default search action
Search dblp for Publications
export results for "toc:db/journals/cacm/cacm24.bht:"
@article{DBLP:journals/cacm/Andrews81, author = {Gregory R. Andrews}, title = {Parallel Programs: Proofs, Principles, and Practice}, journal = {Commun. {ACM}}, volume = {24}, number = {3}, pages = {140--146}, year = {1981}, url = {https://doi.org/10.1145/358568.358586}, doi = {10.1145/358568.358586}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Andrews81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Ash81, author = {William L. Ash}, title = {Mxec: Parallel Processing with an Advanced Macro Facility}, journal = {Commun. {ACM}}, volume = {24}, number = {8}, pages = {502--509}, year = {1981}, url = {https://doi.org/10.1145/358722.358733}, doi = {10.1145/358722.358733}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Ash81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BalciS81, author = {Osman Balci and Robert G. Sargent}, title = {A Methodology for Cost-Risk Analysis in the Statistical Validation of Simulation Models}, journal = {Commun. {ACM}}, volume = {24}, number = {4}, pages = {190--197}, year = {1981}, url = {https://doi.org/10.1145/358598.358609}, doi = {10.1145/358598.358609}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BalciS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Ballard81, author = {Dana H. Ballard}, title = {Strip Trees: {A} Hierarchical Representation for Curves}, journal = {Commun. {ACM}}, volume = {24}, number = {5}, pages = {310--321}, year = {1981}, url = {https://doi.org/10.1145/358645.358661}, doi = {10.1145/358645.358661}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Ballard81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BassB81, author = {Leonard J. Bass and Ralph E. Bunker}, title = {A Generalized User Interface for Applications Programs}, journal = {Commun. {ACM}}, volume = {24}, number = {12}, pages = {796--800}, year = {1981}, url = {https://doi.org/10.1145/358800.358802}, doi = {10.1145/358800.358802}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BassB81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BenbasatDM81, author = {Izak Benbasat and Albert S. Dexter and Paul S. Masulis}, title = {An Experimental Study of the Human/Computer Interface}, journal = {Commun. {ACM}}, volume = {24}, number = {11}, pages = {752--762}, year = {1981}, url = {https://doi.org/10.1145/358790.358795}, doi = {10.1145/358790.358795}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BenbasatDM81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Billard81, author = {Brian Billard}, title = {Polynomial Manipulation with {APL}}, journal = {Commun. {ACM}}, volume = {24}, number = {7}, pages = {457--465}, year = {1981}, url = {https://doi.org/10.1145/358699.358716}, doi = {10.1145/358699.358716}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Billard81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BlackstoneHP81, author = {John H. Blackstone Jr. and Gary L. Hogg and Don T. Phillips}, title = {A Two-List Synchronization Procedure for Discrete Event Simulation}, journal = {Commun. {ACM}}, volume = {24}, number = {12}, pages = {825--829}, year = {1981}, url = {https://doi.org/10.1145/358800.358805}, doi = {10.1145/358800.358805}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BlackstoneHP81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Booth81, author = {Kellogg S. Booth}, title = {Authentication of Signature Using Public Key Encryption}, journal = {Commun. {ACM}}, volume = {24}, number = {11}, pages = {772--774}, year = {1981}, url = {https://doi.org/10.1145/358790.358798}, doi = {10.1145/358790.358798}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Booth81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/ChamberlinABGKLLMPPSSSTWY81, author = {Donald D. Chamberlin and Morton M. Astrahan and Mike W. Blasgen and Jim Gray and W. Frank King III and Bruce G. Lindsay and Raymond A. Lorie and James W. Mehl and Thomas G. Price and Gianfranco R. Putzolu and Patricia G. Selinger and Mario Schkolnick and Donald R. Slutz and Irving L. Traiger and Bradford W. Wade and Robert A. Yost}, title = {A History and Evaluation of System {R}}, journal = {Commun. {ACM}}, volume = {24}, number = {10}, pages = {632--646}, year = {1981}, url = {https://doi.org/10.1145/358769.358784}, doi = {10.1145/358769.358784}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/ChamberlinABGKLLMPPSSSTWY81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/ChandyM81, author = {K. Mani Chandy and Jayadev Misra}, title = {Asynchronous Distributed Simulation via a Sequence of Parallel Computations}, journal = {Commun. {ACM}}, volume = {24}, number = {4}, pages = {198--206}, year = {1981}, url = {https://doi.org/10.1145/358598.358613}, doi = {10.1145/358598.358613}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/ChandyM81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Chaum81, author = {David Chaum}, title = {Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms}, journal = {Commun. {ACM}}, volume = {24}, number = {2}, pages = {84--88}, year = {1981}, url = {https://doi.org/10.1145/358549.358563}, doi = {10.1145/358549.358563}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Chaum81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Clark81, author = {Gordon M. Clark}, title = {Use of Polya Distributions in Approximate Solutions to Nonstationary M/M/s Queues}, journal = {Commun. {ACM}}, volume = {24}, number = {4}, pages = {206--217}, year = {1981}, url = {https://doi.org/10.1145/358598.358620}, doi = {10.1145/358598.358620}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Clark81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Crockett81, author = {Dan W. Crockett}, title = {Triform Programs}, journal = {Commun. {ACM}}, volume = {24}, number = {6}, pages = {344--350}, year = {1981}, url = {https://doi.org/10.1145/358669.358673}, doi = {10.1145/358669.358673}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Crockett81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Demers81, author = {Richard A. Demers}, title = {System Design for Usability}, journal = {Commun. {ACM}}, volume = {24}, number = {8}, pages = {494--501}, year = {1981}, url = {https://doi.org/10.1145/358722.358730}, doi = {10.1145/358722.358730}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Demers81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Denning81, author = {Peter J. Denning}, title = {Report of the Public Cryptography Study Group}, journal = {Commun. {ACM}}, volume = {24}, number = {7}, pages = {434--450}, year = {1981}, url = {https://doi.org/10.1145/358699.358710}, doi = {10.1145/358699.358710}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Denning81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/DenningDb81, author = {Peter J. Denning and T. Don Dennis and Jeffrey A. Brumfield}, title = {Low Contention Semaphores and Ready Lists}, journal = {Commun. {ACM}}, volume = {24}, number = {10}, pages = {687--699}, year = {1981}, url = {https://doi.org/10.1145/358769.358787}, doi = {10.1145/358769.358787}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/DenningDb81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/DenningFGHRT81, author = {Peter J. Denning and Edward A. Feigenbaum and Paul C. Gilmore and Anthony C. Hearn and Robert W. Ritchie and Joseph F. Traub}, title = {A Discipline in Crisis}, journal = {Commun. {ACM}}, volume = {24}, number = {6}, pages = {370--374}, year = {1981}, url = {https://doi.org/10.1145/358669.358682}, doi = {10.1145/358669.358682}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/DenningFGHRT81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/DenningS81, author = {Dorothy E. Denning and Giovanni Maria Sacco}, title = {Timestamps in Key Distribution Protocols}, journal = {Commun. {ACM}}, volume = {24}, number = {8}, pages = {533--536}, year = {1981}, url = {https://doi.org/10.1145/358722.358740}, doi = {10.1145/358722.358740}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/DenningS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/DonnellyS81, author = {James H. Donnelly and Robert E. Shannon}, title = {Minimum Mean-Squared-Error Estimators for Simulation Experiments}, journal = {Commun. {ACM}}, volume = {24}, number = {4}, pages = {253--259}, year = {1981}, url = {https://doi.org/10.1145/358598.358637}, doi = {10.1145/358598.358637}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/DonnellyS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Dwyer81, author = {Barry Dwyer}, title = {One More Time - How to Update a Master File}, journal = {Commun. {ACM}}, volume = {24}, number = {1}, pages = {3--8}, year = {1981}, url = {https://doi.org/10.1145/358527.358534}, doi = {10.1145/358527.358534}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Dwyer81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Dwyer81a, author = {Barry Dwyer}, title = {A User-Friendly Algorithm}, journal = {Commun. {ACM}}, volume = {24}, number = {9}, pages = {556--561}, year = {1981}, url = {https://doi.org/10.1145/358746.358751}, doi = {10.1145/358746.358751}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Dwyer81a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Fedorowicz81, author = {Jane Fedorowicz}, title = {Comments on Price/Performance Patterns of {U.S.} Computer Systems}, journal = {Commun. {ACM}}, volume = {24}, number = {9}, pages = {585--586}, year = {1981}, url = {https://doi.org/10.1145/358746.358764}, doi = {10.1145/358746.358764}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Fedorowicz81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/FischlerB81, author = {Martin A. Fischler and Robert C. Bolles}, title = {Random Sample Consensus: {A} Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography}, journal = {Commun. {ACM}}, volume = {24}, number = {6}, pages = {381--395}, year = {1981}, url = {https://doi.org/10.1145/358669.358692}, doi = {10.1145/358669.358692}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/FischlerB81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Galle81, author = {Per Galle}, title = {An Algorithm for Exhaustive Generation of Building Floor Plans}, journal = {Commun. {ACM}}, volume = {24}, number = {12}, pages = {813--825}, year = {1981}, url = {https://doi.org/10.1145/358800.358804}, doi = {10.1145/358800.358804}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Galle81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GassHJJS81, author = {Saul I. Gass and Karla L. Hoffman and Richard Henry Frymuth Jackson and Lambert S. Joel and Patsy B. Saunders}, title = {Documentation for a Model: {A} Hierarchical Approach}, journal = {Commun. {ACM}}, volume = {24}, number = {11}, pages = {728--733}, year = {1981}, url = {https://doi.org/10.1145/358790.358792}, doi = {10.1145/358790.358792}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/GassHJJS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Gauss81, author = {E. J. Gauss}, title = {Pracniques: Built-In Checklist Reduces File Destruction}, journal = {Commun. {ACM}}, volume = {24}, number = {2}, pages = {73}, year = {1981}, url = {https://doi.org/10.1145/358549.358558}, doi = {10.1145/358549.358558}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Gauss81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Gischer81, author = {Jay L. Gischer}, title = {Shuffle Languages, Petri Nets, and Context-Sensitive Grammars}, journal = {Commun. {ACM}}, volume = {24}, number = {9}, pages = {597--605}, year = {1981}, url = {https://doi.org/10.1145/358746.358767}, doi = {10.1145/358746.358767}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Gischer81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GreenbergO81, author = {Harvey J. Greenberg and Richard P. O'Neill}, title = {Representing Super-Sparse Matrices with Perturbed Values}, journal = {Commun. {ACM}}, volume = {24}, number = {7}, pages = {451--456}, year = {1981}, url = {https://doi.org/10.1145/358699.358712}, doi = {10.1145/358699.358712}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/GreenbergO81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/HeidelbergerL81, author = {Philip Heidelberger and Peter A. W. Lewis}, title = {Regression-Adjusted Estimates for Regenerative Simulations, with Graphics}, journal = {Commun. {ACM}}, volume = {24}, number = {4}, pages = {260--273}, year = {1981}, url = {https://doi.org/10.1145/358598.358641}, doi = {10.1145/358598.358641}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/HeidelbergerL81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/HeidelbergerW81, author = {Philip Heidelberger and Peter D. Welch}, title = {A Spectral Method for Confidence Interval Generation and Run Length Control in Simulations}, journal = {Commun. {ACM}}, volume = {24}, number = {4}, pages = {233--245}, year = {1981}, url = {https://doi.org/10.1145/358598.358630}, doi = {10.1145/358598.358630}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/HeidelbergerW81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/HiltzT81, author = {Starr Roxanne Hiltz and Murray Turoff}, title = {The Evolution of User Behavior in a Computerized Conferencing System}, journal = {Commun. {ACM}}, volume = {24}, number = {11}, pages = {739--751}, year = {1981}, url = {https://doi.org/10.1145/358790.358794}, doi = {10.1145/358790.358794}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/HiltzT81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Hoare81, author = {C. A. R. Hoare}, title = {The Emperor's Old Clothes}, journal = {Commun. {ACM}}, volume = {24}, number = {2}, pages = {75--83}, year = {1981}, url = {https://doi.org/10.1145/358549.358561}, doi = {10.1145/358549.358561}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Hoare81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Inglis81, author = {J. Inglis}, title = {Pracniques: Updating {A} Master File - Yet One More Time}, journal = {Commun. {ACM}}, volume = {24}, number = {5}, pages = {299}, year = {1981}, url = {https://doi.org/10.1145/358645.358657}, doi = {10.1145/358645.358657}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Inglis81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Jaeschke81, author = {Gerhard Jaeschke}, title = {Reciprocal Hashing: {A} Method for Generating Minimal Perfect Hashing Functions}, journal = {Commun. {ACM}}, volume = {24}, number = {12}, pages = {829--833}, year = {1981}, url = {https://doi.org/10.1145/358800.358806}, doi = {10.1145/358800.358806}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Jaeschke81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Kaiser81, author = {Gail E. Kaiser}, title = {Automatic Extension of an {ATN} Knowledge Base}, journal = {Commun. {ACM}}, volume = {24}, number = {9}, pages = {587--593}, year = {1981}, url = {https://doi.org/10.1145/358746.358765}, doi = {10.1145/358746.358765}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Kaiser81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Keen81, author = {Peter G. W. Keen}, title = {Information Systems and