


default search action
Communications of the ACM (CACM), Volume 19, 1976
Volume 19, Number 1, January 1976
- Leonard Kleinrock, William E. Naylor, Holger Opderbeck:

A Study of Line Overhead in the Arpanet. 3-13 - Neil C. Wilhelm:

An Anomaly in Disk Scheduling: A Comparison of FCFS and SSTF Seek Scheduling Using an Empirical Model for Disk Accesses. 13-17 - Carson E. Agnew:

On Quadratic Adaptive Routing Algorithms. 18-22
- Philip L. Karlton, Samuel H. Fuller, R. E. Scroggs, E. B. Kaehler:

Performance of Height-Balanced Trees. 23-28
- J. J. Florentin:

Information Reference Coding. 29-33
- Charles R. Litecky, Gordon B. Davis:

A Study of Errors, Error-Proneness, and Error Diagnosis in Cobol. 33-37
Volume 19, Number 2, February 1976
- Gregor von Bochmann:

Semantic Evaluation from Left to Right. 55-62 - Ronald L. Rivest:

On Self-Organizing Sequential Search Heuristics. 63-67 - F. M. Ives:

Permutation Enumeration: Four New Permutation Algorithms. 68-72
- Alberto Martelli:

An Application of Heuristic Search Methods to Edge and Contour Detection. 73-83
- Kenneth F. Siler:

A Stochastic Evaluation Model for Database Organization in Data Retrieval Systems. 84-95 - Ronald Fagin:

A Counterintuitive Example of Computer Paging. 96-97
- Ehud Artzy, James A. Hinds, Harry J. Saal:

A Fast Division Technique for Constant Divisors. 98-101
Volume 19, Number 3, March 1976
- Allen Newell, Herbert A. Simon:

Computer Science as Empirical Inquiry: Symbols and Search. 113-126
- Jair M. Babad, Mario M. Modiano:

Joining Policies in a Multipriority Multiclass Batch Computer System. 127-136
- Frances E. Allen, John Cocke:

A Program Data Flow Analysis Procedure. 137-147
- Naftaly H. Minsky:

Intentional Resolution of Privacy Protection in Database Systems. 148-159
Volume 19, Number 4, April 1976
- Oliver R. Smoot:

Development of an International System for Legal Protection of Computer Programs. 171-174 - Bennet P. Lientz:

A Comparative Evaluation of Versions of BASIC. 175-181
- J. Raymond:

LG: A Language for Analytic Geometry. 182-187
- Shmuel Katz, Zohar Manna:

Logical Analysis of Programs. 188-206
Volume 19, Number 5, May 1976
- Dorothy E. Denning:

A Lattice Model of Secure Information Flow. 236-243 - Jonathan K. Millen:

Security Kernel Validation in Practice. 243-250 - Butler W. Lampson, Howard E. Sturgis:

Reflections on an Operating System Design. 251-265 - A. Nico Habermann, Lawrence Flon, Lee W. Cooprider:

Modularization and Hierarchy in a Family of Operating Systems. 266-272 - John H. Howard:

Proving Monitors. 273-279 - Susan S. Owicki, David Gries

:
Verifying Properties of Parallel Programs: An Axiomatic Approach. 279-285 - A. Wayne Madison, Alan P. Batson:

Characteristics of Program Localities. 285-294 - Barton G. Prieve, Robert S. Fabry:

VMIN-An Optimal Variable-Space Page Replacement Algorithm. 295-297 - Wesley W. Chu, Holger Opderbeck:

Analysis of the PFF Replacement Algorithm via a Semi-Markov Model. 298-304
Volume 19, Number 6, June 1976
- Orrin E. Taulbee, Samuel D. Conte:

Production and Employment of Ph.D.'s in Computer Science. 311-313
- Dennis G. Severance, Richardo Duhne:

A Practitioner's Guide To Addressing Algorithms. 314-326
- Forest Baskett, Alan Jay Smith:

Interference in Multiprocessor Computer Systems with Interleaved Memory. 327-334
- Gideon Frieder, Harry J. Saal:

A Process for the Determination of Addresses in Variable Length Addressing. 335-338 - David S. Wise:

Referencing Lists by an Edge. 338-342 - Helmut Schumacher, Kenneth C. Sevcik:

The Synthetic Approach to Decision Table Conversion. 343-351 - Douglas W. Clark:

An Efficient List-Moving Algorithm Using Constant Workspace. 352-354
- Gary D. Knott:

A Numbering System for Permutations of Combinations. Commun. ACM 19(6): 355-356 (1976)
Volume 19, Number 7, July 1976
- Samuel D. Conte, Maurice H. Halstead:

