Last update:
Tue Oct 1 06:53:16 MDT 2024
J. R. Herndon ACM Algorithm 49: Spherical Neumann Function . . . . . . . . . . . . . . . . 179
J. N. Merner ACM Algorithm 149: Complete Elliptic Integral . . . . . . . . . . . . . . . . 605
T. D. Arthurs ACM Algorithm 176: Least Squares Surface Fit . . . . . . . . . . . . . . . . . . 313 O. G. Ludwig ACM Algorithm 179: Incomplete Beta Ratio 314
A. P. Relph ACM Algorithm 191: Hypergeometric . . . 388--389
D. H. Thurnau ACM Algorithm 195: BANDSOLVE . . . . . . 441
R. H. Kase ACM Algorithm 219: Topological Ordering for Pert Networks . . . . . . . . . . . 738--739
W. Gautschi ACM Algorithm 222: Incomplete Beta Function Ratios . . . . . . . . . . . . 143--144
W. Gautschi ACM Algorithm 236: Bessel Functions of the First Kind [S17] . . . . . . . . . . 479--480
J. Boothroyd ACM Algorithm 246: Graycode . . . . . . 701 R. W. Floyd ACM Algorithm 245: Treesort 3 . . . . . 701
W. Gautschi ACM Algorithm 259: Legendre Functions for Arguments Larger than One . . . . . 488--492
M. C. Pike and I. D. Hill ACM Algorithm 266: Pseudo-Random Numbers 605--606
Walter Gautschi Algorithm 282: Derivatives of $e^x/x$, $\cos(x)/x$, and $\sin(x)/x$ . . . . . . 272--272
W. Fletcher ACM Algorithm 284: Interchange of Two Blocks of Data . . . . . . . . . . . . . 326
I. D. Hill and M. C. Pike ACM Algorithm 299: Chi-Squared Integral 243--244 J. H. Gunn ACM Algorithm 300: Coulomb Wave Functions . . . . . . . . . . . . . . . 244--245
K. M. Brown ACM Algorithm 316: Solution of Simultaneous Nonlinear Equations . . . . 728--729
R. J. Ord-Smith ACM Algorithm 323: Generation of Permutations in Lexicographic Order . . 117 G. Bayer ACM Algorithm 324: Maxflow . . . . . . . 117--118
Edsger Wybe Dijkstra Go to statement considered harmful . . . 147--148
B. F. W. Witte ACM Algorithm 332: Jacobi Polynomials 436--437 R. C. Salazar and S. K. Sen ACM Algorithm 333: Minit Algorithm For Linear Programming . . . . . . . . . . . 437--440
J. Grad and M. A. Brebner ACM Algorithm 343: Eigenvalues and Eigenvectors of a Real Generator Matrix 820--826
R. C. Singleton ACM Algorithm 347: An Efficient Algorithm for Sorting with Minimal Storage . . . . . . . . . . . . . . . . 185--187
ANSI Subcommittee X3J3 Clarification of Fortran Standards --- Initial Progress . . . . . . . . . . . . 289--294
D. S. Clemm ACM Algorithm 352: Characteristic Values and Associated Solutions of Mathieu's Differential Equation . . . . . . . . . 399--407 (or 399--406??)
N. Wirth On Multiprogramming, Machine Coding, and Computer Organization . . . . . . . . . 489--498 I. M. Leitch Certification of ACM Algorithm 323 [G6]: Generation of Permutations in Lexicographic Order . . . . . . . . . . 512--512
R. C. Singleton ACM Algorithm 357: An Efficient Prime Number Generator . . . . . . . . . . . . 563--564
W. Gautschi ACM Algorithm 363: Complex Error Function . . . . . . . . . . . . . . . . 635
T. C. Lowe Automatic segmentation of cyclic program structures based on connectivity and processor timing . . . . . . . . . . . . 3--6 Walter Gautschi and Bruce J. Klein Recursive computation of certain derivatives --- A study of error propagation . . . . . . . . . . . . . . 7--9 A. P. Mullery and G. C. Driscoll A processor allocation method for time-sharing . . . . . . . . . . . . . . 10--14 R. F. Simmons Natural Language Question-Answering Systems: 1969 . . . . . . . . . . . . . 15--30 E. T. Irons Experience with an extensible language 31--40 Ugo Montanari A note on minimal length polygonal approximation to a digitized contour . . 41--47 Harald Stehfest ACM Algorithm 368: Numerical Inversion of Laplace Transforms . . . . . . . . . 47--49 H. E. Schaffer ACM Algorithm 369: Generator of Random Numbers Satisfying the Poisson Distribution . . . . . . . . . . . . . . 49--49 E. L. Butler ACM Algorithm 370: General Random Number Generator . . . . . . . . . . . . . . . 49--52 J. K. S. McKay ACM Algorithm 371: Partitions in Natural Order . . . . . . . . . . . . . . . . . 52--52 K. B. Dunham ACM Algorithm 372: An Algorithm to Produce Complex Primes CSIEVE . . . . . 52--54 Walter Gautschi and Bruce J. Klein Remark on Algorithm 282, Derivatives of $e^x / x$, $\cos(x) / x$, and $\sin(x) / x$ . . . . . . . . . . . . . . . . . . . 53--54 R. Griffin and K. A. Redich Remark on ``Algorithm 347: An Efficient Algorithm for Sorting with Minimal Storage [M1], by R. C. Singleton'' . . . 54--54 Anonymous Representation for calendar date for machine-to-machine data interchange . . 55--55 Anonymous Interchange rolls of perforated tape for information interchange . . . . . . . . 56--56 W. H. Payne Fortran Tausworthe pseudorandom number generator . . . . . . . . . . . . . . . 57--57
David K. Hsiao and Frank D. Harary A Formal System for Information Retrieval from Files . . . . . . . . . . 67--73 E. von Glaserfeld and P. P. Pisani The multistore parser for hierarchical syntactic structures . . . . . . . . . . 74--82 Steven Vere Translation equations . . . . . . . . . 83--89 H. L. Morgan Spelling correction in systems programs 90--94 Jay Earley An Efficient Context-Free Parsing Algorithm . . . . . . . . . . . . . . . 94--102 C. E. Radke The Use of Quadratic Residue Research 103--105 B. Jones A Variation on Sorting by Address Calculation . . . . . . . . . . . . . . 105--107 James R. Bell The Quadratic Quotient Method: A Hash Code Eliminating Secondary Clustering 107--109 D. N. Ness and R. S. Green and W. A. Martin and G. A. Moulton Computer education in a graduate school of management . . . . . . . . . . . . . 110--114, 19 M. F. Robbins and J. D. Beyer An interactive computer system using graphical flowchart input . . . . . . . 115--119 J. S. White ACM Algorithm 373: Number of Doubly Restricted Partitions . . . . . . . . . 120--120 J. S. White ACM Algorithm 374: Restricted Partition Generator . . . . . . . . . . . . . . . 120--120 H. Späth ACM Algorithm 375: Fitting Data to One Exponential . . . . . . . . . . . . . . 120--121 H. Späth ACM Algorithm 376: Least Squares Fit by $f(x)=A\cos(Bx+C)$ . . . . . . . . . . . 121--122
R. R. Fenichel and J. Weizenbaum and J. C. Yochelson A Program to Teach Programming . . . . . 141--146 J. R. Slagle and J. K. Dixon Experiments with the M & N Tree-Searching Program . . . . . . . . . . . . . . . . 147--154, 159 A. Batson and Shy-Ming M. Ju and D. C. Wood Measurements of Segment Size . . . . . . 155--159 G. A. Watson On an Algorithm for Nonlinear Minimax Approximation . . . . . . . . . . . . . 160--162 D. G. Schweikert A Comparison of Error Improvement Estimates for Adaptive Trapezoid Integration . . . . . . . . . . . . . . 163--166 Robert M. Schwarcz and John F. Burger and Robert F. Simmons A Deductive Question Answerer for Natural Language Inference . . . . . . . 167--183 A. F. Cardenas and W. J. Karplus PDEL --- a Language for Partial Differential Equations . . . . . . . . . 184--191 Michael J. Levine and Stanley M. Swanson ACM Algorithm 377: Symbolic Expansion of Algebraic Expressions . . . . . . . . . 191--192 M. V. Kailas Another method of converting from hexadecimal to decimal . . . . . . . . . 193--193 D. Pager A number system for the permutations . . 193--193 J. R. H. Dempster Comment on a Paging Anomaly . . . . . . 193--194 H. A. Maurer A Note on the Complement of Inherently Ambiguous Context-Free Languages . . . . 194--194 D. K. Hsiao and F. D. Harary Corrigenda: ``A Formal System for Information Retrieval from Files'' . . . 266--266
A. J. DeSalvio and J. G. Purdy and J. Rau Creation and Control of Internal Data Bases Under a Fortran Programming Environment . . . . . . . . . . . . . . 211--215 H. D. Mills Syntax-Directed Documentation for PL360 216--222 Rudolf Bayer and Christoph Witzgall Some Complete Calculi for Matrices . . . 223--237 P. Brinch Hansen The Nucleus of a Multiprogramming System 238--241, 250 C. M. Eastman Representations for Space Planning . . . 242--250 J. E. Pomeranz and R. L. Weil, Jr. The cyclical majority problem . . . . . 251--254 E. N. Nilson Cubic Splines on Uniform Meshes . . . . 255--258 W. Pankiewicz ACM Algorithm 378: Discretized Newton-like Method for Solving a System of Simultaneous Nonlinear Equations . . 259--260 J. N. Lyness ACM Algorithm 379: SQUANK (Simpson Quadrature Used Adaptively-Noise Killed) 260--263 W. F. Heess, Jr. Comments on a paper by Wallace and Mason 264--265 J. L. Smith Comment on multiprogramming under a page on demand strategy . . . . . . . . . . . 265--265 Ronald C. de Vries Comment on Lawler's Multilevel Boolean minimization . . . . . . . . . . . . . . 265--266 K. R. Knight An Algol construction for procedures as parameters of procedures . . . . . . . . 266--266 N. Wirth Corrigenda: ``On Multiprogramming, Machine Coding, and Computer Organization'' . . . . . . . . . . . . . 266--266
L. Hodes Programming System for the On-Line Analysis of Biomedical Images . . . . . 279--283, 286 G. A. Sitton Operations on Generalized Arrays with the Genie Compiler . . . . . . . . . . . 284--286 S. Vere Translation Equations (Errata) . . . . . 286--286 W. E. Sasser and D. S. Burdick and D. A. Graham and T. H. Naylor Application of Sequential Sampling to Simulation. an Example Inventory Model 287--296 J. Loeckx Algorithm for the Construction of Bounded-Context Parsers . . . . . . . . 297--307 John C. Reynolds GEDANKEN --- A Simple Typeless Language Based on the Principle of Completeness and the Reference Concept . . . . . . . 308--319 S. Crespi-Reghizzi and R. Morpurgo A language for treating graphs . . . . . 319--323 S. Laflin and M. A. Brebner ACM Algorithm 380: In-situ Transposition of a Rectangular Matrix . . . . . . . . 324--326 R. E. Knop ACM Algorithm 381: Random Vectors Uniform In Solid Angle . . . . . . . . . 326--326
H. A. Elder On the Feasibility of Voice Input to an On-Line Computer Processing System . . . 339--346 C. R. Muthukrishnan and V. Rajaraman On the Conversion of Decision Tables to Computer Programs . . . . . . . . . . . 347--351 J. E. Grimes Scheduling to Reduce Conflict in Meetings . . . . . . . . . . . . . . . . 351--352 D. G. Frantz A PL\slash 1 program to assist the comparative linguist . . . . . . . . . . 353--356 F. J. Damerau Automatic Parsing for Content Analysis 356--360 Peter Linz Accurate Floating-Point Summation . . . 361--362 K. E. Hillstrom Comparison of Several Adaptive Newton--Cotes Quadrature Routines in Evaluating Definite Integrals with Peaked Integrands . . . . . . . . . . . 362--365 G. W. Stewart Incorporating Origin Shifts into the QR Algorithm for Symmetric Tridiagonal Matrices . . . . . . . . . . . . . . . . 365--367 P. J. Chase ACM Algorithm 382: Combinations of ${M}$ Out of ${N}$ Objects . . . . . . . . . . 368--368 P. J. Chase ACM Algorithm 383: Permutations of a Set with Repetitions . . . . . . . . . . . . 368--369 G. W. Stewart ACM Algorithm 384: Eigenvalues and Eigenvectors of a Real Symmetric Matrix [F2] . . . . . . . . . . . . . . . . . . 369--371 R. L. London Certification of ``Algorithm 245: Treesort 3 [M1]'': Proof of Algorithms --- A New Kind of Certification . . . . 371--374 J. P. Chandler and W. C. Harrison R201--SHELLSORT . . . . . . . . . . . . 373--374 E. F. Codd A Relational Model of Data for Large Shared Data Banks . . . . . . . . . . . 377--387
C. A. Grant An interactive command generating facility . . . . . . . . . . . . . . . . 403--406 M. A. Wilkes Conversational Access to a 2048-Word Machine . . . . . . . . . . . . . . . . 407--414 W. M. Waite The mobile programming system: STAGE 2 415--421 Burton H. Bloom Space/Time Trade-offs in Hash Coding with Allowable Errors . . . . . . . . . 422--426 E. G. Coffman, Jr. and J. Eve File Structures Using Hashing Functions 427--432, 436 Gordon H. Bradley Algorithm and Bound for the Greatest Common Divisor of $n$ Integers . . . . . 433--436 W. A. Woods Context-Sensitive Parsing . . . . . . . 437--445 K. A. Paciorek ACM Algorithm 385: Exponential Integral ${E}_i(x)$ . . . . . . . . . . . . . . . 446--447 G. H. Bradley ACM Algorithm 386: Greatest Common Divisor of $n$ Integers and Multipliers 447--448 T. Bray Certification of Algorithm 22, Ricatti--Bessel Functions of First and Second Kind . . . . . . . . . . . . . . 448--448 E. N. Ng Certification of Algorithm 385, Exponential Integral ${\rm Ei}(x)$ . . . 448--449 K. Sattley and R. Millstein Comments on a paper by Lowe . . . . . . 450--451 H. D. Baecker A note on data base deadlocks . . . . . 451--451 J. E. Pomeranz Note on an Anomaly in Paging . . . . . . 451--451 B. R. Hunt A Comment on Axiomatic Approaches to Programming . . . . . . . . . . . . . . 452--452
N. R. Nielsen Allocation of Computer Resources. is Pricing the Answer . . . . . . . . . . . 467--474 G. Nagy and N. Tuong Normalization Techniques for Handprinted Numerals . . . . . . . . . . . . . . . . 475--481 A. C. Day Full Table Quadratic Searching for Scatter Storage . . . . . . . . . . . . 481--482 B. S. Brawn and F. G. Gustavson and E. S. Mankin Sorting in a Paging Environment . . . . 483--494 J. H. Saltzer and J. W. Gintell The instrumentation of Multics . . . . . 495--500 J. D. Ichbiah and S. P. Morse A technique for generating almost optimal Floyd-Evans productions for precedence grammars . . . . . . . . . . 501--508 K. Fielding ACM Algorithm 387: Function Minimization and Linear Search . . . . . . . . . . . 509--510 H. Hübner and H. Kremer and K. O. Linn and W. Schwering ACM Algorithm 388: Rademacher Function 510--511 H. Hübner and H. Kremer and K. O. Linn and W. Schwering ACM Algorithm 389: Binary Ordered Walsh Functions . . . . . . . . . . . . . . . 511--511 H. Hübner and H. Kremer and K. O. Linn and W. Schwering ACM Algorithm 390: Sequency Ordered Walsh Functions . . . . . . . . . . . . 511--511 J. McKay ACM Algorithm 391: Unitary Symmetric Polynomials . . . . . . . . . . . . . . 512--512 Anonymous Identification of States of the United States (including the District of Columbia) for information interchange 514--515
W. Jack Bouknight A Procedure for Generation of Three-Dimensional Half-Toned Computer Graphics Presentations . . . . . . . . . 527--536 G. Bracchi and M. Somalvico Interactive Software System for Computer-Aided Design. an Application to Circuit Project . . . . . . . . . . . . 537--545 I. Hirschsohn AMESPLOT, a Higher Level Data Plotting Software System . . . . . . . . . . . . 546--555 Cleve B. Moler and Louis P. Solomon Integrating Square Roots . . . . . . . . 556--557 G. W. Kimble A Variation of the Goodman-Lance Method for the Solution of Two-Point Boundary Value Problems . . . . . . . . . . . . . 557--558 M. Wayne Wilson Optimal Starting Approximations for Generating Square Root for Slow or No Divide . . . . . . . . . . . . . . . . . 559--560 L. W. Ehrlich Complex Matrix Inversion Versus Real . . 561--562 M. H. van Emden Increasing the Efficiency of Quicksort 563--567 Robert R. Smith and Dennis McCall ACM Algorithm 392: Systems of Hyperbolic P.D.E. . . . . . . . . . . . . . . . . . 567--570 S. K. Abdali ACM Algorithm 393: Special Series Summation with Arbitrary Precision . . . 570--570 R. B. Dial ACM Algorithm 394: Decision Table Translation . . . . . . . . . . . . . . 571--572 Leslie Lamport and J. R. Bell Comment on Bell's Quadratic Quotient Method for Hash Code Searching . . . . . 573--574 Z. Bavel On the Number of Automorphisms of a Singly Generated Automaton . . . . . . . 574--575
W. A. Woods Transition Network Grammars for Natural Language Analysis . . . . . . . . . . . 591--606 J. Earley and H. Sturgis A formalism for translator interactions 607--617 G. W. Hill ACM Algorithm 395: Student's $t$-Distribution . . . . . . . . . . . . 617--619 G. W. Hill ACM Algorithm 396: Student's $t$-Quantiles . . . . . . . . . . . . . 619--620 S. K. Chang and A. Gill ACM Algorithm 397: An Integer Programming Problem . . . . . . . . . . 620--621 R. A. Stone ACM Algorithm 398: Tableless Date Conversion . . . . . . . . . . . . . . . 621--621 J. J. Seppänen ACM Algorithm 399: Spanning Tree . . . . 621--622 G. C. Wallick ACM Algorithm 400: Modified Håvie Integration . . . . . . . . . . . . . . 622--624 R. Peto Remark on ``Algorithm 347: An Efficient Algorithm for Sorting with Minimal Storage [M1]'' . . . . . . . . . . . . . 624 L. B. Smith The use of interactive graphics to solve numerical problems . . . . . . . . . . . 625--634
P. LaFata and J. B. Rosen An interactive display for approximation by linear programming . . . . . . . . . 651--659 Vincent Y. Lum Multi-Attribute Retrieval with Combined Indexes . . . . . . . . . . . . . . . . 660--665 C. J. Mifsud A multiple-precision division algorithm 666--668 K. Conrow and R. G. Smith NEATER2: A PL/I Source Statement Reformatter . . . . . . . . . . . . . . 669--675 James R. Bell and Charles H. Kaman The Linear Quotient Hash Code . . . . . 675--677 C. J. Cheney A Nonrecursive List Compacting Algorithm 677--678 Anonymous Proposed American National Standard. Recorded magnetic tape for information interchange (1600 CPI, phase encoded) 679--685 Anonymous Proposed American National Standard. Unrecorded magnetic tape for information interchange (9 track-200 and 800 CPI, NRZI and 1600 CPI, P.E.) . . . . . . . . 686--692 P. Bratley ACM Algorithm 401: An Improved Algorithm to Produce Complex Primes . . . . . . . 693--693 M. H. van Emden ACM Algorithm 402: Increasing the Efficiency of Quicksort . . . . . . . . 693--694 W. J. Wilson A generalized method for generating argument/function values . . . . . . . . 696--697 J. R. Ehrman Correction to 'logical' arithmetic on computers with two's complement binary arithmetic . . . . . . . . . . . . . . . 697--698 A. Bernstein Comment on the working set model for program behavior . . . . . . . . . . . . 698--699 J. Rokne Condition numbers of Pei matrices . . . 699--699
M. V. Mathews and F. R. Moore GROOVE --- a program to compose, store, and edit functions of time . . . . . . . 715--721 James C. Tiernan An Efficient Search Algorithm to Find the Elementary Circuits of a Graph . . . 722--726 C. Betourne and J. Boulenger and J. Ferrie and C. Kaiser and S. Krakowiak and J. Mossiere Process management and resource sharing in the multiaccess system ESOPE . . . . 727--733 H. L. Morgan An interrupt based organization for management information systems . . . . . 734--739 R. J. Thompson Improving round-off in Runge--Kutta computations with Gill's method . . . . 739--740 S. C. Shapiro The list set generator: a construct for evaluating set expressions . . . . . . . 741--744 N. A. Black Optimum Merging from Mass Storage . . . 745--749 K. A. Redish Remark on Algorithm 385, Exponential Integral ${\rm Ei}(x)$ . . . . . . . . . 750--750 G. W. Stewart Remark on ``Algorithm 384: Eigenvalues and Eigenvectors of a Real Symmetric Matrix [F2]'' . . . . . . . . . . . . . 750--750 E. A. Fuchs and P. E. Jackson Estimates of Distributions of Random Variables for Certain Computer Communications Traffic Models . . . . . 752--757 C. C. Pinter On decomposing a Boolean function and simplifying the components separately 758--758 W. J. Raduchel Efficient handling of binary data . . . 758--759 Robert A. Wagner Finiteness Assumptions and Intellectual Isolation of Computer Scientists . . . . 759--760
Carl Hammer Signature Simulation and Certain Cryptographic Codes . . . . . . . . . . 3--14 Allen Klinger Pattern Width at a Given Angle . . . . . 15--20 Shi-Kuo Chang The Reconstruction of Binary Patterns from Their Projections . . . . . . . . . 21--25 Giampio Bracchi and Domenico Ferrari Language for Treating Geometric Patterns in a Two-Dimensional Space . . . . . . . 26--32 R. A. Broucke Construction of Rational and Negative Powers of a Formal Series . . . . . . . 32--35 Richard C. Holt Comments on Prevention of System Deadlocks . . . . . . . . . . . . . . . 36--38 C. A. R. Hoare Proof of a Program: FIND . . . . . . . . 39--45 L. G. Proll Further evidence for the analysis of algorithms for the zero-one programming problem . . . . . . . . . . . . . . . . 46--47 M. W. Coleman and M. S. Taylor ACM Algorithm 403: Circular Integer Partitioning [A1] . . . . . . . . . . . 48--48 C. W. Lucas, Jr. and C. W. Terrill ACM Algorithm 404: Complex Gamma Function [S14] . . . . . . . . . . . . . 48--49 Å. Kolm and T. Dahlstrand Remark on ``Algorithm 333: Minit Algorithm For Linear Programming ([H])'' 50--50 K. A. Redish Algorithms: Comment on London's Certification of Algorithm 245 . . . . . 50--51 S. L. Pollack Comment on the conversion of decision tables to computer programs . . . . . . 52--52 A. V. Aho and P. J. Denning and J. D. Ullman Principles of optimal page replacement 80--93
Keith Shwayder Conversion of Limited-Entry Decision Tables to Computer Programs. a Proposed Modification to Pollack's Algorithm . . 69--73 Arthur J. Bernstein and J. C. Sharp A Policy-Driven Scheduler for a Time-Sharing System . . . . . . . . . . 74--78 Norman R. Nielsen An Analysis of Some Time-Sharing Techniques . . . . . . . . . . . . . . . 79--90 James R. Slagle and Carl D. Farrell Experiments in Automatic Learning for a Multipurpose Heuristic Program . . . . . 91--99 H. Hurwitz, Jr. On the Probability Distribution of the Values of Binary Trees . . . . . . . . . 99--102 James R. Slagle and Richard C. T. Lee Application of Game Tree Searching Techniques to Sequential Pattern Recognition . . . . . . . . . . . . . . 103--110 J. Rokne and P. Lancaster Complex Interval Arithmetic . . . . . . 111--112 Alice M. Dell and Roman L. Weil and Gerald L. Thompson ACM Algorithm 405: Roots of Matrix Pencils: The Generalized Eigenvalue Problem [F2] . . . . . . . . . . . . . . 113--117
A. Michael Noll Scanned-Display Computer Graphics . . . 143--150 Zohar Manna and Richard J. Waldinger Toward Automatic Program Synthesis . . . 151--165 William K. Winters Scheduling Algorithm for a Computer Assisted Registration System . . . . . . 166--171 John G. Williams Storage Utilization in a Memory Hierarchy When Storage Assignment is Performed by a Hashing Algorithm . . . . 172--175 C. William Gear The Automatic Integration of Ordinary Differential Equations . . . . . . . . . 176--179 Jo Ann Howell ACM Algorithm 406: Exact Solution of Linear Equations Using Residue Arithmetic [F4] . . . . . . . . . . . . 180--184 C. William Gear ACM Algorithm 407: DIFSUB for Solution of Ordinary Differential Equations [D2] 185--190
Niklaus Wirth Program Development by Stepwise Refinement . . . . . . . . . . . . . . . 221--227 Vincent Y. Lum and P. S. T. Yuen and M. Dodd Key-to-Address Transform Techniques: A Fundamental Performance Study on Large Existing Formatted Files . . . . . . . . 228--239 Allen B. Tucker and Michael J. Flynn Dynamic Microprogramming. Processor Organization and Programming . . . . . . 240--250 Peggy Anne Talbot and John W. Carr III and Richard R. Coulter, Jr. and Rosa C. Hwang Animator: An On-Line Two-dimensional Film Animation System . . . . . . . . . 251--259 Marvin L. Stein and William D. Munro On Complement Division . . . . . . . . . 260--264 J. M. McNamee ACM Algorithm 408: A Sparse Matrix Package (Part I) . . . . . . . . . . . . 265--273 Elmer W. Galbi Software and patents: a status report 274--278
T. William Olle (Chairman) and Codasyl Systems Committee Introduction to ``Feature Analysis of Generalized Data Base Management Systems'' . . . . . . . . . . . . . . . 308--318 Norman R. Nielsen The Merit of Regional Computing Networks 319--326 Patrick Krolak and Wayne Felts and George Marble A Man-Machine Approach Toward Solving the Traveling Salesman Problem . . . . . 327--334 Ugo Montanari On the Optimal Detection of Curves in Noisy Pictures . . . . . . . . . . . . . 335--345 Donald L. Richards How To Keep the Addresses Short . . . . 346--349 Robert R. Fenichel On Implementation of Label Variables . . 349--350 James H. Morris, Jr. Another Recursion Induction Principle 351--354 H. Schmitt ACM Algorithm 409: Discrete Chebychev Curve Fit [E2] . . . . . . . . . . . . . 355--356 J. M. Chambers ACM Algorithm 410: Partial Sorting [M1] 357--358
Kazuaki Harada Generation of rosary permutations expressed in Hamiltonian circuits . . . 373--379 James D. Foley An approach to the optimum design of computer graphics systems . . . . . . . 380--390 Saul Amarel Computer Science: A Conceptual Framework for Curriculum Planning . . . . . . . . 391--401 W. E. Bosarge, Jr. and O. G. Johnson Numerical properties of the Ritz--Trefftz algorithm for optimal control . . . . . . . . . . . . . . . . 402--406 H. Tim Gladwin A Note on Compiling Fixed Point Binary Multiplications . . . . . . . . . . . . 407--408 A. G. Fraser On the Meaning of Names in Programming Systems . . . . . . . . . . . . . . . . 409--416 R. J. Walker Binary Summation . . . . . . . . . . . . 417--417 Marvin V. Zelkowitz Interrupt Driven Programming . . . . . . 417--418
J. L. McKenney and Fred M. Tonge The State of Computer-Oriented Curricula in Business Schools 1970 . . . . . . . . 443--448 Arthur J. Bernstein A Programmer Training Project . . . . . 449--452 Franklin L. DeRemer Simple LR(k) Grammars . . . . . . . . . 453--460 Terrence W. Pratt and Daniel P. Friedman A Language Extension for Graph Processing, and Its Formal Semantics . . 460--467 Keith Paton An algorithm for the blocks and cut nodes of a graph . . . . . . . . . . . . 468--475 David E. Ferguson Buffer Allocation in Merge-Sorting . . . 476--478 C. V. Ramamoorthy and M. J. Gonzalez Subexpression ordering in the execution of arithmetic expressions . . . . . . . 479--485 D. G. McVitie and L. B. Wilson The Stable Marriage Problem . . . . . . 486--490 D. G. McVitie and L. B. Wilson ACM Algorithm 411: Three Procedures for the Stable Marriage Problem [H] . . . . 491--492 J. \vCermák ACM Algorithm 412: Graph Plotter [J6] 492--493 William J. Raduchel Remark on ``Algorithm 316: Solution of Simultaneous Nonlinear Equations [C5]'' 493
Robert Morris Papers from the 2nd symposium on symbolic and algebraic manipulation . . 509--510 Anthony C. Hearn Applications of symbol manipulation in theoretical physics . . . . . . . . . . 511--516 Andrew D. Hall, Jr. The Altran system for rational function manipulation --- a survey . . . . . . . 517--521 Robert R. Fenichel List Tracing in Systems Allowing Multiple Cell Types . . . . . . . . . . 522--526 Joel Moses Algebraic Simplification: A Guide for the Perplexed . . . . . . . . . . . . . 527--537 William H. Jefferys Automatic algebraic manipulation in celestial mechanics . . . . . . . . . . 538--541 David Barton and John P. Fitch General relativity and the application of algebraic manipulative systems . . . 542--547 Joel Moses Symbolic Integration: The Stormy Decade 548--560
Daniel Teichroew Education Related to the Use of Computers in Organizations . . . . . . . 573--588 Sadahiro Isoda and Eiichi Goto and Izumi Kimura An Efficient Bit Table Technique for Dynamic Storage Allocation of $2^n$-word Blocks . . . . . . . . . . . . . . . . . 589--592 Keith Paton Corrigendum: ``An algorithm for the blocks and cutnodes of a graph'' . . . . 592--592 Eugene Wong and T. C. Chiang Canonical Structure in Attribute Based File Organization . . . . . . . . . . . 593--597 David L. Phillips A Note on Best One-Sided Approximations 598--600 Werner Liniger A stopping criterion for the Newton--Raphson method in implicit multistep integration algorithms for nonlinear systems of ordinary differential equations . . . . . . . . . 600--601 Ivan Flores and George Madpis Average Binary Search Length for Dense Ordered Lists . . . . . . . . . . . . . 602--603 Robert R. Fenichel Comment on Cheney's List-Compaction Algorithm . . . . . . . . . . . . . . . 603--604
Jay Earley Toward an Understanding of Data Structures . . . . . . . . . . . . . . . 617--627 ANSI Subcommittee X3J3 Clarification of Fortran Standards --- Second Report . . . . . . . . . . . . . 628--642 Arthur E. Oldehoeft and Samuel D. Conte Experiments with an automated instructional system for numerical methods . . . . . . . . . . . . . . . . 643--650 William M. Newman Display Procedures . . . . . . . . . . . 651--660 Alan G. Nemeth and Paul D. Rovner User program measurement in a time-shared environment . . . . . . . . 661--666 P. J. Courtois and F. Heymans and David Lorge Parnas Concurrent Control with ``Readers'' and ``Writers'' . . . . . . . . . . . . . . 667--668 J. N. Lyness and G. Sande ACM Algorithm 413: ENTCAF and ENTCRE: Evaluation of Normalized Taylor Coefficients of an Analytic Function (C5) . . . . . . . . . . . . . . . . . . 669--675
P. Branquart and J. Lewi and Michel Sintzoff and P. L. Wodon The composition of semantics in Algol 68 697--708 John W. Hamblen Using computers in higher education: past recommendations, status, and needs 709--712 Donald L. Shell Optimizing the Polyphase Sort . . . . . 713--719 Itaru Aramaki and Tomokazu Kawabata and Kazuhiko Arimoto Automation of Etching-Pattern Layout . . 720--730 Michael A. Malcolm On Accurate Floating-Point Summation . . 731--736 G. H. Golub and L. B. Smith ACM Algorithm 414: Chebyshev Approximation of Continuous Functions by a Chebyshev System of Functions [E2] . . 737--746
Richard Gordon and Gabor T. Herman Reconstruction of Pictures from Their Projections . . . . . . . . . . . . . . 759--768 E. L. Amidon and G. S. Akin Algorithmic Selection of the Best Method for Compressing Map Data Strings . . . . 769--774 James K. Mullin Retrieval-Update Speed Tradeoffs Using Combined Indices . . . . . . . . . . . . 775--776 Malcolm C. Harrison Implementation of the Substring Test by Hashing . . . . . . . . . . . . . . . . 777--779 W. A. (William A.) Wulf and D. B. Russell and A. N. Habermann BLISS: A Language for Systems Programming . . . . . . . . . . . . . . 780--790 Arnold Rochfeld New LISP Techniques for a Paging Environment . . . . . . . . . . . . . . 791--795 John W. Blumberg and Clinton R. Foulk A note on `a modification of Nordsieck's method using an ``off-step'' point' . . 796--796 Sven-Åke A. Gustafson Rapid Computation of General Interpolation Formulas and Mechanical Quadrature Rules . . . . . . . . . . . . 797--801 François Bourgeois and Jean-Claude Lassalle An extension of the Munkres algorithm for the assignment problem to rectangular matrices . . . . . . . . . . 802--804 François Bourgeois and John-Claude C. Lassalle ACM Algorithm 415: Algorithm for the Assignment Problem (Rectangular Matrices) [H] . . . . . . . . . . . . . 805--806 Sven-Åke Gustafson ACM Algorithm 416: Rapid Computation of Coefficients of Interpolation Formulas [E1] . . . . . . . . . . . . . . . . . . 806--807 Sven-Åke Gustafson ACM Algorithm 417: Rapid Computation of Weights of Interpolatory Quadrature Rules [D1] . . . . . . . . . . . . . . . 807--807
Arthur M. Lesk Pictorial pattern recognition and the phase problem of X-ray crystallography 3--6 Stefano Levialdi On Shrinking Binary Picture Patterns . . 7--10 Richard O. Duda and Peter E. Hart Use of the Hough transformation to detect lines and curves in pictures . . 11--15 Edgar T. Irons and Frans M. Djorup A CRT Editing System . . . . . . . . . . 16--20 T. A. Dwyer Teacher/student authored CAI using the NEWBASIC system . . . . . . . . . . . . 21--28 Donald L. Shell Corrigendum: ``Optimizing the Polyphase Sort'' . . . . . . . . . . . . . . . . . 28--28 Gordon I. McCalla and Jeffrey R. Sampson MUSE: A Model To Understand Simple English . . . . . . . . . . . . . . . . 29--40 Richard I. Shrager Quadratic Programming for Nonlinear Regression . . . . . . . . . . . . . . . 41--45 Herbert E. Salzer Ordering +-f(+-f(+-f(\ldots+-f(x)..))) When f(x) Is Positive Monotonic . . . . 45--46 Bo Einarsson ACM Algorithm 418: Calculation of Fourier Integrals [D1] . . . . . . . . . 47--48 I. D. G. Macleod Certification of ``Algorithm 380: In-Situ Transposition of a Rectangular Matrix [F1]'' . . . . . . . . . . . . . 49 Günther F. Schrack Remark on ``Algorithm 391: Unitary Symmetric Polynomials [Z]'' . . . . . . 49
David Pager A Proposal for a Computer-Based Interactive Scientific Community . . . . 71--75 Charles M. Eastman Preliminary report on a system for general space planning . . . . . . . . . 76--87 William A. Martin and D. N. Ness Optimizing Binary Trees Grown with a Sorting Algorithm . . . . . . . . . . . 88--93 Arthur E. Oldehoeft and Maurice H. Halstead Maximum computing power and cost factors in the centralization problem . . . . . 94--96 Michael A. Jenkins and J. F. Traub ACM Algorithm 419: Zeros of a Complex Polynomial [C2] . . . . . . . . . . . . 97--99 Hugh Williamson ACM Algorithm 420: Hidden-Line Plotting Program [J6] . . . . . . . . . . . . . . 100--103 James Anderson Moorer Music and Computer Composition . . . . . 104--113 Ivan Flores and George Madpis Corrigendum: ``Average Binary Search Length for Dense Ordered Lists'' . . . . 113--113 Richard Gordon and Gabor T. Herman Corrigendum: ``Reconstruction of Pictures from Their Projections'' . . . 113--113
Peter J. Denning and Brian Randell Papers from the 3rd ACM symposium on operating systems principles . . . . . . 133--134 Daniel G. Bobrow and Jerry D. Burchfiel and Daniel L. Murphy and Raymond S. Tomlinson TENEX, A Paged Time-Sharing System for the PDP-10 . . . . . . . . . . . . . . . 135--143 Barbara H. Liskov The Design of the Venus Operating System 144--149 R. Stockton Gaines An Operating System Based on the Concept of a Supervisory Computer . . . . . . . 150--156 Michael D. Schroeder and Jerome H. Saltzer A Hardware Architecture for Implementing Protection Rings . . . . . . . . . . . . 157--170 A. Nico Habermann Synchronization of Communicating Processes . . . . . . . . . . . . . . . 171--176 Toby J. Teorey and Tad B. Pinkerton A Comparative Analysis of Disk Scheduling Policies . . . . . . . . . . 177--184 Edward G. Coffman, Jr. and T. A. Ryan, Jr. A study of storage partitioning using a mathematical model of locality . . . . . 185--190 Peter J. Denning and Stuart C. Schwartz Properties of the Working Set Model . . 191--198
Richard W. Conway and William L. Maxwell and Howard L. Morgan On the Implementation of Security Measures in Information Systems . . . . 211--220 David C. Walden A system for interprocess communication in a resource sharing computer network 221--230 N. M. Herbst and P. M. Will An experimental laboratory for pattern recognition and signal processing . . . 231--244 Yutaka Matsushita Hidden Lines Elimination for a Rotating Object . . . . . . . . . . . . . . . . . 245--252 Stephen M. Chase An implemented graph algorithm for winning Shannon Switching Games . . . . 253--256 Ellis Horowitz and Howard L. Morgan and Alan C. Shaw Computers and Society: A Proposed Course for Computer Scientists . . . . . . . . 257--261 Hirondo Kuki Complex Gamma Function with Error Control [S14] . . . . . . . . . . . . . 262--267 Cleve B. Moler Matrix Computations with Fortran and Paging . . . . . . . . . . . . . . . . . 268--270 Hirondo Kuki ACM Algorithm 421: Complex Gamma Function with Error Control [S14] . . . 271--272 V. Kevin M. Whitney ACM Algorithm 422: Minimal Spanning Tree [H] . . . . . . . . . . . . . . . . . . 273--274 Cleve B. Moler ACM Algorithm 423: Linear Equation Solver [F4] . . . . . . . . . . . . . . 274--274 David C. Walden A Note on Cheney's Nonrecursive List-Compacting Algorithm . . . . . . . 275--275 T. C. Hu A Comment on the Double-Chained Tree . . 276--276
James K. Mullin An Improved Indexed-Sequential Access Method Using Hashed Overflow . . . . . . 301--307 A. Bensoussan and C. T. Clingen and Robert C. Daley The Multics Virtual Memory: Concepts and Design . . . . . . . . . . . . . . . . . 308--318 Ronald D. Christman MUX, a Simple Approach to On-Line Computing . . . . . . . . . . . . . . . 319--329 David Lorge Parnas A technique for software module specification with examples . . . . . . 330--336 W. Morven Gentleman Implementing Clenshaw--Curtis quadrature. I. Methodology and experience . . . . . . . . . . . . . . . 337--342 W. Morven Gentleman Implementing Clenshaw--Curtis quadrature. II. Computing the cosine transformation . . . . . . . . . . . . . 343--346 D. Greenspan and D. Schultz Fast finite-difference solution of biharmonic problems . . . . . . . . . . 347--350 Charles B. Dunham Minimax nonlinear approximation by approximation on subsets . . . . . . . . 351--351 Richard Harter The Optimality of Winograd's Formula . . 352--352 W. Morven Gentleman ACM Algorithm 424: Clenshaw--Curtis Quadrature [D1] . . . . . . . . . . . . 353--355 Rex L. Hurst and Robert E. Knop ACM Algorithm 425: Generation of Random Correlated Normal Variables [G5] . . . . 355--357 Coenraad Bron ACM Algorithm 426: Merge Sort Algorithm [M1] . . . . . . . . . . . . . . . . . . 357--358 Peter Linz ACM Algorithm 427: Fourier Cosine Integral [D1] . . . . . . . . . . . . . 358--360 J. M. Yohe ACM Algorithm 428: Hu-Tucker Minimum Redundancy Alphabetic Coding Method [Z] 360--362 Robert L. Ashenhurst A report of the ACM curriculum committee on computer education for management. Curriculum recommendations for graduate professional programs in information systems . . . . . . . . . . . . . . . . 363--398
J. Blatny and S. R. Clark and T. A. Rourke On the optimization of performance of time-sharing systems by simulation . . . 411--420 Thomas R. Spacek A proposal to establish a pseudo virtual memory via writable overlays . . . . . . 421--426 Philip Gilbert and W. J. Chandler Interference between Communicating Parallel Processes . . . . . . . . . . . 427--437 James F. Gimpel Blocks --- A New Data type for SNOBOL4 438--447 David F. Martin A Boolean matrix method for the computation of linear precedence functions . . . . . . . . . . . . . . . 448--454 Robert T. O'Reagan Computer Assigned Codes from Verbal Responses . . . . . . . . . . . . . . . 455--459 Ken Iguchi A starting method for solving nonlinear Volterra integral equations of the second kind . . . . . . . . . . . . . . 460--461 Ira Pohl A Sorting Problem and Its Complexity . . 462--464 K. S. Kölbig Certification of ``Algorithm 363: Complex error function'' . . . . . . . . 465--466 Herbert Niessner Remark on ``Algorithm 343: Eigenvalues and eigenvectors of a real general matrix'' . . . . . . . . . . . . . . . . 466--466 L. G. Proll Remark on ``ACM Algorithm 370: General random number generator [G5]'' . . . . . 467--468 Günther F. Schrack Remark on ``Algorithm 381: Random vectors uniform in solid angle'' . . . . 468--468 Arthur H. J. Sale Remark on ``Algorithm 393: Special series summation with arbitrary precision'' . . . . . . . . . . . . . . 468--469 Bo Einarsson Remark on ``Algorithm 418: Calculation of Fourier integrals'' . . . . . . . . . 469--469 Stephen C. Johnson and Brian W. Kernighan Remark on ``Algorithm 397: An integer programming problem'' . . . . . . . . . 469--469 Abraham Kandel Computer Science --- A Vicious Circle 470--471 Elliot B. Koffman Individualizing instruction in a generative CAI tutor . . . . . . . . . . 472--473 E. N. Houstis and W. F. Mitchell and J. R. Rice ACM Algorithm 438: Product Type Two-point Gauss--Legendre--Simpson's Integration . . . . . . . . . . . . . . 1071
Lee Revens The first twenty-five years: ACM 1947--1962 . . . . . . . . . . . . . . . 485--490 Eric A. Weiss Publications in Computing: An Informal Review . . . . . . . . . . . . . . . . . 491--497 Anthony Ralston The Next Two Years (ACM President's Letter) . . . . . . . . . . . . . . . . 499--500 Andrei P. Ershov Aesthetics and the Human Factor in Programming . . . . . . . . . . . . . . 501--505 G. G. Probst and Robert S. Oelman and Sam Wyly and C. Lester Hogan and F. T. Cary and Gordon Bell and Donald P. Kircher As the Industry Sees It . . . . . . . . 506--517 Michael A. Arbib Toward an Automata Theory of Brains . . 521--527 Zohar Manna and Jean Vuillemin Fix Point Approach to the Theory of Computation . . . . . . . . . . . . . . 528--536 J. F. Traub Numerical Mathematics and Computer Science . . . . . . . . . . . . . . . . 537--541 David F. Shanno and Roman L. Weil Management science: a view from nonlinear programming . . . . . . . . . 542--549 Joel Moses Toward a General Theory of Special Functions . . . . . . . . . . . . . . . 550--554 Caxton C. Foster A View of Computer Architecture . . . . 557--565 A. G. Fraser On the interface between computers and data communications systems . . . . . . 566--573 Per Brinch Hansen Structured Multiprogramming . . . . . . 574--578 William C. Lynch Operating System Performance . . . . . . 579--585 Stephen R. Kimbleton The role of computer system models in performance evaluation . . . . . . . . . 586--590 Saul Rosen Programming Systems and Languages (1965--1975) . . . . . . . . . . . . . . 591--600 Jean E. Sammet Programming Languages: History and Future . . . . . . . . . . . . . . . . . 601--610 Lloyd D. Fosdick The Production of Better Mathematical Software . . . . . . . . . . . . . . . . 611--617 Daniel G. Bobrow Requirements for Advanced Programming Systems for List Processing . . . . . . 618--627 Charles W. Bachman The Evolution of Storage Structures . . 628--634 John R. Rice On the Present and Future of Scientific Computation . . . . . . . . . . . . . . 637--639 Robert I. Benjamin A generational perspective of information system development . . . . . 640--643 Sally Yeates Sedelow Language Analysis in the Humanities . . 644--647 Karl L. Zinn Computers in the instructional process: directions for research and development 648--651 Gerald M. Sturman Computers and Urban Society . . . . . . 652--657 Gerard Salton Dynamic Document Processing . . . . . . 658--668 Donald E. Knuth Ancient Babylonian algorithms . . . . . 671--677 Friedrich L. Bauer and H. Wössner The ``Plankalkül'' of Konrad Zuse: a forerunner of today's programming languages . . . . . . . . . . . . . . . 678--685 Richard E. Sprague A Western View of Computer History . . . 686--692 Franz L. Alt Archaeology of computers --- reminiscences, 1945--1947 . . . . . . . 693--694 Allan Borodin and C. C. Gotlieb Computers and Employment . . . . . . . . 695--702
John G. Herriot In Memory of George E. Forsythe . . . . 719--720 Donald E. Knuth George Forsythe and the development of Computer Science . . . . . . . . . . . . 721--726 David Crowe Generating Parsers for Affix Grammars 728--734 Robert E. Helbig and Patrick K. Orr and Robert R. Roediger Political Redistricting by Computer . . 735--741 Arthur J. Benjamin Extensible Editor for a Small Machine with Disk Storage . . . . . . . . . . . 742--747 Robert F. Rosin and Gideon Frieder and Richard H. Eckhouse, Jr. Environment for Research in Microprogramming and Emulation . . . . . 748--760 P. H. Oden and Gerald S. Shedler A Model of Memory Contention in a Paging Machine . . . . . . . . . . . . . . . . 761--771 H. J. Bernstein and H. T. Gladwin Compiling fixed-point multiplications 772--772 W. L. van der Poel Comment on the composition of semantics in Algol 68 . . . . . . . . . . . . . . 772--772 Herbert J. Bernstein Compiling Fixed-Point Multiplications 772 James H. Morris, Jr. A Bonus from van Wijngaarden's Device 773--773 Peter R. Jones Comment on Average Binary Search Length 774--774 Ronald C. Read and K. Harada A Note on the Generation of Rosary Permutations. With a Response by K. Harada . . . . . . . . . . . . . . . . . 775--775 W. Squire ACM Algorithm 429: Localization of the Roots of a Polynomial [C2] . . . . . . . 776--777 Paul Walton Purdom, Jr. and Edward F. Moore ACM Algorithm 430: Immediate Predominators in a Directed Graph [H] 777--778
Karl N. Levitt and William H. Kautz Cellular Arrays for the Solution of Graph Problems . . . . . . . . . . . . . 789--801 Sakti P. Ghosh File Organization --- The Consecutive Retrieval Property . . . . . . . . . . . 802--808 Moshe Mor and T. Lamdan A New Approach to Automatic Scanning of Contour Maps . . . . . . . . . . . . . . 809--812 Paul L. Richman Automatic Error Analysis for Determining Precision . . . . . . . . . . . . . . . 813--817 Arunachalam Ravindran ACM Algorithm 431: A Computer Routine for Quadratic and Linear Programming Problems [H] . . . . . . . . . . . . . . 818--820 Richard H. Bartels and G. W. Stewart ACM Algorithm 432: Solution of the Matrix Equation \boldmath $AX+XB=C$ [F4] 820--826 Edward S. Deutsch Thinning Algorithms on Rectangular, Hexagonal, and Triangular Arrays . . . . 827--837 James Gregory A Comparison of Floating Point Summation Methods . . . . . . . . . . . . . . . . 838--838 Hatem M. Khalil The Eigenproblem of Block Tridiagonal Matrices . . . . . . . . . . . . . . . . 839--839 David Lorge Parnas and A. Nico Habermann and R. C. Holt Comment on Deadlock Prevention Method 840--841 Richard Rubinstein and Julian Feldman A controller for a Braille terminal . . 841--842 K. C. Tan On Foster's Information Storage and Retrieval Using AVL Trees . . . . . . . 843--843
Edsger W. Dijkstra The Humble Programmer . . . . . . . . . 859--866 James B. Morris Demand Paging Through Utilization of Working Sets on the Maniac II . . . . . 867--872 Joachim H. Ahrens and Ulrich Dieter Computer Methods for Sampling from the Exponential and Normal Distributions . . 873--882 Richard J. Hanson Integral Equations of Immunology . . . . 883--890 Robert F. Simmons and Jonathan Slocum Generating English Discourse from Semantic Networks . . . . . . . . . . . 891--905 Gert Dathe Conversion of Decision Tables by Rule Mask Method without Rule Mask . . . . . 906--909 W. D. Frazer and C. K. Wong Sorting by Natural Selection . . . . . . 910--913 A. P. Ershov Corrigendum: ``Aesthetics and the Human Factor in Programming'' . . . . . . . . 913--913 Hiroshi Akima ACM Algorithm 433: Interpolation and Smooth Curve Fitting Based on Local Procedures [E2] . . . . . . . . . . . . 914--918 J. Douglas Robertson Remark on ``Algorithm 398: Tableless Date Conversion'' . . . . . . . . . . . 918
Phyllis Fox Comparative Study of Computer Programs for Integrating Differential Equations 941--948 Michael A. Malcolm Algorithms to Reveal Properties of Floating-Point Arithmetic . . . . . . . 949--951 Merrell L. Patrick A Highly Parallel Algorithm for Approximating All Zeros of a Polynomial with Only Real Zeros . . . . . . . . . . 952--955 Henry F. Ledgard Model for Type Checking --- with an Application to Algol 60 . . . . . . . . 956--966 Peter B. Henderson Derived Semantics for Some Programming Language Constructs . . . . . . . . . . 967--973 M. Verhelst The Conversion of Limited-Entry Decision Tables to Optimal and Near-Optimal Flowcharts: Two New Algorithms . . . . . 974--980 H. D. Baecker Garbage Collection for Virtual Memory Computer Systems . . . . . . . . . . . . 981--986 John S. Ramberg and Bruce W. Schmeiser Approximate Method for Generating Symmetric Random Variables . . . . . . . 987--990 David L. March ACM Algorithm 434: Exact Probabilities for ${R\times{C}}$ Contingency Tables [G2] . . . . . . . . . . . . . . . . . . 991--992 Wayne Fullerton ACM Algorithm 435: Modified Incomplete Gamma Function [S14] . . . . . . . . . . 993--995 Vincent Y. Lum and P. S. T. Yuen Additional results on key-to-address transform techniques: a fundamental performance study on large existing formatted files . . . . . . . . . . . . 996--997 Steve Kennedy A Note on Optimal Doubly-Chained Trees 997--998 Murray A. Eisenberg and Michael R. McGuire Further comments on Dijkstra's concurrent programming control problem 999--999 Stephen W. Smoliar Comments on Moorer's Music and computer composition . . . . . . . . . . . . . . 1000--1001
J. Richard Phillips and H. C. Adams Dynamic Partitioning for Array Languages 1023--1032 Rudolf Bayer and C. Witzgall Index Ranges for Matrix Calculi . . . . 1033--1039 Jay Earley and Paul Caizergues Method for Incrementally Compiling Languages with Nested Statement Structure . . . . . . . . . . . . . . . 1040--1044 Fabrizio Luccio Weighted Increment Linear Search for Scatter Tables . . . . . . . . . . . . . 1045--1047 Donald R. Barr and Norman L. Sezak A Comparison of Multivariate Normal Generators . . . . . . . . . . . . . . . 1048--1049 John Moore and Prentiss Robinson New Method for the Solution of the Cauchy Problem for Parabolic Equations 1050--1052 David Lorge Parnas On the Criteria To Be Used in Decomposing Systems into Modules . . . . 1053--1058 P. J. Brown Levels of Language for Portable Software 1059--1062 Stephen Sherman and Forest Baskett III and James C. Browne Trace-Driven Modeling and Analysis of CPU Scheduling in a Multiprogramming System . . . . . . . . . . . . . . . . . 1063--1069 W. Robert Boland ACM Algorithm 436: Product Type Trapezoidal Integration . . . . . . . . 1070--1070 W. Robert Boland ACM Algorithm 437: Product Type Simpson's Integration [D1] . . . . . . . 1070--1071 W. Robert Boland ACM Algorithm 438: Product Type Two-Point Gauss--Legendre--Simpson's Integration [D1] . . . . . . . . . . . . 1071 Walter L. Sullins Certification of ``Algorithm 266: Pseudo-Random Numbers [G5]'' . . . . . . 1072--1073 W. Robert Boland ACM Algorithm 439: Product Type Three-point Gauss--Legendre--Simpson's Integration [D1] . . . . . . . . . . . . 1072 P. Hallet and E. Mund Certification of ``Algorithm 379: Squank'' . . . . . . . . . . . . . . . . 1073 Ernst Schuegraf Remark on ``Algorithm 176: Least Squares Surface Fit'' . . . . . . . . . . . . . 1073 Michael J. Frisch Remark on ``Algorithms 352, 385, 392: Remarks on Characteristic Values and Associated Solutions of Mathieu's Differential Equation, Exponential Integral, and Systems of Hyperbolic P.D.E.'' . . . . . . . . . . . . . . . . 1074 D. R. T. Marshall Remark on ``Algorithm 394: Decision Table Translation'' . . . . . . . . . . 1074 Ernst Schuegraf Remark on ``Algorithm 195: BANDSOLVE'' 1074 Richard M. Heiberger Remark on ``Algorithm 405: Roots of Matrix Pencils'' . . . . . . . . . . . . 1075
Peter J. Denning and Stuart C. Schwartz Corrigendum: ``Properties of the working-set model'' . . . . . . . . . . 191--198
Gerald S. Shedler A Queuing Model of a Multiprogrammed Computer with a Two-Level Storage System 3--10 Carter Bays The Reallocation of Hash-Coded Tables 11--14 James H. Morris, Jr. Protection in Programming Languages . . 15--21 Yoichi Muraoka and David J. Kuck On the Time Required for a Sequence of Matrix Products . . . . . . . . . . . . 22--26 E. B. James and Derek P. Partridge Adaptive Correction of Program Statements . . . . . . . . . . . . . . . 27--37 Paul L. Richman Variable-Precision Exponentiation . . . 38--40 C. R. Crawford Reduction of a Band-Symmetric Generalized Eigenvalue Problem . . . . . 41--44 Sumner E. Blount and Louis Fein The practical aspect of computer science education --- discussion . . . . . . . . 45--46 Carter Bays A note on when to chain overflow items within a direct-access table . . . . . . 46--47 M. Stella Atkins Mutual recursion in Algol 60 using restricted compilers . . . . . . . . . . 47--48 L. J. Gallaher ACM Algorithm 440: A Multidimensional Monte Carlo Quadrature with Adaptive Stratified Sampling [D1] . . . . . . . . 49--50 Robert E. Knop ACM Algorithm 441: Random Deviates from the Dipole Distribution [G5] . . . . . . 51--51 G. W. Hill and A. W. Davis ACM Algorithm 442: Normal Deviate [S14] 51--52
R. D. Merrill Representation of Contours and Regions for Efficient Computer Search . . . . . 69--82 Stefano Crespi-Reghizzi and Michel A. Melkanoff and L. Lichten The Use of Grammatical Inference for Designing Programming Languages . . . . 83--90 James F. Gimpel A Theory of Discrete Patterns and Their Implementation in SNOBOL4 . . . . . . . 91--100 J. Rokne Automatic Errorbounds for Simple Zeros of Analytic Functions . . . . . . . . . 101--104 Richard P. Brent Reducing the Retrieval Time of Scatter Storage Techniques . . . . . . . . . . . 105--109 Robert M. Graham and Gerald J. Clancy, Jr. and David B. DeVaney A Software Design and Evaluation System 110--116 Robert M. Balzer An Overview of the ISPL Computer System Design . . . . . . . . . . . . . . . . . 117--122 Fred N. Fritsch and R. E. Shafer and W. P. Crowley ACM Algorithm 443: Solution of the Transcendental Equation $w e^w = x$ [C5] 123--124
Richard H. Austing and Gerald L. Engel A Computer Science Course Program for Small Colleges . . . . . . . . . . . . . 139--147 Robert A. Wagner Common Phrases and Minimum-Space Text Storage . . . . . . . . . . . . . . . . 148--152 Y. Feinroth and E. Franceschini and M. Goldstein Telecommunications Using a Front-End Minicomputer . . . . . . . . . . . . . . 153--160 Charles D. Pack The Effects of Multiplexing on a Computer-Communications System . . . . . 161--168 Richard W. Conway and Thomas R. Wilcox Design and Implementation of a Diagnostic Compiler for PL/I . . . . . . 169--179 Herbert E. Salzer Gray code and the $\pm$ sequence when $\pm f(\pm f(\pm f(\cdots \pm f(x) \cdots)))$ is ordered . . . . . . . . . 180--180 Abraham Bookstein On Harrison's Substring Testing Technique . . . . . . . . . . . . . . . 180--181 William H. Payne Graduate Education: The Ph.D. Glut . . . 181--182 Robert A. Wagner ACM Algorithm 444: An Algorithm for Extracting Phrases in a Space-Optimal Fashion [Z] . . . . . . . . . . . . . . 183--185 Shi-Kuo Chang ACM Algorithm 445: Binary Pattern Reconstruction from Projections [Z] . . 185--186 John Lau Remark on ``Algorithm 445: Binary Pattern Reconstruction from Projections [Z]'' . . . . . . . . . . . . . . . . . 186--186
Anthony Hassitt and J. W. Lageschulte and Leonard E. Lyon Implementation of a High Level Language Machine . . . . . . . . . . . . . . . . 199--212 John G. Williams Asymmetric Memory Hierarchies . . . . . 213--222 H. Kuki and W. J. Cody A Statistical Study of the Accuracy of Floating Point Number Systems . . . . . 223--230 Walter A. Burkhard and Robert M. Keller Some Approaches to Best-Match File Searching . . . . . . . . . . . . . . . 230--236 James P. Strong, III and Azriel Rosenfeld A Region Coloring Technique for Scene Analysis . . . . . . . . . . . . . . . . 237--246 Juan Rodriguez-Rosell and Jean-Pierre Dupuy The design, implementation, and evaluation of a working set dispatcher 247--253 R. Broucke ACM Algorithm 446: Ten Subroutines for the Manipulation of Chebyshev Series [C1] . . . . . . . . . . . . . . . . . . 254--256 Larry C. Ragland and Donald I. Good Certification of ``Algorithm 386: Greatest Common Divisor of $n$ Integers and Multipliers'' . . . . . . . . . . . 257--257
David Pager On the Problem of Communicating Complex Information . . . . . . . . . . . . . . 275--281 David W. Low Programming by Questionnaire: an Effective Way to Use Decision Tables . . 282--286 Peter J. H. King and Roger G. Johnson Some Comments on the Use of Ambiguous Decision Tables and Their Conversion to Computer Programs . . . . . . . . . . . 287--290 John Salasin Hierarchical Storage in Information Retrieval . . . . . . . . . . . . . . . 291--295 Derek G. Corneil and C. C. Gotlieb and Y. M. Lee Minimal Event-Node Network of Project Precedence Relations . . . . . . . . . . 296--298 Andrew Mercer and Azriel Rosenfeld An Array Grammar Programming System . . 299--305 Edward M. Reingold A Nonrecursive List Moving Algorithm . . 305--307 H. Vos Remark on ``Algorithm 300: Coulomb Wave Functions'' . . . . . . . . . . . . . . 308--309 G. Bayer Maxflow . . . . . . . . . . . . . . . . 309--309 G. Bayer Remark on ``Algorithm 324: Maxflow'' . . 309 B. Holmgren and D. Obradovi\'c and Å. Kolm Remark on ``Algorithm 333: Minit Algorithm for Linear Programming'' . . . 310--310 D. Obradovi\'c Remark on ``Algorithm 333: Minit Algorithm for Linear Programming'' . . . 310--310 Jo Ann Howell Remark on ``Algorithm 406: Exact Solution of Linear Equations Using Residue Arithmetic'' . . . . . . . . . . 311--311 Arthur H. J. Sale Remark on ``Algorithm 408: A Sparse Matrix Package'' . . . . . . . . . . . . 311--311 Robert E. Wheeler Remark on ``Algorithm 402: Increasing the Efficiency of Quicksort'' . . . . . 311--311 M. K. Roy Reflection-free permutations, rosary permutations and adjacent transposition algorithms . . . . . . . . . . . . . . . 312--312 Mohit Kumar Roy Reflection-Free Permutations, Rosary Permutations, and Adjacent Transposition Algorithms . . . . . . . . . . . . . . . 312--313 Clyde H. McMorrow Concerning music and computer composition in computational linguistics 313--313 Richard L. Wexelblat Another Comment on Computer Music . . . 313--314 Robert G. Estell A comment on the practical aspects of computer science education . . . . . . . 314--315 Roger Fajman and John Borgelt WYLBUR, An Interactive Text Editing and Remote Job Entry System . . . . . . . . 314--322 Dennis J. Frailey A Practical Approach to Managing Resources and Avoiding Deadlocks . . . . 323--329
Richard G. Hamlet Efficient multiprogramming resource allocation and accounting . . . . . . . 337--342 Erol Gelenbe and J. C. A. Boekhorst and J. L. W. Kessels Minimizing Wasted Space in Partitioned Segmentation . . . . . . . . . . . . . . 343--349 J. Carver Hill Synchronizing processors with memory-content-generated interrupts . . 350--351 Harold S. Stone and Samuel H. Fuller On the Near-Optimality of the Shortest-Latency-Time-First Drum Scheduling Discipline . . . . . . . . . 352--353 Peter F. Stockhausen Adapting optimal code generation for arithmetic expressions to the instruction sets available on present-day computers . . . . . . . . . 353--354 Robert F. Ling A Computer Generated Aid for Cluster Analysis . . . . . . . . . . . . . . . . 355--361 Ben Shneiderman Optimum Data Base Reorganization Points 362--365 Horst Strunz The development of decision tables via parsing of complex decision situations 366--369 James R. Bell Threaded Code . . . . . . . . . . . . . 370--372 John E. Hopcroft and Robert Endre Tarjan ACM Algorithm 447: Efficient Algorithms for Graph Manipulation [H] . . . . . . . 372--378 Terry Beyer and D. F. Swinehart ACM Algorithm 448: Number of Multiply-Restricted Partitions [A1] . . 379--379 J. Ferguson and P. A. Staley Least Squares Piecewise Cubic Curve Fitting . . . . . . . . . . . . . . . . 380--382 W. D. Hoskins Cubic spline solutions to fourth-order boundary value problems . . . . . . . . 382--385 Franz L. Alt and Judith Yuni Kirk Computer Photocomposition of Technical Text . . . . . . . . . . . . . . . . . . 386--391
Richard L. Nolan Managing the Computer Resource: A Stage Hypothesis . . . . . . . . . . . . . . . 399--405 J. C. Huang A Note on Information Organization and Storage . . . . . . . . . . . . . . . . 406--410 Edward W. Kozdrowicki and Dennis W. Cooper COKO III: the Cooper-Koz Chess Program 411--427 John H. Howard, Jr. Mixed Solutions for the Deadlock Problem 427--430 Erol Gelenbe Distribution of a Program in Primary and Fast Buffer Storage . . . . . . . . . . 431--434 Robert F. Rosin Teaching ``About Programming'' . . . . . 435--438 F. Warren McFarlan and Richard L. Nolan Curriculum Recommendations for Graduate Professional Programs in Information Systems: Recommended Addendum on Information Systems Administration . . . 439--441 Abraham Kandel Computer Science --- Seminars for Undergraduates . . . . . . . . . . . . . 442--442 Gregor von Bochmann Multiple Exits from a Loop Without the GOTO . . . . . . . . . . . . . . . . . . 443--444 Patrick A. V. Hall Equivalence Between AND/OR Graphs and Context-Free Grammars . . . . . . . . . 444--445 Frantisek Fiala ACM Algorithm 449: Solution of Linear Programming Problems in $0$-$1$ Variables [H1] . . . . . . . . . . . . . 445--447 Brian W. Kernighan Remark on ``Algorithm 422: Minimal Spanning Tree'' . . . . . . . . . . . . 448--448 I. D. G. Macleod and A. M. Collins Remark on ``Algorithm 420: Hidden-Line Plotting Program'' . . . . . . . . . . . 448--448 Paul J. Nikolai Certification of ``Algorithm 407: DIFSUB for Solution of Ordinary Differential Equations'' . . . . . . . . . . . . . . 448--448
Michael H. Smith A Learning Program Which Plays Partnership Dominoes . . . . . . . . . . 462--467 B. J. MacLennan Fen --- an Axiomatic Basis for Program Semantics . . . . . . . . . . . . . . . 468--474 David Misunas Petri Nets and Speed Independent Design 474--481 Marek Machura and Andrzej Mulawa ACM Algorithm 450: Rosenbrock Function Minimization [E4] . . . . . . . . . . . 482--483 Richard B. Goldstein ACM Algorithm 451: Chi-Square Quantiles [G1] . . . . . . . . . . . . . . . . . . 483--485 C. N. Liu and D. T. Tang ACM Algorithm 452: Enumerating Combinations of $m$ Out of $n$ Objects [G6] . . . . . . . . . . . . . . . . . . 485--485 Robert Piessens ACM Algorithm 453: Gaussian Quadrature Formulas for Bromwich's Integral [D1] 486--487 Joel A. Richardson and J. L. Kuester ACM Algorithm 454: The Complex Method for Constrained Optimization [E4] . . . 487--489 G. Andrejkova and J. Vinar Remark and Certification on ``Algorithm 404: Complex Gamma Function'' . . . . . 489--489 Richard M. De Morgan Remark on ``Algorithm 357: An Efficient Prime Number Generator [A1]'' . . . . . 489--489 Richard P. Watkins Remark on ``Algorithm 412: Graph Plotter'' . . . . . . . . . . . . . . . 489--490 J. G. Byrne Hu-Tucker minimum redundancy alphabetic coding method . . . . . . . . . . . . . 490--490 A. J. Good Clenshaw--Curtis quadrature . . . . . . 490--490 Edward J. Williams Remark on ``Algorithm 429: Localization of the Roots of a Polynomial'' . . . . . 490--490 J. G. Byrne Remark on ``Algorithm 428: Hu-Tucker Minimum Redundancy Alphabetic Coding Method'' . . . . . . . . . . . . . . . . 490 Albert J. Good Remark on ``Algorithm 424: Clenshaw--Curtis Quadrature'' . . . . . 490 Zohar Manna and Stephen Ness and Jean Vuillemin Inductive Methods for Proving Properties of Programs . . . . . . . . . . . . . . 491--502 W. W. Peterson and Tadao Kasami and Nobuki Tokura On the Capabilities of While, Repeat, and Exit Statements . . . . . . . . . . 503--512 Caxton C. Foster A Generalization of AVL Trees . . . . . 513--517
Jeffrey P. Buzen Computational Algorithms for Closed Queueing Networks with Exponential Servers . . . . . . . . . . . . . . . . 527--531 S. Ganapathy and V. Rajaraman Information Theory Applied to the Conversion of Decision Tables to Computer Programs . . . . . . . . . . . 532--539 Alfonso F. Cardenas Evaluation and Selection of File Organization --- A Model and System . . 540--548 Richard G. Casey Design of Tree Structures for Efficient Querying . . . . . . . . . . . . . . . . 549--556 Juan Rodriguez-Rosell Empirical Working Set Behavior . . . . . 556--560 Geoffrey W. Gates and David A. Poplawski A Simple Technique for Structured Variable Lookup . . . . . . . . . . . . 561--565 Marvin V. Zelkowitz Reversible Execution . . . . . . . . . . 566--566 Robert E. Barnhill and David T. Pilcher Sard kernels for certain bivariate cubatures . . . . . . . . . . . . . . . 567--570 D. B. Hunter and Julia M. Williams ACM Algorithm 455: Analysis of Skew Representations of the Symmetric Group 571--572 Zden\vek Fencl ACM Algorithm 456: Routing Problem . . . 572--574 Coen Bron and Joep Kerbosch ACM Algorithm 457: Finding All Cliques of an Undirected Graph . . . . . . . . . 575--577 Mohit Kumar Roy Remark on ``Algorithm 323: Generation of Permutations in Lexicographic Order [G6]'' . . . . . . . . . . . . . . . . . 577--578 E. E. Lawrence Remark on ``Algorithm 408: A Sparse Matrix Package'' . . . . . . . . . . . . 578--578 Hugh Williamson Remark on ``Algorithm 420: Hidden-Line Plotting Program'' . . . . . . . . . . . 578--579 H. B. Driessen and E. W. LeM. Hunt Remark on ``Algorithm 429: Localization of the Roots of a Polynomial'' . . . . . 579--579
John S. McGeachie Multiple Terminals Under User Program Control in a Time-Sharing Environment 587--590 Daniel G. Bobrow and Ben Wegbreit A Model and Stack Implementation of Multiple Environments . . . . . . . . . 591--603 Vincent Y. Lum General Performance Analysis of Key-to-Address Transformation Methods Using an Abstract File Concept . . . . . 603--612 Butler W. Lampson A Note on the Confinement Problem . . . 613--615 Daniel S. Hirschberg A Class of Dynamic Memory Allocation Algorithms . . . . . . . . . . . . . . . 615--618 Barton G. Prieve Using Page Residency to Select the Working Set Parameter . . . . . . . . . 619--620 Robert E. Millstein Control Structures in Illiac IV Fortran 621--627 Charles J. Mifsud and Michael J. Bohlen Addendum to a Multiple-Precision Division Algorithm . . . . . . . . . . . 628 P. D. Robers and S. S. Robers ACM Algorithm 458: Discrete Linear ${L}_1$ Approximation by Interval Linear Programming [E2] . . . . . . . . . . . . 629--631 Maciej M. Syslo ACM Algorithm 459: The Elementary Circuits of a Graph [H] . . . . . . . . 632--633 Paul E. Saylor and James D. Sebastian ACM Algorithm 460: Calculation of Optimum Parameters for Alternating Direction Implicit Procedures [D3] . . . 633--635 Forbes J. Burkowski and W. D. Hoskins ACM Algorithm 461: Cubic Spline Solutions to a Class of Functional Differential Equations [D2] . . . . . . 635--637 Thomas G. Donnelly ACM Algorithm 462: Bivariate Normal Distribution [S15] . . . . . . . . . . . 638--638 C. R. Lewart ACM Algorithm 463: Algorithms SCALE1, SCALE2, and SCALE3 for Determination of Scales on Computer Generated Plots [J6] 639--640
Charles W. Bachman The Programmer as Navigator . . . . . . 653--658 Robert S. Fabry Dynamic Verification of Operating System Decisions . . . . . . . . . . . . . . . 659--668 M. Dennis Mickunas and Victor B. Schneider A Parser-Generating System for Constructing Compressed Compilers . . . 669--676 B. W. Jordan, Jr. and R. C. Barrett Scan Conversion Algorithm with Reduced Storage Requirements . . . . . . . . . . 676--682 James R. Slagle and Lewis M. Norton Experiments with an Automatic Theorem-Prover Having Partial Ordering Inference Rules . . . . . . . . . . . . 682--688 Christian H. Reinsch ACM Algorithm 464: Eigenvalues of a Real, Symmetric, Tridiagonal Matrix [F2] 689--689 G. W. Hill ACM Algorithm 465: Student's $t$ Frequency [S14] . . . . . . . . . . . . 690--690 Gideon Ehrlich ACM Algorithm 466: Four Combinatorial Algorithms [G6] . . . . . . . . . . . . 690--691 Norman Brenner ACM Algorithm 467: Matrix Transposition in Place [F1] . . . . . . . . . . . . . 692--694 T. N. L. Patterson ACM Algorithm 468: Algorithm for Automatic Numerical Integration Over a Finite Interval [D1] . . . . . . . . . . 694--699 C. Lam and J. McKay ACM Algorithm 469: Arithmetic Overa Finite Field [A1] . . . . . . . . . . . 699--699 Peter J. Denning and G. Scott Graham A Note on Subexpression Ordering in the Evaluation of Arithmetic Expressions . . 700--702 Jerome A. Feldman and James R. Low and R. P. Brent Comment on Brent's scatter storage algorithm (and author's reply) . . . . . 703--703 Eberhard Wegner Tree-Structured Programs . . . . . . . . 704--705 Herbert E. Salzer A recurrence scheme for converting from one orthogonal expansion into another 705--707 Frank Stenger An algorithm for the approximate solution of Wiener--Hopf integral equations . . . . . . . . . . . . . . . 708--710 Louis W. Ehrlich Solving the Biharmonic Equation in a Square: a Direct Versus a Semidirect Method . . . . . . . . . . . . . . . . . 711--714
J. Daniel Couger Curriculum Recommendations for Undergraduate Programs in Information Systems . . . . . . . . . . . . . . . . 727--749 Edgar H. Sibley and Robert W. Taylor A Data Definition and Mapping Language 750--759 Milan Kubicek ACM Algorithm 470: Linear Systems with Almost Tridiagonal Matrix [F4] . . . . . 760--761 Walter Gautschi ACM Algorithm 471: Exponential Integrals [S13] . . . . . . . . . . . . . . . . . 761--763 John G. Herriot and Christian H. Reinsch ACM Algorithm 472: Procedures for Natural Spline Interpolation [E1] . . . 763--768
Gordon Lyon Syntax-directed least-errors analysis for context-free languages: a practical approach . . . . . . . . . . . . . . . . 3--14 Michael A. Malcolm and John Palmer A fast method for solving a class of tridiagonal linear systems . . . . . . . 14--17 Hiroshi Akima A method of bivariate interpolation and smooth surface fitting based on local procedures . . . . . . . . . . . . . . . 18--20 Norman E. Gibbs and William G. Poole, Jr. Tridiagonalization by Permutations . . . 20--24 Robert Piessens ACM Algorithm 473: Computation of Legendre Series Coefficients [C6] . . . 25--25 Hiroshi Akima ACM Algorithm 474: Bivariate Interpolation and Smooth Surface Fitting Based on Local Procedures [E2] . . . . . 26--31 Ivan E. Sutherland and Gary W. Hodgman Reentrant Polygon Clipping . . . . . . . 32--42 Peter J. H. King and Roger G. Johnson Comments on the algorithms of Verhelst for the conversion of limited-entry decision tables to flowcharts (and author's reply) . . . . . . . . . . . . 43--45 Gary D. Knott A Numbering System for Combinations . . 45--46 Henry C. Lucas, Jr. A CRT Report Generating System . . . . . 47--48
James B. Rothnie, Jr. and Tomas Lozano Attribute Based File Organization in a Paged Memory Environment . . . . . . . . 63--69 B. W. Jordan, Jr. and R. C. Barrett A Cell Organized Raster Display for Line Drawings . . . . . . . . . . . . . . . . 70--77 John S. Ramberg and Bruce W. Schmeiser An Approximate Method for Generating Asymmetric Random Variables . . . . . . 78--82 Leslie Lamport The Parallel Execution of DO Loops . . . 83--93 Henry F. Ledgard Production Systems: or can we do better than BNF? . . . . . . . . . . . . . . . 94--102 Ben Wegbreit The Synthesis of Loop Predicates . . . . 102--112
K. Sreenivasan and A. J. Kleinman On the Construction of a Representative Synthetic Workload . . . . . . . . . . . 127--133 E. Balkovich and W. Chiu and Leon Presser and R. Wood Dynamic Memory Repacking . . . . . . . . 133--138 Howard Lee Morgan Optimal Space Allocation on Disk Storage Devices . . . . . . . . . . . . . . . . 139--142 Rudolf Loeser Some Performance Tests of ``Quicksort'' and Descendants . . . . . . . . . . . . 143--152 Thomas Wright ACM Algorithm 475: Visible Surface Plotting Program [J6] . . . . . . . . . 152--155 Nancy E. Bosten and E. L. Battiste Remark on ``Algorithm 179: Incomplete Beta Ratio'' . . . . . . . . . . . . . . 156--157 R. C. Barrett and B. W. Jordan, Jr. Scan Conversion Algorithms for a Cell Organized Raster Display . . . . . . . . 157--163 Arunachalam Ravindran Remark on ``Algorithm 431: A Computer Routine for Quadratic and Linear Programming Problems'' . . . . . . . . . 157 David H. Withers Remark on ``Algorithm 419: Zeros of a Complex Polynomial'' . . . . . . . . . . 157 A. Frank Ackerman Quadratic Search for Hash Tables of Size $p^n$ . . . . . . . . . . . . . . . . . 164--164 Stephen W. Smoliar Emotional Content Considered Dangerous 164--165 Harold S. Stone A note on a combinatorial problem of Burnett and Coffman . . . . . . . . . . 165--166 Fred T. Krogh Efficient Implementation of a Variable Projection Algorithm for Nonlinear Least Squares Problems . . . . . . . . . . . . 167--169
Jerome H. Saltzer A Simple Linear Model of Demand Paging Performance . . . . . . . . . . . . . . 181--186 Mark A. Franklin and R. K. Gupta Computation of Page Fault Probability from Program Transition Diagram . . . . 186--191 John W. Boyse Execution Characteristics of Programs in a Page-On-Demand System . . . . . . . . 192--196 Graham Smith and Ian M. Sefton On Lions' Counter Example for Gotlieb's Method for the Construction of School Timetables . . . . . . . . . . . . . . . 196--197 Gary Lindstrom Copying List Structures Using Bounded Workspace . . . . . . . . . . . . . . . 198--202 Shimon Even Parallelism in Tape-Sorting . . . . . . 202--204 Henry C. Lucas, Jr. and David B. Montgomery and Jean Claude Larreche A study of computer use in a graduate school of business . . . . . . . . . . . 205--206 Peter Freeman and Michael A. Malcolm and William H. Payne Graduate Education: The Ph.D. Glut: Response and Rebuttal . . . . . . . . . 206--207 Theodor D. Sterling and Seymour V. Pollack Ideal teaching machines --- a solution to the pedagogic language problem . . . 207--208 Paul W. Abrahams Some Remarks on Lookup of Structured Variables . . . . . . . . . . . . . . . 209--210 Grover C. Simmons Addendum to M. L. Patrick Paper . . . . 209 A. Balfour An alternative approach to mutual recursion in Algol 60 using restricted compilers . . . . . . . . . . . . . . . 210--210 R. C. T. Lee and C. L. Chang and Richard J. Waldinger An Improved Program-Synthesizing Algorithm and its Correctness . . . . . 211--217 A. K. Cline Scalar- and Planar-Valued Curve Fitting Using Splines Under Tension. I . . . . . 218--220 A. K. Cline ACM Algorithm 476: Six Subprograms for Curve Fitting Using Splines Under Tension [E2] . . . . . . . . . . . . . . 220--223 Gideon Ehrlich ACM Algorithm 477: Generator of Set-Partitions to Exactly $R$ Subsets [G7] . . . . . . . . . . . . . . . . . . 224--225 Bo Einarsson Remark on ``Algorithm 443: Solution of the Transcendental Equation $w\exp(w)=x$'' . . . . . . . . . . . . . 225--225
Mary Shaw Reduction of Compilation Costs Through Language Contraction . . . . . . . . . . 245--250 Ben Wegbreit The Treatment of Data Types in EL1 . . . 251--264 Robert A. Wagner Order-$n$ Correction for Regular Languages . . . . . . . . . . . . . . . 265--268 Nai Kuan Tsao On the Distributions of Significant Digits and Roundoff Errors . . . . . . . 269--271 Marvin C. Wunderlich and J. L. Selfridge Design for a Number Theory Package with an Optimized Trial Division Routine . . 272--276 W. Morven Gentleman and Scott B. Marovich More on Algorithms that Reveal Properties of Floating Point Arithmetic Units . . . . . . . . . . . . . . . . . 276--277 D. E. Gold and David J. Kuck A Model for Masking Rotational Latency by Dynamic Disk Allocation . . . . . . . 278--288
Jacques Cohen and Carl Zuckerman Two Languages for Estimating Program Efficiency . . . . . . . . . . . . . . . 301--308 Lawrence J. Henschen and Ross A. Overbeek and Larry Wos A Theorem-Proving Language for Experimentation . . . . . . . . . . . . 308--314 James F. Gimpel The Minimization of Spatially-Multiplexed Character Sets . . 315--318 I. Barrodale and F. D. K. Roberts ACM Algorithm 478: Solution of an Overdetermined System of Equations in the $L_1$ Norm [F4] . . . . . . . . . . 319--320 R. L. Page ACM Algorithm 479: A Minimal Spanning Tree Clustering Method [Z] . . . . . . . 321--323 B. Gaither Hidden-line plotting program . . . . . . 324--324 Robert Piessens Remark on ``Algorithm 418: Calculation of Fourier Integrals'' . . . . . . . . . 324--324 Robert Piessens Remark on ``Algorithm 400: Modified Haåvie Integration'' . . . . . . . . . . 324--324 T. M. R. Ellis Remark on ``Algorithm 420: Hidden-Line Plotting Program'' . . . . . . . . . . . 324--325 Blaine Gaither Remark on ``Algorithm 420: Hidden-Line Plotting Program'' . . . . . . . . . . . 324 R. L. Page Remark on ``Algorithm 425: Generation of Random Correlated Normal Variables'' . . 325--325 D. M. Boulton Remark on ``Algorithm 434: Exact Probabilities for $R \times C$ Contingency Tables'' . . . . . . . . . . 326--326 William D. Slysz An Evaluation of Statistical Software in the Social Sciences . . . . . . . . . . 326--332 John Adams and John Gary Compact Representation of Contour Plots for Phone Line Transmission . . . . . . 333--336 William A. Wulf and Ellis S. Cohen and William M. Corwin and Anita K. Jones and Roy Levin and C. Pierson and Fred J. Pollack HYDRA: The Kernel of a Multiprocessor Operating System . . . . . . . . . . . . 337--345 Ian J. Barton and Susan E. Creasey and Michael F. Lynch and Michael J. Snell An Information-Theoretic Approach to Text Searching in Direct Access Systems 345--350 Edward Minieka On Computing Sets of Shortest Paths in a Graph . . . . . . . . . . . . . . . . . 351--353
Dennis M. Ritchie and Ken Thompson The UNIX Time-Sharing System . . . . . . 365--375 Samuel H. Fuller Minimal-Total-Processing Time Drum and Disk Scheduling Disciplines . . . . . . 376--381 John L. Bruno and Edward G. Coffman, Jr. and Ravi Sethi Scheduling Independent Tasks To Reduce Mean Finishing Time . . . . . . . . . . 382--387 Jerome H. Saltzer Protection and the Control of Information Sharing in Multics . . . . . 388--402 Robert S. Fabry Capability-Based Addressing . . . . . . 403--412 Gerald J. Popek and Robert P. Goldberg Formal Requirements for Virtualizable Third Generation Architectures . . . . . 412--421
Bruce Hahn A New Technique for Compression and Storage of Data . . . . . . . . . . . . 434--436 Arthur Evans, Jr. and William Kantrowitz and Edwin Weiss A User Authentication Scheme Not Requiring Secrecy in the Computer . . . 437--442 George B. Purdy A High Security Log-in Procedure . . . . 442--445 Theodore D. Friedman and Lance J. Hoffman Execution Time Requirements for Encipherment Programs . . . . . . . . . 445--449 G. A. Neufeld and John Tartar Graph Coloring Conditions for the Existence of Solutions to the Timetable Problem . . . . . . . . . . . . . . . . 450--453 Leslie Lamport A New Solution of Dijkstra's Concurrent Programming Problem . . . . . . . . . . 453--455 John C. Cavouras On the Conversion of Programs to Decision Tables: Method and Objectives 456--462 Tom Lyche and Larry L. Schumaker ACM Algorithm 480: Procedures for computing Smoothing and Interpolating Natural Splines [E1] . . . . . . . . . . 463--467 Keith C. Crandall ACM Algorithm 481: Arrow to Precedence Network Transformation [H] . . . . . . . 467--469 John McKay and E. Regener ACM Algorithm 482: Transitivity Sets [G7] . . . . . . . . . . . . . . . . . . 470--470 Adhemar Bultheel Remark on ``Algorithm 450: Rosenbrock Function Minimization'' . . . . . . . . 470 A. H. Stroud Gauss Harmonic Interpolation Formulas 471--475 Kenneth D. Shere Remark on ``Algorithm 454: The Complex Method for Constrained Optimization'' 471 Rolf O. E. Lagerlöf Interpolation with Rounded Ramp Functions . . . . . . . . . . . . . . . 476--479 Forman S. Acton Recurrence Relations for the Fresnel Integral $\int_0^\infty[\exp(-ct)dt/(t)^{1/2}(1+t^2)]$ and Similar Integrals 480--481
Daniel D. McCracken A Problem-List of Issues Concerning Computers and Public Policy --- A Report of the ACM Commitee on Computers and Public Policy . . . . . . . . . . . . . 495--503 I. M. Willers A New Integration Algorithm for Ordinary Differential Equations Based on Continued Fraction Approximations . . . 504--508 Oliver Aberth A Precise Numerical Analysis Program . . 509--513 To-yat. Cheung Interactive Graphic Display for Region Partitioning by Linear Programming . . . 513--516 Mario Schkolnick The Equivalence of Reducing Transition Languages and Deterministic Languages 517--519 Steven L. Watkins ACM Algorithm 483: Masked Three-Dimensional Plot Program with Rotations [J6] . . . . . . . . . . . . . 520--523 Keith H. Burrell ACM Algorithm 484: Evaluation of the Modified Bessel Functions ${K}_0(z)$ and ${K}_1(z)$ for Complex Arguments [S17] 524--526 Harold D. Eidson and Larry L. Schumaker ACM Algorithm 485: Computation of $g$-Splines via a Factorization Method [E2] . . . . . . . . . . . . . . . . . . 526--530 John W. Young A First Order Approximation to the Optimal Checkpoint Interval . . . . . . 530--531 Keith Shwayder Extending the Information Theory Approach to Converting Limited-Entry Decision Tables to Computer Programs . . 532--537
C. A. R. Hoare Monitors: An Operating System Structuring Concept . . . . . . . . . . 549--557 Kenneth K. Shen and James L. Peterson A Weighted Buddy Method for Dynamic Storage Allocation . . . . . . . . . . . 558--562 Donald R. Slutz and Irving L. Traiger A note on the calculation of average working set size . . . . . . . . . . . . 563--565 Ben Shneiderman and Peter Scheuermann Structured Data Structures . . . . . . . 566--574 R. H. Canaday and R. D. Harrison and Evan L. Ivie and J. L. Ryder and L. A. Wehr A Back-end Computer for Data Base Management . . . . . . . . . . . . . . . 575--582 A. Charnes and W. M. Raike and J. D. Stutz and A. S. Walters On Generation of Test Problems for Linear Programming Codes . . . . . . . . 583--586 Francoise Veillon ACM Algorithm 486: Numerical Inversion of Laplace Transform . . . . . . . . . . 587--589 Henk Koppelaar Certification and Remark on ``Algorithm 191: Hypergeometric'' . . . . . . . . . 589--590 L. G. Proll Remark on ``Algorithm 431: A Computer Routine for Quadratic and Linear Programming Problems'' . . . . . . . . . 590--590 Jiri Klemes and Jaroslav Klemsa Remark on ``Algorithm 450: Rosenbrock Function Minimization'' . . . . . . . . 590--591 Fred T. Krogh Errata: ``Efficient Implementation of a Variable Projection Algorithm for Nonlinear Least Squares'' . . . . . . . 591--591 Bruce Gilchrist and Richard E. Weber Enumerating Full-Time Programmers . . . 592--593
Theodor D. Sterling Guidelines for Humanizing Computerized Information Systems, A Report from Stanley House . . . . . . . . . . . . . 609--613 Domenico Ferrari Improving Locality by Critical Working Sets . . . . . . . . . . . . . . . . . . 614--620 Perry Lowell Miller A Locally-Organized Parser for Spoken Input . . . . . . . . . . . . . . . . . 621--630 Gary M. Rader Method for Composing Simple Traditional Music by Computer . . . . . . . . . . . 631--638 R. A. Freiburghouse Register Allocation Via Usage Counts . . 638--642 Edsger W. Dijkstra Self-stabilizing Systems in Spite of Distributed Control . . . . . . . . . . 643--644 J. A. Brown and Bernard Werner An On-Site Data Management System Application in Field Archaeology . . . . 644--646 David R. Hanson A simple technique for representing strings in Fortran IV . . . . . . . . . 646--647 C. J. Van Rijsbergen The Best-Match Problem in Document Retrieval . . . . . . . . . . . . . . . 648--649 R. V. Evans Multiple exits from a loop using neither GO TO nor labels . . . . . . . . . . . . 650--650
Donald E. Knuth Computer Programming as an Art . . . . . 667--673 Laurance I. Press Arguments for a Moratorium on the Construction of a Community Information Utility . . . . . . . . . . . . . . . . 674--678 Jon C. Strauss An analytic model of the Hasp execution task monitor . . . . . . . . . . . . . . 679--685 Thomas L. Adam and K. Mani Chandy and J. R. Dickson A Comparison of List Schedules for Parallel Processing Systems . . . . . . 685--690 N. D. Wallace Computer Generation of Gamma Random Variates with Non-Integral Shape Parameters . . . . . . . . . . . . . . . 691--695 A. Salazar and R. V. Oakford A Graph Formulation of a School Scheduling Algorithm . . . . . . . . . . 696--698 Sherwood C. Chu and Mones Berman An Exponential Method for the Solution of Systems of Ordinary Differential Equations . . . . . . . . . . . . . . . 699--702 John Pomeranz ACM Algorithm 487: Exact Cumulative Distribution of the Kolmogorov--Smirnov Statistic for Small Samples . . . . . . 703--704 Richard P. Brent ACM Algorithm 488: A Gaussian pseudo-random number generator [G5] . . 704--706 C. Bron Remark on ``Algorithm 426: Merge Sort Algorithm'' . . . . . . . . . . . . . . 706 T. M. R. Ellis Remark on ``Algorithm 420: Hidden-Line Plotting Program'' . . . . . . . . . . . 706 Gerhard Tesch Remark on ``Algorithm 456: Routing Problem'' . . . . . . . . . . . . . . . 706 C. William Skinner Heuristic Approach to Inductive Inference in Fact Retrieval Systems . . 707--712
Ralph A. Willoughby Special Issue Honoring Alston S. Householder --- Editor's Foreword . . . 3 Aaron Finerman Professionalism in the Computing Field 4--9 Friedrich L. Bauer Positivity and Norms . . . . . . . . . . 9--13 John Todd The Lemniscate Constants . . . . . . . . 14--19 G. