


default search action
Communications of the ACM (CACM), Volume 32, 1989
Volume 32, Number 1, January 1989
- Peter J. Denning, Douglas Comer, David Gries

, Michael C. Mulder, Allen B. Tucker, A. Joe Turner, Paul R. Young:
Computing as a Discipline. 9-23 - Karen A. Frenkel:

The Computer Bowl. 24-31
- Leslie Lamport:

A Simple Approach to Specifying Concurrent Systems. 32-45 - Claude Banville, Maurice Landry:

Can the Field of MIS be Disciplined? 48-60 - Jason L. Frand, Julia A. Britt:

Fifth Annual UCLA Survey of Business School Computer Usage. 62-76
- David M. Abrahamson:

An Adaptive Dependency Source Model for Data Compression. 77-83 - Boaz Ronen, Michael A. Palley, Henry C. Lucas Jr.:

Spreadsheet Analysis and Design. 84-93 - David M. DeJean, George W. Zobrist:

A Definition Optimization Technique Used in a Code Translation Algorithm. 94-105 - Neal R. Wagner, Paul Putter:

Error Detecting Decimal Digits. 106-110
- Boris D. Lubachevsky:

Efficient Distributed Event-Driven Simulations of Multiple-Loop Networks. 111-123 - Richard W. Hall:

Fast Parallel Thinning Algorithms: Parallel Speed and Connectivity Preservation. 124-131 - Douglas W. Jones:

Concurrent Operations on Priority Queues. 132-137
Volume 32, Number 2, February 1989
- E. Robert Yoche:

Legal Protection for Computer Software. Commun. ACM 32(2): 169-171 (1989)
- Les Earnest:

Can Computers Cope with Human Races? 173-182 - Sheryl R. Young, Alexander G. Hauptmann, Wayne H. Ward, Edward T. Smith, Philip Werner:

High Level Knowledge Sources in Usable Speech Recognition Systems. 183-194 - Yoshua Bengio, Régis Cardin, Renato de Mori, Ettore Merlo:

Programmable Execution of Multi-Layered Networks for Automatic Speech Recognition. 195-199 - Walter Hollingsworth, Howard Sachs, Alan Jay Smith:

The Clipper Processor: Instruction Set Architecture and Implementation. 200-219 - Robert E. Kraut, Susan T. Dumais, Susan Koch:

Computerization, Productivity, and Quality of Work-Life. 220-238
- John Tillquist, Feng-Yang Kuo:

An Approach to the Recursive Retrieval Problem in the Relational Database. 239-245 - Paul J. Jalics, David R. McIntyre:

Caching and Other Disk Access Avoidance Techniques on Personal Computers. 246-255
Volume 32, Number 3, March 1989
- David Gries

, Terry Walker, Paul Young:
The 1988 Snowbird Report: A Discipline Matures. 294-297, 318
- Virginia E. Barker, Dennis E. O'Connor:

Expert Systems for Configuration at Digital: XCON and Beyond. 298-318
- Donald P. Ballou, Giri Kumar Tayi:

Methodology for Allocating Resources for Data Quality Enhancement. 320-329
- Bo Ingvar Sandén:

An Entity-Life Modeling Approach to the Design of Concurrent Software. 330-343 - Xuedong Luo:

A Practical Sieve Algorithm for Finding Prime Numbers. 344-346
- Virginia R. Gibson, James A. Senn:

System Structure and Software Maintenance Performance. 347-358 - Zicheng Guo, Richard W. Hall:

Parallel Thinning with Two-Subiteration Algorithms. 359-373
Volume 32, Number 4, April 1989
- Karen A. Frenkel:

Volume Rendering. 426-435 - Peter J. Denning, Karen A. Frenkel:

A Conversation with Steve Jobs. 436-443 - Nicholas Carriero, David Gelernter:

Linda in Context. 444-458 - Lotte Bailyn:

Toward the Perfect Workplace? 460-471 - Riva Wenig Bickel:

Self-Assessment Procedure XIX: A Self-Assesment Procedure on the Application of Copyright Law to Computer Programs. Commun. ACM 32(4): 472-480 (1989)
- John R. Weitzel, Larry Kerschberg:

Developing Knowledge-Based Systems: Reorganizing the System Development Life Cycle. 482-488
- Edward R. Fiala, Daniel H. Greene:

Data Compression with Finite Windows. 490-505
Volume 32, Number 5, May 1989
- E. Robert Yoche, Arthur J. Levine:

