default search action
Communications of the ACM (CACM), Volume 28, 1985
Volume 28, Number 1, January 1985
- Peter J. Denning:
Special Section on Computer Architecture - Introduction. Commun. ACM 28(1): 6-7 (1985) - David A. Patterson:
Reduced Instruction Set Computers. 8-21 - Charles L. Seitz:
The Cosmic Cube. 22-33 - John R. Gurd, Chris C. Kirkham, Ian Watson:
The Manchester Prototype Dataflow Computer. 34-52
- Jean E. Sammet, Robert W. Rector:
In Recognition of the 25th Anniversary of Computing Reviews. 53-68 - Jack Minker:
Computer Professionals Whose Scientific Freedom and Human Right Have Been Violated - 1984: A report of the ACM Commitee on Scientific Freedom and Human Rights. 69-78
- R. E. Berry, B. A. E. Meekings:
A Style Analysis of C Programs. 80-88 - John C. Nash:
Design and Implementation of a Very Small Linear Algebra Program Package. 89-94
- Susan M. Merritt:
An Inverted Taxonomy of Sorting Algorithms. 96-99
Volume 28, Number 2, February 1985
- Jon Louis Bentley:
Tricks of the Trade. 138-141
- Phillip Ein-Dor:
Grosch's Law Re-Revisited: CPU Power and the Cost of Computation. 142-151 - Ronald S. Lemos:
Rating the Major Computing Periodicals on Readability. 152-157
- Niklaus Wirth:
From Programming Language Design to Computer Construction. 159-164
- Bernhard C. Reimann, Allan D. Waren:
User-Oriented Criteria for the Selection of DSS Software. 166-179 - Stephen Jose Hanson, Richard R. Rosinski:
Programmer Perceptions of Productivity and Programming Tools. 180-189
- C. Michael Overstreet, Richard E. Nance:
A Specification Language to Assist in Analysis of Discrete Event Simulation Models. 190-201 - Daniel Dominic Sleator, Robert Endre Tarjan:
Amortized Efficiency of List Update and Paging Rules. 202-208
Volume 28, Number 3, March 1985
- Jon Louis Bentley:
Thanks, Heaps. 245-250
- James Martin, Philip A. Bernstein, Peter J. Denning, Michael L. Dertouzos, Leonard Kleinrock:
Computer Science Education Today: A Dialogue. 251-262 - D. F. Butcher, W. A. Muth:
Predicting Performance in an Introductory Computer Science Course. 263-268
- A. Joe Turner:
Computer Science in Secondary Schools: Curriculum and Teacher Certification. 269-279
- Ian H. Witten, Bob Bramwell:
A System for Interactive Viewing of Structured Documents. 280-288 - David C. Blair, M. E. Maron:
An Evaluation of Retrieval Effectiveness for a Full-Text Document-Retrieval System. 289-299
- John D. Gould, Clayton Lewis:
Design for Usability: Key Principles and What Designers Think. 300-311 - Haim Mendelson:
Pricing Computer Services: Queueing Effects. 312-321
Volume 28, Number 4, April 1985
- Stephen Wolfram:
Special Section on Computing at the Frontiers of Theoretical Physics - Introduction. Commun. ACM 28(4): 352-353 (1985) - W. David Arnett:
Computational Astrophysics. 354-357 - Benny Lautrup:
Monte Carlo Methods in Theoretical High-Energy Physics. 358-362 - Scott Kirkpatrick, Robert H. Swendsen:
Statistical Mechanics and Disordered Systems. 363-373 - David Campbell, Jim Crutchfield, Doyne Farmer, Erica Jen:
Experimental Mathematics: The Role of Computation in Nonlinear Science. 374-384 - Robert B. Pearson, John L. Richardson, Doug Toussaint:
Special-Purpose Processors in Theoretical Physics. 385-389 - Stephen Wolfram:
Symbolic Mathematical Computation. 390-394
- Roger L. Wainwright:
A Class of Sorting Algorithms Based on Quicksort. 396-403
- Jon Louis Bentley, Catherine C. McGeoch:
Amortized Analyses of Self-Organizing Sequential Search Heuristics. 404-411 - Marek Kubale, Boguslaw Jackowski:
A Generalized Implicit Enumeration Algorithm for Graph Coloring. 412-418
Volume 28, Number 5, May 1985
- Jon Louis Bentley:
A Spelling Checker. 456-462
- Michael Conrad:
On Design Princiles for a Modular Computer. 464-480 - Jane P. Devlin, William A. Lowell, Anne E. Alger:
Self-Assessment Procedure XIV: A Self-Assessment Procedure Dealing with the Legal Issues of Computing. 481-488
- John Tartar:
The 1984 Snowbird Report: Future Issues in Computer Science. 490-493
- Tor Guimaraes:
A Study of Application Program Development Techniques. 494-499 - Jack Gostl, Irwin Greenberg:
An Application of Queuing Theory to the Design of a Message-Switching Computer System. 500-505 - R. R. Oldehoeft, Stephen J. Allan:
Adaptive Exact-Fit Storage Management. 506-511
- Nicholas P. Vitalari, Alladi Venkatesh, Kjell Grønhaug:
Computing in the Home: Shifts in the Time Allocation Patterns of Households. 512-522 - Thomas J. Sager:
A Polynomial Time Generator for Minimal Perfect Hash Functions. 523-532
Volume 28, Number 6, June 1985
- Jon Louis Bentley:
Associative Arrays. 570-576
- Karen A. Frenkel:
Toward Automating the Software-Development Cycle. 578-589 - Pierre-Jacques Courtois:
On Time and Space Decomposition of Complex Structures. 590-603
- John Beidler, Richard H. Austing, Lillian N. Cassel:
Computing Programs in Small Colleges. 605-611
- David R. McIntyre, Michael A. Pechura:
Data Compression Using Static Huffman Code-Decode Tables. 612-616 - Leonard J. Bass:
A Generalized User Interface for Application Programs (II). 617-627
- Alan W. Biermann, Robert D. Rodman, David C. Rubin, J. Francis Heidlage:
Natural Language with Discrete Speech as a Mode for Human-to-Machine Communication. 628-636 - Shimon Even, Oded Goldreich, Abraham Lempel:
A Randomized Protocol for Signing Contracts. 637-647
Volume 28, Number 7, July 1985
- Jon Louis Bentley:
Confessions of a Coder. 671-679
- Starr Roxanne Hiltz, Murray Turoff:
Structuring Computer-Mediated Communication Systems to Avoid Information Overload. 680-689 - Mark Stefik:
Strategic Computing at DARPA: Overview and Assessment. 690-704
- Robert Papsdorf:
A Prescription for Computer Anxiety - Review of John Shore's "The Sachertorte Algorithm". 704-706
- John A. Mills:
A Pragmatic View of the System Architect. 708-717 - Václav Rajlich:
Paradigms for Design and Implementation in Ada. 718-727
- Kenneth C. Laudon:
Environmental and Institional Models of System Development: A National Criminal History System. 728-740 - W. David Kelton:
Transient Exponential-Erlang Queues and Steady-State Simulation. 741-749
Volume 28, Number 8, August 1985
- David K. Gifford, Alfred Z. Spector:
The Cirrus Banking Network. 797-807
- Karen A. Frenkel:
Report on the Microelectronics and Computer Technology Corporation Conference. 808-813 - Elliot B. Koffman, David W. Stemple, Caroline E. Wardle:
Recommended Curriculum For CS2, 1984. 815-818
- J. M. Shearer, Michael A. Wolfe:
ALGLIB, A Simple Symbol-Manipulation Package. 820-825 - Henry C. Smith:
Database Design: Composing Fully Normalized Tables from a Rigorous Dependency Diagram. 826-838
- Dianne P. O'Leary, G. W. Stewart:
Data-Flow Algorithms for Parallel Matrix Computations. 840-853 - Lawrence L. Larmore, Daniel S. Hirschberg:
Efficient Optimal Pagination of Scrolls. 854-856
Volume 28, Number 9, September 1985
- Jon Louis Bentley:
Bumper-Sticker Computer Science. Commun. ACM 28(9): 896-901 (1985)
- Peter Friedland:
Special Section on Architectures for Knowledge-Based Systems - Introduction. 902-903 - Richard Fikes, Tom Kehler:
The Role of Frame-Based Representation in Reasoning. 904-920 - Frederick Hayes-Roth:
Rule-Based Systems. 921-932 - Michael R. Genesereth, Matthew L. Ginsberg:
Logic Programming. 933-941
- Jürg Gutknecht:
Concepts of the Text Editor Lara. 942-960 - Gerard D. Finn:
Extended Use of Null Productions in LR(1) Parser Applications. 961-972
- Hanan Samet:
Data Structures for Quadtree Approximation and Compression. 973-993 - James R. Slagle, Henry Hamburger:
An Expert System for a Resource Allocation Problem. 994-1004
Volume 28, Number 10, October 1985
- David Chaum:
Security Without Identification: Transaction Systems to Make Big Brother Obsolete. 1030-1044 - Gad Ariav, Michael J. Ginzberg:
DSS Design: A Systemic View of Decision Support. 1045-1052
- Robert Mandl:
Orthogonal Latin Squares: An Application of Experiment Design to Compiler Testing. 1054-1058 - Bo Ingvar Sandén:
Systems Programming with JSP: Example - A VDU Controller. 1059-1067
- R. M. Norton, D. P. Yeager:
A Probability Model for Overflow Sufficiency in Small Hash Tables. 1068-1075 - Raj Jain, Imrich Chlamtac:
The P² Algorithm for Dynamic Calculation of Quantiiles and Histograms Without Storing Observations. 1076-1085
Volume 28, Number 11, November 1985
- Jon Louis Bentley:
Selection. 1121-1127
- Peter J. Denning, Michael C. Mulder:
Computing in the Frontiers of Science and Engineering - Introduction. Commun. ACM 28(11): 1128-1129 (1985) - Michael R. Raugh:
Modeling California Earthquakes and Earth Structures. 1130-1150 - D. Kent Cullers, Ivan R. Linscott, Bernhard M. Oliver:
Signal Processing in SETI. 1151-1163 - Peter Friedland, Laurence H. Kedes:
Discovering the Secrets of DNA. 1164-1186 - Alan B. Chambers, David C. Nagel:
Pilots of the Future: Human or Computer? 1187-1199 - Leonard Kleinrock:
Distributed Systems. 1200-1213 - Edward Balkovich, Steven Lerman, Richard P. Parmelee:
Computing in Higher Education: The Athena Experience. 1214-1224 - Joel S. Birnbaum:
Towards the Domestication of Microelectronics. 1225-1235
Volume 28, Number 12, December 1985
- Alain Colmerauer:
Prolog in 10 Figures. 1296-1310 - Jacques Cohen:
Describing Prolog by Its Interpretation and Compilation. 1311-1324
- David Lorge Parnas:
Software Aspects of Strategic Defense Systems. 1326-1335
- Gordon V. Cormack:
Data Compression on a Database System. 1336-1342
- James D. McKeen, Tor Guimaraes:
Selecting MIS Projects By Steering Commitee. 1344-1352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.