default search action
Communications of the ACM (CACM), Volume 24, 1981
Volume 24, Number 1, January 1981
- Barry Dwyer:
One More Time - How to Update a Master File. 3-8
- Glenn Ricart, Ashok K. Agrawala:
An Optimal Algorithm for Mutual Exclusion in Computer Networks. 9-17
- Paul Pritchard:
A Sublinear Additive Sieve for Finding Prime Numbers. 18-23
- Peter G. W. Keen:
Information Systems and Organizational Change. 24-33
Volume 24, Number 2, February 1981
- Fred N. Krull:
Experience With ILIAD: A High-Level Process Control Language. 66-72 - E. J. Gauss:
Pracniques: Built-In Checklist Reduces File Destruction. 73
- C. A. R. Hoare:
The Emperor's Old Clothes. 75-83
- David Chaum:
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. 84-88
- Arnold L. Rosenberg:
On Uniformly Inserting One Data Structure into Another. Commun. ACM 24(2): 88-90 (1981)
Volume 24, Number 3, March 1981
- Marilyn M. Mantai:
The Effect of Programming Team Structures on Programming Tasks. 106-113
- Kenneth I. Magel, Richard H. Austing, Alfs T. Berztiss, Gerald L. Engel, John W. Hamblen, Alex A. J. Hoffman, Robert F. Mathis:
Recommendations for Master's Level Programs in Computer Science. 115-123 - Jay F. Nunamaker Jr.:
Educational Programs in Information Systems. 124-133 - Jack Minker:
Computer Scientists Whose Scientific Freedom and Human Rights Have Been Violated: A Report of the ACM Commitee on Scientific Freedom and Human Rights. 134-139 - Gregory R. Andrews:
Parallel Programs: Proofs, Principles, and Practice. 140-146
- Abbe Mowshowitz:
On Approaches to the Study of Social Issues in Computing. 146-155
Volume 24, Number 4, April 1981
- Richard E. Nance:
The Time and State Relationships in Simulation Modeling. 173-179 - Tuncer I. Ören:
Concepts and Criteria to Access Acceptability of Simulation Studies: A Frame of References. 180-189 - Osman Balci, Robert G. Sargent:
A Methodology for Cost-Risk Analysis in the Statistical Validation of Simulation Models. 190-197 - K. Mani Chandy, Jayadev Misra:
Asynchronous Distributed Simulation via a Sequence of Parallel Computations. 198-206 - Gordon M. Clark:
Use of Polya Distributions in Approximate Solutions to Nonstationary M/M/s Queues. 206-217 - Thomas J. Schriber, Richard W. Andrews:
A Conceptual Framework for Research in the Analysis of Simulation Output. 218-232 - Philip Heidelberger, Peter D. Welch:
A Spectral Method for Confidence Interval Generation and Run Length Control in Simulations. 233-245 - Lee Schruben:
Control of Initialization Bias in Multivariate Simulation Response. 246-252 - James H. Donnelly, Robert E. Shannon:
Minimum Mean-Squared-Error Estimators for Simulation Experiments. 253-259 - Philip Heidelberger, Peter A. W. Lewis:
Regression-Adjusted Estimates for Regenerative Simulations, with Graphics. 260-273
Volume 24, Number 5, May 1981
- Charles R. Litecky, Larry E. Rittenberg:
The External Auditor's Review of Computer Controls. 288-295 - Peter Robinson, Dave Singer:
Another Spelling Correction Program. 296-297 - Robert P. Nix:
Experiments With a Space Efficient Way to Store a Dictionary. 297-298 - J. Inglis:
Pracniques: Updating A Master File - Yet One More Time. 299
- Franco P. Preparata, Jean Vuillemin:
The Cube-Connected Cycles: A Versatile Network for Parallel Computation. 300-309
- Dana H. Ballard:
Strip Trees: A Hierarchical Representation for Curves. 310-321
Volume 24, Number 6, June 1981
- Dan W. Crockett:
Triform Programs. 344-350
- Joseph F. Traub:
Quo Vadimus: Computer Science in a Decade. 351-369 - Peter J. Denning, Edward A. Feigenbaum, Paul C. Gilmore, Anthony C. Hearn, Robert W. Ritchie, Joseph F. Traub:
A Discipline in Crisis. 370-374 - John A. N. Lee:
Response to the Federal Trade Commission's Proposed Ruling on Standards and Certification. 375-380
- Martin A. Fischler, Robert C. Bolles:
Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography. 381-395
Volume 24, Number 7, July 1981
- Michael Stonebraker:
Operating System Support for Database Management. 412-418
- Anthony Ralston:
The Proposed New Computing Reviews Classification Scheme, A Report of the Computing Reviews Category Revision Committee. 419-433 - Peter J. Denning:
Report of the Public Cryptography Study Group. 434-450
- Harvey J. Greenberg, Richard P. O'Neill:
Representing Super-Sparse Matrices with Perturbed Values. 451-456
- Brian Billard:
Polynomial Manipulation with APL. 457-465
- Ralph C. Merkle, Martin E. Hellman:
On the Security of Multiple Encryption. 465-467
Volume 24, Number 8, August 1981
- Richard A. Demers:
System Design for Usability. 494-501 - William L. Ash:
Mxec: Parallel Processing with an Advanced Macro Facility. 502-509
- Richard E. Mayer, Piraye Bayman:
Psychology of Calculator Languages: A Framework for Describing Differences in Users' Knowledge. 511-520
- Alan Jay Smith:
Long Term File Migration: Development and Evaluation of Algorithms. 521-532
- Dorothy E. Denning, Giovanni Maria Sacco:
Timestamps in Key Distribution Protocols. 533-536
Volume 24, Number 9, September 1981
- Barry Dwyer:
A User-Friendly Algorithm. 556-561
- Tim Teitelbaum, Thomas W. Reps:
The Cornell Program Synthesizer: A Syntax-Directed Programming Environment. 563-573 - Joseph O'Rourke:
An On-Line Algorithm for Fitting Straight Lines Between Data Ranges. 574-578 - Páe Quittner, S. Csóka, S. Halász, D. Kotsis, K. Várnai:
Comparison of Synonym Handling and Bucket Organization Methods. 579-583
- Robert J. McEliece, Dilip V. Sarwate:
On Sharing Secrets and Reed-Solomon Codes. 583-584
- Jane Fedorowicz:
Comments on Price/Performance Patterns of U.S. Computer Systems. 585-586
- Gail E. Kaiser:
Automatic Extension of an ATN Knowledge Base. 587-593 - Christopher E. Rothe:
An Abstract Programming Model. 594-596 - Jay L. Gischer:
Shuffle Languages, Petri Nets, and Context-Sensitive Grammars. 597-605
Volume 24, Number 10, October 1981
- Donald D. Chamberlin, Morton M. Astrahan, Mike W. Blasgen, Jim Gray, W. Frank King III, Bruce G. Lindsay, Raymond A. Lorie, James W. Mehl, Thomas G. Price, Gianfranco R. Putzolu, Patricia G. Selinger, Mario Schkolnick, Donald R. Slutz, Irving L. Traiger, Bradford W. Wade, Robert A. Yost:
A History and Evaluation of System R. 632-646
- Peter Wegner:
Self-Assessment Procedure VIII: A Self-Assessment Procedure Dealing with the Programming Language Ada. 647-678
- Daniel Robey:
Computer Information Systems and Organization Structure. 679-687
- Peter J. Denning, T. Don Dennis, Jeffrey A. Brumfield:
Low Contention Semaphores and Ready Lists. 687-699 - David A. Patterson:
An Experiment in High Level Language Microprogramming and Verification. 699-709
Volume 24, Number 11, November 1981
- Saul I. Gass, Karla L. Hoffman, Richard Henry Frymuth Jackson, Lambert S. Joel, Patsy B. Saunders:
Documentation for a Model: A Hierarchical Approach. 728-733 - Michael A. Pechura:
Microcomputers as Remote Nodes of a Distributed System. 734-738
- Starr Roxanne Hiltz, Murray Turoff:
The Evolution of User Behavior in a Computerized Conferencing System. 739-751
- Izak Benbasat, Albert S. Dexter, Paul S. Masulis:
An Experimental Study of the Human/Computer Interface. 752-762
- Bennet P. Lientz, E. Burton Swanson:
Problems in Application Software Maintenance. 763-769
- Leslie Lamport:
Password Authentification with Insecure Communication. 770-772 - Kellogg S. Booth:
Authentication of Signature Using Public Key Encryption. 772-774
Volume 24, Number 12, December 1981
- Leonard J. Bass, Ralph E. Bunker:
A Generalized User Interface for Applications Programs. 796-800
- William M. McCormack, Robert G. Sargent:
Analysis of Future Event Set Algorithms for Discrete Event Simulation. 801-812
- Per Galle:
An Algorithm for Exhaustive Generation of Building Floor Plans. 813-825
- John H. Blackstone Jr., Gary L. Hogg, Don T. Phillips:
A Two-List Synchronization Procedure for Discrete Event Simulation. 825-829
- Gerhard Jaeschke:
Reciprocal Hashing: A Method for Generating Minimal Perfect Hashing Functions. 829-833
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.