Organizational Change}, journal = {Commun. {ACM}}, volume = {24}, number = {1}, pages = {24--33}, year = {1981}, url = {https://doi.org/10.1145/358527.358543}, doi = {10.1145/358527.358543}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Keen81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Krull81, author = {Fred N. Krull}, title = {Experience With {ILIAD:} {A} High-Level Process Control Language}, journal = {Commun. {ACM}}, volume = {24}, number = {2}, pages = {66--72}, year = {1981}, url = {https://doi.org/10.1145/358549.358555}, doi = {10.1145/358549.358555}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Krull81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Lamport81, author = {Leslie Lamport}, title = {Password Authentification with Insecure Communication}, journal = {Commun. {ACM}}, volume = {24}, number = {11}, pages = {770--772}, year = {1981}, url = {https://doi.org/10.1145/358790.358797}, doi = {10.1145/358790.358797}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Lamport81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Lee81, author = {John A. N. Lee}, title = {Response to the Federal Trade Commission's Proposed Ruling on Standards and Certification}, journal = {Commun. {ACM}}, volume = {24}, number = {6}, pages = {375--380}, year = {1981}, url = {https://doi.org/10.1145/358669.358686}, doi = {10.1145/358669.358686}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Lee81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/LientzS81, author = {Bennet P. Lientz and E. Burton Swanson}, title = {Problems in Application Software Maintenance}, journal = {Commun. {ACM}}, volume = {24}, number = {11}, pages = {763--769}, year = {1981}, url = {https://doi.org/10.1145/358790.358796}, doi = {10.1145/358790.358796}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/LientzS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/LiteckyR81, author = {Charles R. Litecky and Larry E. Rittenberg}, title = {The External Auditor's Review of Computer Controls}, journal = {Commun. {ACM}}, volume = {24}, number = {5}, pages = {288--295}, year = {1981}, url = {https://doi.org/10.1145/358645.358647}, doi = {10.1145/358645.358647}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/LiteckyR81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MagelABEHHM81, author = {Kenneth I. Magel and Richard H. Austing and Alfs T. Berztiss and Gerald L. Engel and John W. Hamblen and Alex A. J. Hoffman and Robert F. Mathis}, title = {Recommendations for Master's Level Programs in Computer Science}, journal = {Commun. {ACM}}, volume = {24}, number = {3}, pages = {115--123}, year = {1981}, url = {https://doi.org/10.1145/358568.358575}, doi = {10.1145/358568.358575}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MagelABEHHM81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Mantai81, author = {Marilyn M. Mantai}, title = {The Effect of Programming Team Structures on Programming Tasks}, journal = {Commun. {ACM}}, volume = {24}, number = {3}, pages = {106--113}, year = {1981}, url = {https://doi.org/10.1145/358568.358571}, doi = {10.1145/358568.358571}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Mantai81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MayerB81, author = {Richard E. Mayer and Piraye Bayman}, title = {Psychology of Calculator Languages: {A} Framework for Describing Differences in Users' Knowledge}, journal = {Commun. {ACM}}, volume = {24}, number = {8}, pages = {511--520}, year = {1981}, url = {https://doi.org/10.1145/358722.358735}, doi = {10.1145/358722.358735}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MayerB81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/McCormackS81, author = {William M. McCormack and Robert G. Sargent}, title = {Analysis of Future Event Set Algorithms for Discrete Event Simulation}, journal = {Commun. {ACM}}, volume = {24}, number = {12}, pages = {801--812}, year = {1981}, url = {https://doi.org/10.1145/358800.358803}, doi = {10.1145/358800.358803}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/McCormackS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/McElieceS81, author = {Robert J. McEliece and Dilip V. Sarwate}, title = {On Sharing Secrets and Reed-Solomon Codes}, journal = {Commun. {ACM}}, volume = {24}, number = {9}, pages = {583--584}, year = {1981}, url = {https://doi.org/10.1145/358746.358762}, doi = {10.1145/358746.358762}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/McElieceS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MerkleH81, author = {Ralph C. Merkle and Martin E. Hellman}, title = {On the Security of Multiple Encryption}, journal = {Commun. {ACM}}, volume = {24}, number = {7}, pages = {465--467}, year = {1981}, url = {https://doi.org/10.1145/358699.358718}, doi = {10.1145/358699.358718}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MerkleH81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Minker81, author = {Jack Minker}, title = {Computer Scientists Whose Scientific Freedom and Human Rights Have Been Violated: {A} Report of the {ACM} Commitee on Scientific Freedom and Human Rights}, journal = {Commun. {ACM}}, volume = {24}, number = {3}, pages = {134--139}, year = {1981}, url = {https://doi.org/10.1145/358568.358584}, doi = {10.1145/358568.358584}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Minker81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Mowshowitz81, author = {Abbe Mowshowitz}, title = {On Approaches to the Study of Social Issues in Computing}, journal = {Commun. {ACM}}, volume = {24}, number = {3}, pages = {146--155}, year = {1981}, url = {https://doi.org/10.1145/358568.358592}, doi = {10.1145/358568.358592}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Mowshowitz81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Nance81, author = {Richard E. Nance}, title = {The Time and State Relationships in Simulation Modeling}, journal = {Commun. {ACM}}, volume = {24}, number = {4}, pages = {173--179}, year = {1981}, url = {https://doi.org/10.1145/358598.358601}, doi = {10.1145/358598.358601}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Nance81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Nix81, author = {Robert P. Nix}, title = {Experiments With a Space Efficient Way to Store a Dictionary}, journal = {Commun. {ACM}}, volume = {24}, number = {5}, pages = {297--298}, year = {1981}, url = {https://doi.org/10.1145/358645.358654}, doi = {10.1145/358645.358654}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Nix81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Nunamaker81, author = {Jay F. Nunamaker Jr.}, title = {Educational Programs in Information Systems}, journal = {Commun. {ACM}}, volume = {24}, number = {3}, pages = {124--133}, year = {1981}, url = {https://doi.org/10.1145/358568.358580}, doi = {10.1145/358568.358580}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Nunamaker81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/ORourke81, author = {Joseph O'Rourke}, title = {An On-Line Algorithm for Fitting Straight Lines Between Data Ranges}, journal = {Commun. {ACM}}, volume = {24}, number = {9}, pages = {574--578}, year = {1981}, url = {https://doi.org/10.1145/358746.358758}, doi = {10.1145/358746.358758}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/ORourke81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Oren81, author = {Tuncer I. {\"{O}}ren}, title = {Concepts and Criteria to Access Acceptability of Simulation Studies: {A} Frame of References}, journal = {Commun. {ACM}}, volume = {24}, number = {4}, pages = {180--189}, year = {1981}, url = {https://doi.org/10.1145/358598.358605}, doi = {10.1145/358598.358605}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Oren81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Patterson81, author = {David A. Patterson}, title = {An Experiment in High Level Language Microprogramming and Verification}, journal = {Commun. {ACM}}, volume = {24}, number = {10}, pages = {699--709}, year = {1981}, url = {https://doi.org/10.1145/358769.358788}, doi = {10.1145/358769.358788}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Patterson81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Pechura81, author = {Michael A. Pechura}, title = {Microcomputers as Remote Nodes of a Distributed System}, journal = {Commun. {ACM}}, volume = {24}, number = {11}, pages = {734--738}, year = {1981}, url = {https://doi.org/10.1145/358790.358793}, doi = {10.1145/358790.358793}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Pechura81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PreparataV81, author = {Franco P. Preparata and Jean Vuillemin}, title = {The Cube-Connected Cycles: {A} Versatile Network for Parallel Computation}, journal = {Commun. {ACM}}, volume = {24}, number = {5}, pages = {300--309}, year = {1981}, url = {https://doi.org/10.1145/358645.358660}, doi = {10.1145/358645.358660}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PreparataV81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Pritchard81, author = {Paul Pritchard}, title = {A Sublinear Additive Sieve for Finding Prime Numbers}, journal = {Commun. {ACM}}, volume = {24}, number = {1}, pages = {18--23}, year = {1981}, url = {https://doi.org/10.1145/358527.358540}, doi = {10.1145/358527.358540}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Pritchard81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/QuittnerCHKV81, author = {P{\'{a}}e Quittner and S. Cs{\'{o}}ka and S. Hal{\'{a}}sz and D. Kotsis and K. V{\'{a}}rnai}, title = {Comparison of Synonym Handling and Bucket Organization Methods}, journal = {Commun. {ACM}}, volume = {24}, number = {9}, pages = {579--583}, year = {1981}, url = {https://doi.org/10.1145/358746.358760}, doi = {10.1145/358746.358760}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/QuittnerCHKV81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Ralston81, author = {Anthony Ralston}, title = {The Proposed New Computing Reviews Classification Scheme, {A} Report of the Computing Reviews Category Revision Committee}, journal = {Commun. {ACM}}, volume = {24}, number = {7}, pages = {419--433}, year = {1981}, url = {https://doi.org/10.1145/358699.358707}, doi = {10.1145/358699.358707}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Ralston81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/RicartA81, author = {Glenn Ricart and Ashok K. Agrawala}, title = {An Optimal Algorithm for Mutual Exclusion in Computer Networks}, journal = {Commun. {ACM}}, volume = {24}, number = {1}, pages = {9--17}, year = {1981}, url = {https://doi.org/10.1145/358527.358537}, doi = {10.1145/358527.358537}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/RicartA81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Robey81, author = {Daniel Robey}, title = {Computer Information Systems and Organization Structure}, journal = {Commun. {ACM}}, volume = {24}, number = {10}, pages = {679--687}, year = {1981}, url = {https://doi.org/10.1145/358769.358786}, doi = {10.1145/358769.358786}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Robey81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/RobinsonS81, author = {Peter Robinson and Dave Singer}, title = {Another Spelling Correction Program}, journal = {Commun. {ACM}}, volume = {24}, number = {5}, pages = {296--297}, year = {1981}, url = {https://doi.org/10.1145/358645.358652}, doi = {10.1145/358645.358652}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/RobinsonS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Rosenberg81, author = {Arnold L. Rosenberg}, title = {On Uniformly Inserting One Data Structure into Another}, journal = {Commun. {ACM}}, volume = {24}, number = {2}, pages = {88--90}, year = {1981}, timestamp = {Thu, 20 Nov 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Rosenberg81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Rothe81, author = {Christopher E. Rothe}, title = {An Abstract Programming Model}, journal = {Commun. {ACM}}, volume = {24}, number = {9}, pages = {594--596}, year = {1981}, url = {https://doi.org/10.1145/358746.358766}, doi = {10.1145/358746.358766}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Rothe81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/SchriberA81, author = {Thomas J. Schriber and Richard W. Andrews}, title = {A Conceptual Framework for Research in the Analysis of Simulation Output}, journal = {Commun. {ACM}}, volume = {24}, number = {4}, pages = {218--232}, year = {1981}, url = {https://doi.org/10.1145/358598.358626}, doi = {10.1145/358598.358626}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/SchriberA81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Schruben81, author = {Lee Schruben}, title = {Control of Initialization Bias in Multivariate Simulation Response}, journal = {Commun. {ACM}}, volume = {24}, number = {4}, pages = {246--252}, year = {1981}, url = {https://doi.org/10.1145/358598.358634}, doi = {10.1145/358598.358634}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Schruben81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Smith81, author = {Alan Jay Smith}, title = {Long Term File Migration: Development and Evaluation of Algorithms}, journal = {Commun. {ACM}}, volume = {24}, number = {8}, pages = {521--532}, year = {1981}, url = {https://doi.org/10.1145/358722.358737}, doi = {10.1145/358722.358737}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Smith81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Stonebraker81, author = {Michael Stonebraker}, title = {Operating System Support for Database Management}, journal = {Commun. {ACM}}, volume = {24}, number = {7}, pages = {412--418}, year = {1981}, url = {https://doi.org/10.1145/358699.358703}, doi = {10.1145/358699.358703}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Stonebraker81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/TeitelbaumR81, author = {Tim Teitelbaum and Thomas W. Reps}, title = {The Cornell Program Synthesizer: {A} Syntax-Directed Programming Environment}, journal = {Commun. {ACM}}, volume = {24}, number = {9}, pages = {563--573}, year = {1981}, url = {https://doi.org/10.1145/358746.358755}, doi = {10.1145/358746.358755}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/TeitelbaumR81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Traub81, author = {Joseph F. Traub}, title = {Quo Vadimus: Computer Science in a Decade}, journal = {Commun. {ACM}}, volume = {24}, number = {6}, pages = {351--369}, year = {1981}, url = {https://doi.org/10.1145/358669.358677}, doi = {10.1145/358669.358677}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Traub81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Wegner81, author = {Peter Wegner}, title = {Self-Assessment Procedure {VIII:} {A} Self-Assessment Procedure Dealing with the Programming Language Ada}, journal = {Commun. {ACM}}, volume = {24}, number = {10}, pages = {647--678}, year = {1981}, url = {https://doi.org/10.1145/358769.358785}, doi = {10.1145/358769.358785}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Wegner81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.