. Irons:

A Syntax Directed Compiler for ALGOL 60 (Reprint). 14-16 - Edward H. Sussenguth Jr.:

Use of Tree Structures for Processing Files (Reprint). 17-20 - Edsger W. Dijkstra:

Solutions of a Problem in Concurrent Programming Control (Reprint). 21-22 - Joseph Weizenbaum:

ELIZA - A Computer Program For the Study of Natural Language Communication Between Man And Machine (Reprint). 23-28 - Jack B. Dennis, Earl C. Van Horn:

Programming Semantics for Multiprogrammed Computations (Reprint). 29 - W. Douglas Maurer:

An Improved Hash Code for Scatter Storage (Reprint). 36-38 - Robert H. Morris Sr.

:
Scatter Storage Techniques (Reprint). 39-42 - Peter J. Denning:

The Working Set Model for Program Behaviour (Reprint). 43-48 - Edsger W. Dijkstra:

The Structure of "THE"-Multiprogramming System (Reprint). 49-52 - C. A. R. Hoare:

An Axiomatic Basis for Computer Programming (Reprint). 53-56 - Jay Earley:

An Efficient Context-Free Parsing Algorithm (Reprint). 57-61 - James R. Bell:

The Quadratic Quotient Method: a Hash Code Eliminating Secondary Clustering (Reprint). 62-63 - E. F. Codd:

A Relational Model of Data for Large Shared Data Banks (Reprint). 64-69 - Niklaus Wirth:

Program Development by Stepwise Refinement (Reprint). 70-74 - David Lorge Parnas:

A Technique for Software Module Specification with Examples (Reprint). 75-78 - Hirondo Kuki, William J. Cody:

A Statistical Study of the Accuracy of Floating Point Number Systems (Reprint). 79-83 - Dennis Ritchie, Ken Thompson:

The UNIX Time-Sharing System (Reprint). 84-89 - Robert Metcalfe, David R. Boggs:

Ethernet: Distributed Packet Switching for Local Computer Networks (Reprint). 90-95 - Ronald L. Rivest, Adi Shamir, Leonard M. Adleman:

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). 96-99 - C. A. R. Hoare:

Communicating Sequential Processes (Reprint). 100-106
Volume 26, Number 2, February 1983
- Ahmed S. Zaki:

Regulation of Electronic Funds Transfer: Impact and Legal Issues. 112-118 - Gordon Bell:

The Computer Museum Member's First Field Trip: The Northbay AN/FSQ7 Sage Site. 118-119
- William Kent:

A Simple Guide to Five Normal Forms in Relational Database Theory. 120-125 - R. Charles Bell:

Monte Carlo Debugging: A Brief Tutorial. 126-127
- Iris Vessey, Ron Weber:

Some Factors Affecting Program Repair Maintenance: An Empirical Study. 128-134 - B. Srinivasan:

On the Synthesis of Decision Tables. 135-136 - Michael J. Mathey, Bernard M. E. Moret

:
The Computational Metaphor and Quantum Physics. 137-145
Volume 26, Number 3, March 1983
- Margrethe H. Olson:

Remote Office Work: Changing Work Patterns in Space and Time. 182-187
- Michael A. Pechura:

Comparing Two Microcomputer Operating Systems: CP/M and HDOS. 188-195
- A. Chesnais, Erol Gelenbe

, Isi Mitrani:
On the Modeling of Parallel Access to Shared Data. 196-202 - Simon S. Lam, Luke Yeong-Chang Lien:

A Tree Convolution Algorithm for the Solution of Queueing Networks. 203-215 - Hitohisa Asai, C. K. Cheng:

Speeding Up an Overrelaxation Method of Division in Radix-2^n Machine. 216-220
Volume 26, Number 4, April 1983
- P. J. Brown:

Error Messages: The Neglected Area of the Man/Machine Interface? 246-249 - Dalia Motzkin:

Meansort. 250-251
- Michael L. Schneider, John C. Thomas:

Introduction: The Humanization of Computer Interfaces. 252-253 - Donald A. Norman:

Design Rules Based on Analyses of Human Error. 254-258 - Robert J. K. Jacob:

Using Formal Specifications in the Design of a Human-Computer Interface. 259-264 - Teresa L. Roberts, Thomas P. Moran:

The Evaluation of Text Editors: Methodology and Empirical Results. 265-283 - Steven L. Sauter, Mark S. Gottlieb, Karen C. Jones, Vernon N. Dodson, Kathryn M. Rohrer:

Job and Health Implications of VDT Use: Initial results of the Wisconsin-NIOSH Study. 284-294 - John D. Gould, John Conti, Todd Hovanyecz:

Composing Letters with a Simulated Listening Typewriter. 295-308
Volume 26, Number 5, May 1983
- T. R. Girill, Clement H. Luk:

Document: An Interactive, Online Solution to Four Documentation Problems. 328-337
- Michael J. Ginzberg:

Introduction: Three Papers from the Third International Conference on Information Systems. 339 - Tarek K. Abdel-Hamid, Stuart E. Madnick:

The Dynamics of Software Project Scheduling. 340-346 - R. E. A. Mason, Tom T. Carey:

Prototyping Interactive Information Systems. 347-354 - H. J. Will:

ACL: A Language Specific for Auditors. 356-361
- Richard N. Taylor:

A General-Purpose Algorithm for Analyzing Concurrent Programs. 362-376 - John Konvalina, Stanley A. Wileman, Larry J. Stephens:

Math Proficiency: A Key to Success for Computer Science Students. 377-382
Volume 26, Number 6, June 1983
- Stephen A. Cook:

An Overview of Computational Complexity. 400-408
- Jonathan Jacky, Ira Kalet:

A General Purpose Data Entry Program. 409-417 - Robert W. Bemer:

Coordinated Text and Transparencies. 418
- Henry Lieberman, Carl Hewitt:

A Real-Time Garbage Collector Based on the Lifetimes of Objects. 419-429 - M. Lynne Markus:

Power, Politics, and MIS Implementation. 430-444 - H. Rudy Ramsey, Michael E. Atwood, James R. Van Doren:

Flowcharts Versus Program Design Languages: An Experimental Comparison. 445-449
Volume 26, Number 7, July 1983
- David P. Gardner, Yvonne W. Larsen:

A Nation At Risk: The Imperative for Educational Reform, Report by The National Commission on Excellence in Education. Commun. ACM 26(7): 467-478 (1983) - Eric A. Weiss:

Self-Assessment Procedure XI: A Self-Assessment Procedure Dealing with One Part of Early Computing History. 479-482
- D. Verne Morland:

Human Factors Guidlines for Terminal Interface Design. 484-494
- Thomas K. Landauer, Kathleen M. Galotti, S. Hartwell:

Natural Command Names and Initial Learning: A Study of Text-Editing Terms. 495-503 - Mann-May Yau, Sargur N. Srihari:

A Hierarchical Data Structure for Multidimensional Digital Images. 504-515 - Masanori Fushimi, Shu Tezuka:

The k-Distribution of Generalized Feedback Shift Register Pseudorandom Numbers. 516-523 - Mark J. Cloutier, Matthew J. Friedman:

Precision Averaging for Real-Time Analysis. 525-529
Volume 26, Number 8, August 1983
- Jon Louis Bentley:

Cracking the Oyster. 549-552
- William E. Burr:

An Overview of the Proposed American National Standard for Local Distributed Data Interfaces. 554-561
- James V. Hansen:

Audit Considerations in Distributed Processing Systems. 562-569 - James K. Mullin:

A Second Look at Bloom Filters. 570-571
- David Lorge Parnas:

A Generalized Control Structure and Its Formal Definition. 572-581 - Frank Milne, Ron Weber:

The Economics of Designing Generalized Software. 582-589 - Stephen C. Hora:

Estimation of the Inverse Function for Randim Variate Generation. 590-594 - Jürgen Peemöller:

A Correction to Brelaz's Modification of Brown's Coloring Algorithm. 595-597
Volume 26, Number 9, September 1983
- Jon Louis Bentley:

Aha! Algorithms. 623-628
- Pamela McCorduck:

Introduction to the Fifth Generation. 629-630 - Paul S. Licker:

The Japanese Approach: A Better Way to Manage Programmers? 631-636 - Ehud Y. Shapiro:

The Fifth Generation Project - Trip Report. 637-641 - Rosalie Steier:

Cooperation is the Key: An Interview with B. R. Inman. 642-645
- Tan Watanabe, Tsuneharu Ohsawa, Takaji Suzuki:

A Simple Database Language for Personal Computers. 646-653 - Andrew S. Tanenbaum, Hans van Staveren, E. G. Keizer

, Johan W. Stevenson:
A Practicel Tool Kit for Making Portable Compilers. 654-660
- Jeffrey L. Eppinger:

An Empirical Study of Insertion an Deletion in Binary Search Trees. 663-669 - Ronald Prescott Loui:

Optimal Paths in Graphs with Stochastic or Multidimensional Weights. 670-676
- Piraye Bayman, Richard E. Mayer:

A Diagnosis of Beginning Programmers' Misconceptions of BASIC Programming Statements. 677-679 - Hanan Samet:

A Quadtree Medial Axis Transform. 680-693
Volume 26, Number 10, October 1983
- Jon Louis Bentley:

Data Structures Programs. 726-730
- Gerardine DeSanctis, James F. Courtney:

Toward Friendly User MIS Implementation. 732-738 - Tor Guimaraes:

Managing Application Program Maintenance Expenditures. 739-746 - Douglas Comer:

The Computer Science Research Network CSNET: A History and Status Report. 747-753
- Michael A. Pechura, James D. Schoeffler:

Estimating File Access Time of Floppy Disks. 754-763 - Ivor Durham, David Alex Lamb, James B. Saxe:

Spelling Correction in User Interfaces. 764-773
- Gordon B. Davis, M. H. Schwartz:

Introduction to the Special Section on Information Systems Management. 775 - John F. Rockart, Lauren S. Flannery:

The Management of End User Computing. 776-784 - Blake Ives

, Margrethe H. Olson, Jack J. Baroudi:
The Measurement of User Information Satisfaction. 785-793 - Beverly K. Kahn:

Some Realities of Data Administration. 794-799 - John M. Ivancevich, H. Albert Napier, James C. Wetherbe:

Occupational Stress, Attidudes, and Health Problems in the Information Systems Professionals. 800-806 - Kathryn M. Bartol:

Turnover Among DP Personnel: A Causal Analysis. 807-811
Volume 26, Number 11, November 1983
- James F. Allen:

Maintaining Knowledge about Temporal Intervals. 832-843 - Wolfgang Bibel:

Matings in Matrices. 844-852 - Elliot Soloway, Jeffrey Bonar, Kate Ehrlich:

Cognitive Strategies and Looping Constructs: An Empirical Study. 853-860 - Richard J. Miara, Joyce A. Musselman, Juan A. Navarro, Ben Shneiderman:

Program Indentation and Comprehensibility. 861-867 - You-Dong Liang, Brian A. Barsky:

An Analysis and Algorithm for Polygon Clipping. 868-877 - J. T. Postmus, A. H. G. Rinnooy Kan, G. T. Timmer:

An Efficient Dynamic Selection Method. 878-881 - Russell J. Abbott:

Program design by Informal English Descriptions. 882-894 - Joep L. W. Kessels:

On-the-Fly Optimization of Data Structures. 895-901 - David S. Wile:

Program Developments: Formal Explanations of Implementations. 902-911 - Gaston H. Gonnet, Frank Wm. Tompa

:
A Constructive Approach to the Design of Algorithms and Their Data Structures. 912-920 - James F. Korsh, Gary Laison:

A Multiple-Stack Manipulation Procedure. 921-923 - R. Charles Bell, Bryan Floyd:

A Monte Carlo Study of Cichelli Hash-Function Solvability. 924-925 - Jack P. C. Kleijnen, Anton J. Van Reeken:

Principles of Computer Charging in a University-Type Organization. 926-932 - Antoni Olivé:

Information Derivability Analysis In Logical Information Systems. 933-938 - Kyu-Young Whang, Gio Wiederhold, Daniel Sagalowicz:

Estimating Block Accesses in Database Organizations: A Closed Noniterative Formula. 940-944 - W. S. Luk:

On Estimating Block Accesses in Database Organizations. 945-947 - Nicholas P. Vitalari, Gary W. Dickson:

Problem Solving for Effective Systems Analysis: An Experimental Exploration. 948-956 - Lee Schruben:

Simulation Modeling with Event Graphs. 957-963 - George S. Fishman, Baosheng D. Huang:

Antithetic Variates Revisited. 964-971 - Raymond E. Barber, Henry C. Lucas Jr.:

System Response Time, Operator Productivity, and Job Satisfaction. 972-986 - Ron Dagwell, Ron Weber:

System Designers' User Models: A Comparative Study and Methodological Critique. 987-997 - Gabriel M. Silberman:

Stack Processing Techniques in Delayed-Staging Storage Hierarchies. 999-1007 - W. P. Petersen:

Vector Fortran for Numerical Problems on GRAY-1. 1008-1021 - Gerard Salton, Edward A. Fox

, Harry Wu:
Extended Boolean Information Retrieval. 1022-1036
Volume 26, Number 12, December 1983
- Jon Louis Bentley:

Writing Correct Programs. 1040-1045
- Stephen S. Yau, Robert W. Ritchie, Warren L. Semon, Joseph F. Traub, Andries van Dam, Stanley Winkler:

Meeting the Crisis in Computer Science. 1046-1050 - Perry R. Morrison:

A Survey of Attitudes Toward Computers. 1051-1057 - Marc Eisenstadt:

A User-Friendly Software Environment for the Novice Programmer. 1058-1064
- Paul J. Jalics, Thomas S. Heines:

Transporting a Portable Operating System: UNIX to an IBM Minicomputer. 1066-1072
- Gaston H. Gonnet:

Balancing Binary Trees by Internal Path Reduction. 1074-1081 - Seiichi Nishihara, Katsuo Ikeda:

Reducing the Retrieval Time of Hashing Method by Using Predictors. 1082-1088

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