Basic Principles of Copyright Protection for Computer Software. Commun. ACM 32(5): 544-545 (1989)
- Harold Abelson, Michael Eisenberg, Matthew Halfant, Jacob Katzenelson, Elisha Sacks, Gerald J. Sussman, Jack Wisdom, Kenneth Yip:

Intelligence in Scientific Computing. 546-562 - Pamela Samuelson:

Why the look and feel of software user interfaces should not be protected by copyright law. 563-572 - John Yen:

GERTIS: A Dempster-Shafer Approach to Diagnosing Hierarchical Hypotheses. 573-585 - Young Moo Kang:

Computer Hardware Performance: Production and Cost Function Analyses. 586-593
- Norman E. Gibbs:

The SEI Education Program: The Challenge of Teaching Future Software Engineers. 594-605
- Sidney C. Bailin:

An Object-Oriented Requirements Specifications Method. 608-623
Volume 32, Number 6, June 1989
- Pamela Samuelson:

Can Hackers Be Sued for Damages Caused by Computer Viruses? Commun. ACM 32(6): 666-669 (1989) - Michael C. Gemignani:

Viruses and Criminal Law. Commun. ACM 32(6): 669-671 (1989)
- Eugene H. Spafford

:
Crisis and Aftermath. 678-687 - Jon A. Rochlis, Mark W. Eichin:

With Microscope and Tweezers: The Worm from MIT's Perspective. 689-698 - Donn Seeley:

Password Cracking: A Game of Wits. 700-703 - Ted Eisenberg, David Gries

, Juris Hartmanis, Don Holcomb, M. Stuart Lynn, Thomas Santoro:
The Cornell Commission: On Morris and the Worm. 706-709
- Karen A. Frenkel:

An Interview with Ivan Sutherland. 712-718 - Ivan E. Sutherland:

Micropipelines. 720-738
- Christopher J. Van Wyk, Donald C. Lindsay, Harold W. Thimbleby:

A File Difference Program. 740-755
Volume 32, Number 7, July 1989
- Larry Press:

Thoughts and Observations at the Microsoft CD-ROM Conference. Commun. ACM 32(7): 784-788 (1989)
- Edward A. Fox

:
The Coming Revolution in Interactive Digital Video. 794-801 - Wendy E. Mackay, Glorianna Davenport:

Virtual Video Editing in Interactive Multimedia Applications. 802-810 - G. David Ripley:

DVI - A Digital Multimedia Technology. 811-822 - Douglas F. Dixon:

Life Before the Chips: Simulating Digital Video Interactive Technology. 824-831 - Scott M. Stevens:

Intelligent Interactive Video Simulation of a Code Inspection. 832-843 - Michael Tinker:

DVI Parallel Image Compression. 844-851 - Andrew Lippman, William Butera:

Coding Image Sequences for Interactive Retrieval. 852-860 - Clement T. Yu, Wei Sun, Dina Bitton, Qi Yang, Richard Bruno, John Tullis:

Efficient Placement of Audio Data on Optical Disks for Real-Time Applications. 862-871 - Karen A. Frenkel:

The Next Generation of Interactive Technologies. 872-881
Volume 32, Number 8, August 1989
- J. Michael Jakes, E. Robert Yoche:

Basic Principles of Patent Protection for Computer Software. Commun. ACM 32(8): 922-924 (1989)
- Doug Schuler, Jonathan Jacky:

Introduction - Computing and Social Responsibilities. 925-927 - Donald H. Berman, Carole D. Hafner:

The Potential of Artificial Intelligence to Help Solve the Crisis in Our Legal System. 928-938 - Jack Beusmans, Kären Wieckert:

Computing, Research, and War: If Knowledge is Power, Where is Responsibility? 939-951 - Richard E. Ladner

:
Computer Accessibility For Federal Workers With Disabilities: It's The Law. 952-956
- Jack Minker:

Scientific Freedom and Human Rights of Computer Professionals - 1989. 957-974
- Toby J. Teorey, Guangping Wei, Deborah L. Bolton, John A. Koenig:

ER Model Clustering as an Aid for User Communication and Documentation in Database Design. 975-987 - Steve Rozen, Dennis E. Shasha:

Using a Relational System On Wall Street: The Good, The Bad, The Ugly, And The Ideal. 988-994
- Pai-Chun Ma, Frederic H. Murphy, Edward A. Stohr:

A Graphics Interface for Linear Programming. 996-1012
Volume 32, Number 9, September 1989
- Christopher J. Van Wyk, Norman Ramsey:

Waving A Language-Independent WEB. Commun. ACM 32(9): 1051-1055 (1989)
- John Sculley:

The Relationship Between Business and Higher Education: A Perspective on the 21st Century. 1056-1061
- John D. McGregor, Arthur M. Riehl:

Support for Multiprocessing (Introduction to the Special Section). 1062-1064 - Anthony E. Terrano, Stanley M. Dunn, Joseph E. Peters:

Using an Architectural Knowledge Base to Generate Code for Parallel Computers. 1065-1072 - Carolyn McCreary, Helen Gill:

Automatic Determination of Grain Size for Efficient Parallel Processing. 1073-1078 - Wan-Hong S. Cheng, Virgil Wallentine:

DEBL: A Knowledge-Based Language for Specifying and Debugging Distributed Programs. 1079-1084 - Charles J. Fleckenstein, David Hemmendinger:

Using a Global Name Space for Parallel Execution of UNIX Tools. 1085-1090 - Gordon Bell:

The Future of High Performance Computers in Science and Engineering. 1091-1101
- Ronald J. Norman, Jay F. Nunamaker Jr.:

CASE Productivity Perceptions of Software Engineering Professionals. 1102-1108 - Rui Feng Zhu, Tadao Takaoka:

A Technique for Two-Dimensional Pattern Matching. 1110-1120
Volume 32, Number 10, October 1989
- Jonathan Grudin:

The Case Against User Interface Consistency. 1164-1173 - Glenn D. Blank:

A Finite and Real-Time Processor for Natural Language. 1174-1189 - H. Albert Napier, David M. Lane, Richard R. Batsell, Norman S. Guadango:

Impact of a Restricted Natural Language Interface on Ease of Learning and Productivity. 1190-1198 - Rudy Hirschheim, Heinz K. Klein:

Four Paradigms of Information Systems Development. 1199-1216
- David Gries

, Dorothy Marsh:
The 1987-1988 Taulbee Survey. 1217-1224 - Monty Newborn, Danny Kopec:

Results of the Nineteenth ACM North American Computer Chess Championship. 1225-1230
- Carol B. MacKnight, Santosh Balagopalan:

An Evaluation Tool for Measuring Authoring System Performance. 1231-1236 - M. V. Ramakrishna:

Practical Performance Of Bloom Filters and Parallel Free-Text Searching. 1237-1239
Volume 32, Number 11, November 1989
- Larry Press:

The Toshiba T1000, IBM's Academic Computing Conference and SPARC PSs. Commun. ACM 32(11): 1292-1298 (1989)
- Karen A. Frenkel:

HDTV And The Computer Industry. 1300-1312 - William W. Cotterman, Kuldeep Kumar:

User Cube: A Taxonomy of End Users. 1313-1320 - Gerald E. Evans, Mark G. Simkin:

What Best Predicts Computer Proficiency? 1322-1327 - Detmar W. Straub, James C. Wetherbe:

Information Technologies for the 1990s: An Organizational Impact Perspective. 1328-1339
- Victor Matos, Paul J. Jalics:

An Experimental Analysis Of The Performance Of Fourth Generation Tools On PCs. 1340-1351 - Eliezer Kantorowitz, Oded Sudarsky:

The Adaptable User Interface. 1352-1358
Volume 32, Number 12, December 1989
- Saul Lefkowitz, E. Robert Yoche:

The Role of Trademarks in the Protection of Computer Software. Commun. ACM 32(12): 1391-1393 (1989)
- Peter J. Denning:

A Debate on Teaching Computing Science. 1397-1414
- Thomas J. McCabe, Charles W. Butler:

Design Complexity Measurement and Testing. 1415-1425 - Tarek K. Abdel-Hamid, Stuart E. Madnick:

Lessons Learned from Modeling the Dynamics of Software Development. 1426-1438 - Samson W. Tu, Michael G. Kahn, Mark A. Musen

, Jay C. Ferguson, Edward H. Shortliffe, Lawrence M. Fagan:
Episodic Skeletal-Plan Refinement Based on Temporal Data. 1439-1455
- Eugene Levin:

Grand Challenges to Computation Science. 1456-1457
- Bo Ingvar Sandén:

Entity-Life Modeling and Structured Analysis in Real-Time Software Design - A Comparison. 1458-1466 - James M. Purtilo, John R. Callahan:

Parse Tree Annotations. 1467-1477

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














