


default search action
Communications of the ACM (CACM), Volume 28, 1985
Volume 28, Number 1, January 1985
- Peter J. Denning:

Special Section on Computer Architecture - Introduction. Commun. ACM 28(1): 6-7 (1985) - David A. Patterson:

Reduced Instruction Set Computers. 8-21 - Charles L. Seitz:

The Cosmic Cube. 22-33 - John R. Gurd, Chris C. Kirkham, Ian Watson:

The Manchester Prototype Dataflow Computer. 34-52
- Jean E. Sammet, Robert W. Rector:

In Recognition of the 25th Anniversary of Computing Reviews. 53-68 - Jack Minker:

Computer Professionals Whose Scientific Freedom and Human Right Have Been Violated - 1984: A report of the ACM Commitee on Scientific Freedom and Human Rights. 69-78
- R. E. Berry, B. A. E. Meekings:

A Style Analysis of C Programs. 80-88 - John C. Nash:

Design and Implementation of a Very Small Linear Algebra Program Package. 89-94
- Susan M. Merritt:

An Inverted Taxonomy of Sorting Algorithms. 96-99
Volume 28, Number 2, February 1985
- Jon Louis Bentley:

Tricks of the Trade. 138-141
- Phillip Ein-Dor:

Grosch's Law Re-Revisited: CPU Power and the Cost of Computation. 142-151 - Ronald S. Lemos:

Rating the Major Computing Periodicals on Readability. 152-157
- Niklaus Wirth:

From Programming Language Design to Computer Construction. 159-164
- Bernhard C. Reimann, Allan D. Waren:

User-Oriented Criteria for the Selection of DSS Software. 166-179 - Stephen Jose Hanson, Richard R. Rosinski:

Programmer Perceptions of Productivity and Programming Tools. 180-189
- C. Michael Overstreet, Richard E. Nance:

A Specification Language to Assist in Analysis of Discrete Event Simulation Models. 190-201 - Daniel Dominic Sleator, Robert Endre Tarjan:

Amortized Efficiency of List Update and Paging Rules. 202-208
Volume 28, Number 3, March 1985
- Jon Louis Bentley:

Thanks, Heaps. 245-250
- James Martin, Philip A. Bernstein, Peter J. Denning, Michael L. Dertouzos, Leonard Kleinrock:

Computer Science Education Today: A Dialogue. 251-262 - D. F. Butcher, W. A. Muth:

Predicting Performance in an Introductory Computer Science Course. 263-268
- A. Joe Turner:

Computer Science in Secondary Schools: Curriculum and Teacher Certification. 269-279
- Ian H. Witten

, Bob Bramwell:
A System for Interactive Viewing of Structured Documents. 280-288 - David C. Blair, Melvin Earl Maron:

An Evaluation of Retrieval Effectiveness for a Full-Text Document-Retrieval System. 289-299
- John D. Gould, Clayton Lewis:

Design for Usability: Key Principles and What Designers Think. 300-311 - Haim Mendelson:

Pricing Computer Services: Queueing Effects. 312-321
Volume 28, Number 4, April 1985
- Stephen Wolfram:

Special Section on Computing at the Frontiers of Theoretical Physics - Introduction. Commun. ACM 28(4): 352-353 (1985) - W. David Arnett:

Computational Astrophysics. 354-357 - Benny Lautrup:

Monte Carlo Methods in Theoretical High-Energy Physics. 358-362 - Scott Kirkpatrick, Robert H. Swendsen

:
Statistical Mechanics and Disordered Systems. 363-373 - David K. Campbell

, Jim Crutchfield, Doyne Farmer, Erica Jen:
Experimental Mathematics: The Role of Computation in Nonlinear Science. 374-384 - Robert B. Pearson, John L. Richardson, Doug Toussaint:

Special-Purpose Processors in Theoretical Physics. 385-389 - Stephen Wolfram:

Symbolic Mathematical Computation. 390-394
- Roger L. Wainwright:

A Class of Sorting Algorithms Based on Quicksort. 396-403
- Jon Louis Bentley, Catherine C. McGeoch:

Amortized Analyses of Self-Organizing Sequential Search Heuristics. 404-411 - Marek Kubale, Boguslaw Jackowski:

A Generalized Implicit Enumeration Algorithm for Graph Coloring. 412-418
Volume 28, Number 5, May 1985
- Jon Louis Bentley:

A Spelling Checker. 456-462
- Michael Conrad:

On Design Princiles for a Modular Computer. 464-480 - Jane P. Devlin, William A. Lowell, Anne E. Alger:

Self-Assessment Procedure XIV: A Self-Assessment Procedure Dealing with the Legal Issues of Computing. 481-488
- John Tartar:

The 1984 Snowbird Report: Future Issues in Computer Science. 490-493
- Tor Guimaraes:

A Study of Application Program Development Techniques. 494-499 - Jack Gostl, Irwin Greenberg:

An Application of Queuing Theory to the Design of a Message-Switching Computer System. 500-505 - R. R. Oldehoeft, Stephen J. Allan:

Adaptive Exact-Fit Storage Management. 506-511
- Nicholas P. Vitalari, Alladi Venkatesh, Kjell Grønhaug:

Computing in the Home: Shifts in the Time Allocation Patterns of Households. 512-522 - Thomas J. Sager:

A Polynomial Time Generator for Minimal Perfect Hash Functions. 523-532
Volume 28, Number 6, June 1985
- Jon Louis Bentley:

Associative Arrays. 570-576
- Karen A. Frenkel:

Toward Automating the Software-Development Cycle. 578-589 - Pierre-Jacques Courtois:

On Time and Space Decomposition of Complex Structures. 590-603
- John Beidler, Richard H. Austing, Lillian N. Cassel:

Computing Programs in Small Colleges. 605-611
- David R. McIntyre, Michael A. Pechura:

Data Compression Using Static Huffman Code-Decode Tables. 612-616 - Leonard J. Bass:

A Generalized User Interface for Application Programs (II). 617-627
- Alan W. Biermann, Robert D. Rodman, David C. Rubin, J. Francis Heidlage:

Natural Language with Discrete Speech as a Mode for Human-to-Machine Communication. 628-636 - Shimon Even, Oded Goldreich

, Abraham Lempel:
A Randomized Protocol for Signing Contracts. 637-647
Volume 28, Number 7, July 1985
- Jon Louis Bentley:

Confessions of a Coder. 671-679
- Starr Roxanne Hiltz, Murray Turoff:

Structuring Computer-Mediated Communication Systems to Avoid Information Overload. 680-689 - Mark Stefik:

Strategic Computing at DARPA: Overview and Assessment. 690-704
- Robert Papsdorf:

A Prescription for Computer Anxiety - Review of John Shore's "The Sachertorte Algorithm". 704-706
- John A. Mills:

A Pragmatic View of the System Architect. 708-717 - Václav Rajlich:

Paradigms for Design and Implementation in Ada. 718-727
- Kenneth C. Laudon:

Environmental and Institional Models of System Development: A National Criminal History System. 728-740 - W. David Kelton:

Transient Exponential-Erlang Queues and Steady-State Simulation. 741-749
Volume 28, Number 8, August 1985
- David K. Gifford, Alfred Z. Spector:

The Cirrus Banking Network. 797-807
- Karen A. Frenkel:

Report on the Microelectronics and Computer Technology Corporation Conference. 808-813 - Elliot B. Koffman, David W. Stemple, Caroline E. Wardle:

Recommended Curriculum For CS2, 1984. 815-818
- J. M. Shearer, Michael A. Wolfe:

ALGLIB, A Simple Symbol-Manipulation Package. 820-825 - Henry C. Smith:

Database Design: Composing Fully Normalized Tables from a Rigorous Dependency Diagram. 826-838
- Dianne P. O'Leary, G. W. Stewart:

Data-Flow Algorithms for Parallel Matrix Computations. 840-853 - Lawrence L. Larmore, Daniel S. Hirschberg:

Efficient Optimal Pagination of Scrolls. 854-856
Volume 28, Number 9, September 1985
- Jon Louis Bentley:

Bumper-Sticker Computer Science. Commun. ACM 28(9): 896-901 (1985)
- Peter Friedland:

Special Section on Architectures for Knowledge-Based Systems - Introduction. 902-903 - Richard Fikes, Tom Kehler:

The Role of Frame-Based Representation in Reasoning. 904-920 - Frederick Hayes-Roth:

Rule-Based Systems. 921-932 - Michael R. Genesereth, Matthew L. Ginsberg:

Logic Programming. 933-941
- Jürg Gutknecht:

Concepts of the Text Editor Lara. 942-960 - Gerard D. Finn:

Extended Use of Null Productions in LR(1) Parser Applications. 961-972
- Hanan Samet:

Data Structures for Quadtree Approximation and Compression. 973-993 - James R. Slagle, Henry Hamburger:

An Expert System for a Resource Allocation Problem. 994-1004
Volume 28, Number 10, October 1985
- David Chaum:

Security Without Identification: Transaction Systems to Make Big Brother Obsolete. 1030-1044 - Gad Ariav, Michael J. Ginzberg:

DSS Design: A Systemic View of Decision Support. 1045-1052
- Robert Mandl:

Orthogonal Latin Squares: An Application of Experiment Design to Compiler Testing. 1054-1058 - Bo Ingvar Sandén:

Systems Programming with JSP: Example - A VDU Controller. 1059-1067
- R. M. Norton, D. P. Yeager:

A Probability Model for Overflow Sufficiency in Small Hash Tables. 1068-1075 - Raj Jain

, Imrich Chlamtac:
The P² Algorithm for Dynamic Calculation of Quantiiles and Histograms Without Storing Observations. 1076-1085
Volume 28, Number 11, November 1985
- Jon Louis Bentley:

Selection. 1121-1127
- Peter J. Denning, Michael C. Mulder:

Computing in the Frontiers of Science and Engineering - Introduction. Commun. ACM 28(11): 1128-1129 (1985) - Michael R. Raugh:

Modeling California Earthquakes and Earth Structures. 1130-1150 - D. Kent Cullers, Ivan R. Linscott, Bernhard M. Oliver:

Signal Processing in SETI. 1151-1163 - Peter Friedland, Laurence H. Kedes:

Discovering the Secrets of DNA. 1164-1186 - Alan B. Chambers, David C. Nagel:

Pilots of the Future: Human or Computer? 1187-1199 - Leonard Kleinrock:

Distributed Systems. 1200-1213 - Edward Balkovich, Steven Lerman, Richard P. Parmelee:

Computing in Higher Education: The Athena Experience. 1214-1224 - Joel S. Birnbaum:

Towards the Domestication of Microelectronics. 1225-1235
Volume 28, Number 12, December 1985
- Alain Colmerauer:

Prolog in 10 Figures. 1296-1310 - Jacques Cohen:

Describing Prolog by Its Interpretation and Compilation. 1311-1324
- David Lorge Parnas:

Software Aspects of Strategic Defense Systems. 1326-1335
- Gordon V. Cormack:

Data Compression on a Database System. 1336-1342
- James D. McKeen, Tor Guimaraes:

Selecting MIS Projects By Steering Commitee. 1344-1352

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