The Technology of Computer Center Management: A Proposed Course for Graduate Professional Programs in Computer Science or in Information Systems. 369-370
- Robert M. Keller:

Formal Verification of Parallel Programs. 371-384
- James C. King:

Symbolic Execution and Program Testing. 385-394
- Robert Metcalfe, David R. Boggs:

Ethernet: Distributed Packet Switching for Local Computer Networks. 395-404
- Cheng-Wen Cheng, Jonas Rabin:

Synthesis of Decision Rules. 404-406
- George S. Fishman:

Sampling from the Gamma Distribution on a Computer. 407-409
- Kurt Maly:

Compressed Tries. 409-415
- Warren Burton:

A Buddy System Variation for Disk Storage Allocation. 416-417
- Gaston H. Gonnet:

Heaps Applied to Event Driven Mechanisms. 417-418
Volume 19, Number 8, August 1976
- John J. Donovan:

Tools and Philosophy for Software Education. 430-436
- Robert D. Tennent:

The Denotational Semantics of Programming Languages. 437-453
- James H. Clark:

Designing Surfaces in 3-D. 454-460
- Michael A. Harrison, Walter L. Ruzzo

, Jeffrey D. Ullman:
Protection in Operating Systems. 461-471
- Daniel S. Hirschberg:

An Insertion Technique for One-Sided Height-Balanced Trees. 471-473
Volume 19, Number 9, September 1976
- Philip Wadler:

Analysis of an Algorithm for Real Time Garbage Collection. 491-500 - Chee-Keng Yap:

New Upper Bounds for Selection. 501-508 - Michael C. Loui:

Weighted Derivation Trees. 509-513
- Kenneth G. Walter:

Recursion Analysis for Compiler Optimization. 514-516
- James R. Bitner, Gideon Ehrlich, Edward M. Reingold:

Efficient Generation of the Binary Reflected Gray Code and Its Applications. 517-521 - L. Peter Deutsch, Daniel G. Bobrow:

An Efficient, Incremental, Automatic Garbage Collector. 522-526 - Ben Wegbreit:

Faster Retrieval from Context Trees. 526-529
Volume 19, Number 10, October 1976
- Udo W. Pooch:

Papers from SIGGRAPH 76 - Introduction. 541 - James F. Blinn, Martin E. Newell:

Texture and Reflection in Computer Generated Images. 542-547 - James H. Clark:

Hierarchical Geometric Models for Visible Surface Algorithms. 547-554 - Joshua Levin:

A Parametric Algorithm for Drawing Pictures of Solid Objects Composed of Quadric Surfaces. 555-563 - Nestor Burtnyk, Marceli Wein:

Interactive Skeleton Techniques for Enhancing Motion Dynamics in Key Frame Animation. 564-569
- James W. Frane:

The BMD and BMDP Series of Statistical Computer Programs. 570-576
- C. Duong-Kien, Hans-Jürgen Hoffmann, D. Muth:

An Improvement to Martin's Algorithm for Computation of Linear Precedence Functions. 576-577
- Richard G. Montanelli Jr., Sandra A. Mamrak:

The Status of Women and Minorities in Academic Computer Science. 578-581
Volume 19, Number 11, November 1976
- Douglas T. Ross:

Homilies for Humble Standards. 595-600 - Henry F. Ledgard, William C. Cave:

Cobol Under Control. 601-608
- Thomas R. Wilcox, Alan M. Davis, Michael H. Tindall:

The Design and Implementation of a Table Driven, Interactive Diagnostic Programming System. 609-616
- Frank Rubin:

Experiments in Text File Compression. 617-623
- Kapali P. Eswaran, Jim Gray, Raymond A. Lorie, Irving L. Traiger:

The Notions of Consistency and Predicate Locks in a Database System. 624-633 - K. Maruyama, Stephen E. Smith:

Optimal Reorganization of Distributed Space Disk Files. 634-642
- Richard G. Hamlet:

High-Level Binding with Low-Level Linkers. 642-644
Volume 19, Number 12, December 1976
- Jean E. Sammet:

Roster of Programming Languages for 1974-75. Commun. ACM 19(12): 655-669 (1976) - Bruce W. Arden:

The Computer Science and Engineering Research Study (COSERS). 670-673
- Jay F. Nunamaker Jr., Benn R. Konsynski, Thomas Ho, Carl Singer:

Computer-Aided Analysis and Design of Information Systems. 674-687
- George C. Stockman, Laveen N. Kanal, M. C. Kyle:

Structural Pattern Recognition Of Carotid Pulse Waves Using A General Waveform Parsing System. 688-695

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














