


default search action
Communications of the ACM (CACM), Volume 27, 1984
Volume 27, Number 1, January 1984
- Gerald M. Berns:

Assessing Software Maintainability. 14-23 - John W. Geils:

Why Students Reject Engineering Teching Careers. 25-27 - Robert I. Winner, Edward M. Carter:

Self-Assessment Procedure XII: A Self-Assessment Procedure Dealing with Computer Architecture. 29-36
- Peter J. L. Wallis, Brian A. Wichmann:

Requirements Analysis for Ada Compilers. 37-41 - Victor R. Basili, Barry T. Perricone:

Software Errors and Complexity: An Empirical Investigation. 42-52
- Paul Pritchard:

Some Negative Results Concerning Prime Number Generators. 53-57 - Henry C. Lucas Jr.:

Organizational Power and the Information Services Department. 58-65
Volume 27, Number 2, February 1984
- Jon Louis Bentley:

Code Tuning. Commun. ACM 27(2): 91-96 (1984)
- Brian A. Wichmann:

Is Ada Too Big? A designer Answers the Critics. 98-103 - Pamela Zave:

The Operational versus the Conventional Approach to Software Development. 104-118
- Gordon E. Anderson:

The Coordinated Use of Five Performance Evaluation Methodologies. 119-125 - Raymond C. Houghton Jr.:

Online Help Systems: A Conspectus. 126-133
- Eric C. R. Hehner:

Predicative Programming, Part I. 134-143 - Eric C. R. Hehner:

Predicative Programming, Part II. 144-151 - Nicola Santoro

:
Chain Multiplication of Matrices of Approximately or Exactly the Same Size. 152-156
Volume 27, Number 3, March 1984
- Jon Louis Bentley:

The Back of the Envelope. 180-184
- Gene Dallaire, Fortney H. Stark, Hal Berghel:

Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools? 185-194 - Jean B. Rogers, David G. Moursund, Gerald L. Engel:

Preparing Precollege Teachers for the Computer Age. 195-200 - Robert W. Blanning:

Conversing with Management Information Systems in Natural Language. 201-207 - Thomas A. D'Auria:

ACM's Visit to The People's Republic of China. 208-214
- Paul J. Jalics:

COBOL vs. PL/1: Some Performance Comparisons. 216-221 - Gerald P. Bozman:

The Software Lookaside Buffer Reduces Search Overhead with Linked Lists. 222-227
- Dov Dori

, Moshe Ben-Bassat:
Efficient Nesting of Congruent Convex Figures. 228-235 - T. Y. Zhang, Ching Y. Suen:

A Fast Parallel Algorithm for Thinning Digital Patterns. 236-239 - George Diehr, Bruce Faaland:

Optimal Pagination of B-Trees with Variable-Length Items. 241-247 - Markku Tamminen:

Comment on Quad- and Octtrees. 248-249
Volume 27, Number 4, April 1984
- Jon Louis Bentley:

How to Sort. Commun. ACM 27(4): 287-291 (1984)
- Gene Dallaire:

American Universities Need Greater Access to Supercomputers. 293-298 - Edward F. Hayes:

Access to Supercomputers: An NSF Perspective (Interview). 299-303 - Lotfi A. Zadeh:

Coping with the Imprecision of the Real World (Interview). 304-311 - Peter J. Denning, Donn B. Parker, Susan H. Nycum, Willis H. Ware:

Computers, Crime and Privacy - A National Dilema, Congressional Testimony from the Industry. 312-321 - Allen B. Tucker:

A Perspective on Machine Translation: Theory and Practice. 322-329 - Michael C. Mulder, John F. Dalphin:

Computer Science Program Requirements and Accreditation, An Interim Report of the ACM/IEEE Computer Society Joint Task Force. 330-335 - Jean E. Sammet, Bernard Rous

:
Progress Report on the ACM Guide to Computing Literature. 336-341
- Peter G. Neumann:

A Further View of the First Quarter Century, Introduction to the April 1984 Special Section. 343 - Donald E. Knuth:

The Complexity of Songs (April 1984 Special Section). 344-348 - R. Lawrence Clark:

A Linuistic Contribution to Goto-Less Programming (April 1984 Special Section). 349-350 - Preet J. Nedginn, Trebor L. Bworn:

CLOG: An Ada Package for Automatic Footnote Generation in UNIX (April 1984 Special Section). 351 - P. J. Brown:

Languages: Three Interviews (April 1984 Special Section). 352-355 - J. B. Cadwallader-Cohen, W. W. Zysic, R. B. Donnelly:

The Chaostron: An Important Advance in Learning Machines (April 1984 Special Section). 356-357
- Joseph J. Pollock, Antonio Zamora

:
Automatic Spelling Correction in Scientific and Scholary Text. 358-368 - David C. Blair:

The Data-Document Distinction in Information Retrieval. 369-374
- Izak Benbasat, Yair Wand:

Command Abbreviation Behavior in Human-Computer Interaction. 376-383 - C. C. Chang:

The Study of an Ordered Minimal Perfect Hashing Scheme. 384-387 - Dorothy E. Denning:

Digital Signatures with RSA and Other Public-Key Cryptosystems. 388-392 - Ronald L. Rivest, Adi Shamir:

How to Expose an Eavesdropper. 393-395
Volume 27, Number 5, May 1984
- Jon Louis Bentley:

Squeezing Space. Commun. ACM 27(5): 416-421 (1984)
- Robert L. Graham:

The Legal Protection of Computer Software. 422-426 - Richard V. Giddings:

Accommodating Uncertainty in Software Design. 428-434 - Gopal K. Gupta:

Self-Assessment Procedure XIII: A Self-Assessment Procedure Dealing with Binary Trees and B-Trees. 435-443
- Ben Tsutom Wada:

A Virtual Memory System for Picture Processing. 444-454 - Gerard D. Finn:

An Algorithm for Optimized Boolean Evaluation in Information Management Systems. 455-464
- John Leslie King, Kenneth L. Kraemer:

Evolution and Organizational Information Systems: An Assessment of Nolan's Stage Model. 466-475 - Izak Benbasat, Albert S. Dexter, Donald H. Drury, Robert C. Goldstein:

A Critique of the Stage Hypothesis: Theory and Empirical Evidence. 476-485 - Richard A. Becker, John M. Chambers:

Design of the S System for Data Analysis. 486-495
Volume 27, Number 6, June 1984
- Jon Louis Bentley:

Graphic Output. 529-536
- Gene Dallaire, John Shattuck, Richard P. Kusserow:

Computer Matching: Should It Be Banned? 537-545 - Larry Fujitani:

Laser Optical Disk: The Coming Revolution in On-Line Storage. 546-554
- Maryam Alavi:

An Assessment of the Prototyping Approach to Information Systems Development. 556-563 - Anthony I. Hinxman:

Updating a Database in an Unsafe Environment. 564-566 - Ephraim P. Glinert, Richard E. Ladner

:
A Large Font Virtual Terminal Interface, A Software Prothesis for Visually Impaired. 567-572
- Robert Wilensky, Yigal Arens, David N. Chin:

Talking to UNIX in English: An Overview of UC. 574-593 - Ten-Hwang Lai, Sartaj Sahni:

Anomalies in Parallel Branch-and-Bound Algorithms. 594-602
Volume 27, Number 7, July 1984
- Jon Louis Bentley:

Updates. Commun. ACM 27(7): 630-636 (1984)
- Rosalie Steier:

An MCC Update. 636-637 - Andries van Dam:

Computer Graphics Comes of Age (Interview). 638-648 - David K. Gifford, Alfred Z. Spector:

The TWA Reservation System. 649-665
- Per-Åke Larson, Ajay Kajla:

File Organization: Implementation of a Method Guaranteeing Retrieval in One Access. 670-677 - John Kaunitz, Louis van Ekert:

Audit Trail Compaction for Database Recovery. 678-683
- Robert B. Tilove:

A Null-Object Detection Algorithm for Constructive Solid Geometry. 684-694 - Hsi Chang, S. Sitharama Iyengar

:
Efficient Algorithms to Globally Balance a Binary Search Tree. 695-702 - Jeffrey Scott Vitter

:
Faster Methods for Random Sampling. 703-718
Volume 27, Number 8, August 1984
- Yair M. Babad, Jeffrey A. Hoffer:

Even no Data has a Value. 748-756
- Dennis Ritchie:

Reflections on Software Research. 758-760 - Ken Thompson:

Reflections on Trusting Trust. 761-763
- Nazim H. Madhavji:

Visibility Aspects of Programmed Dyamic Data Structures. 764-776 - James A. Haskett:

Pass-Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms. 777-781 - Douglas W. Jones:

Improved Interpretation of UNIX-Like File Names Embedded in Data. 782-784 - Harry M. Markowitz, Ashok Malhotra, Donald P. Pazel:

The EAS-E Application Development System: Principles and Language Summary. 785-799
- John M. Carroll

, Caroline Carrithers:
Training Wheels in a User Interface. 800-806 - D. R. K. Brownrigg:

The Weighted Median Filter. 807-818 - D. Julian M. Davies:

Memory Occupancy Patterns in Garbage Collection Systems. 819-825 - Lee L. Gremillion:

Determinants of Program Repair Maintenance Requirements. 826-832
Volume 27, Number 9, September 1984
- Jon Louis Bentley:

Algorithm Design Techniques. Commun. ACM 27(9): 865-871 (1984)
- David K. Gifford, Alfred Z. Spector:

The Space Shuttle Primary Computer System. 872-900
- Edward Ng, Paul B. Schneck:

Introduction to the Special Section on Computing in Space. Commun. ACM 27(9): 901 (1984) - Charles E. Trevathan, Thomas D. Taylor, Raymond G. Hartenstein, Ann C. Merwarth, William N. Stewart:

Development and Application of NASA's First Standard Spacecraft Computer. 902-913 - William A. Madden, Kyle Y. Rone:

Design, Development, Integration: Space Shuttle Primary Flight Software System. 914-925 - Gene D. Carlow:

Architecture of the Space Shuttle Primary Avionics Software System. 926-936
- Hassan Gomaa:

A Software Design Method for Real-Time Systems. 938-949
- Tim Maude, Derwent Maude:

Hardware Protection Against Software Piracy. 950-959
Volume 27, Number 10, October 1984
- Jean Ichbiah:

Ada: Past, Present, Future, An Interview with Jean Ichbiah, the Principle Designer of Ada. 990-997 - Elliot B. Koffman, Philip L. Miller, Caroline E. Wardle:

Recommended Curriculum for CS1, 1984. 998-1001 - Anthony Ralston:

The First Course in Computer Science Needs a Mathematics Corequisite. 1002-1005
- Robert L. Ashenhurst:

A Conference on Information Law and Ethics. 1006-1007
- C. Mani Krishna, Kang G. Shin, Yann-Hang Lee:

Optimization Criteria for Checkpoint Placement. 1008-1012 - Reinhold Weicker:

DHRYSTONE: A Synthetic Systems Programming Benchmark. 1013-1030
- Michael D. Good, John A. Whiteside, Dennis R. Wixon, Sandra J. Jones:

Building a User-Derived Interface. 1032-1043 - Robert Marcus:

An Application of Artificial Intelligence to Operations Research. 1044-1047
Volume 27, Number 11, November 1984
- Jon Louis Bentley:

Perspective on Performance. 1087-1092
- Patricia F. Campbell, George P. McCabe:

Predicting the Success of Freshmen in a Computer Science Major. 1108-1113 - Walter M. Mathews, Kaye Reifers:

The Computer in Cartoons: A Retrospective from the Saturday Review. 1114-1119
- Robert S. Arnold, Norman F. Schneidewind, Nicholas Zvegintzov:

A Software Maintenance Workshop. 1120-1121
- Larry R. Medsker:

An Interactive Decision Support System for Energy Policy Analysis. 1122-1128 - James V. Hansen, William F. Messier:

A Relational Approach to Decision Support for EDP Auditing. 1129-1133
- Leslie G. Valiant:

A Theory of the Learnable. 1134-1142 - Timothy J. Hickey, Jacques Cohen:

Performance Analysis of On-the-Fly Garbage Collection. 1143-1154
Volume 27, Number 12, December 1984
- Jon Louis Bentley:

A Little Program, A Lot of Fun. 1179-1182
- Gordon B. Davis:

Selected Papers from the Fifth International Conference on Information Systems - Introduction. 1183 - Paul Attewell, James Rule:

Computing and Organizations: What We Know and What We Don't Know. 1184-1192 - Blake Ives

, Gerard P. Learmonth:
The Information System as a Competitive Weapon. 1193-1201 - Charles R. Franz, Daniel Robey:

An Investigation of User-Led System Design: Rational and Political Perspectives. 1202-1209 - Jon Turner:

Computer Mediated Work: The Interplay Between Technology and Structured Jobs. 1210-1217 - Rob Kling, Suzanne Iacono:

The Control of Information Systems Developments After Implementation. 1218-1226
- John D. Litke:

An Improved Solution to the Traveling Salesman Problem with Thousands of Nodes. 1227-1236 - Richard B. Wilmot:

Foreign Keys Decrease Adaptability of Database Designs. 1237-1243

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














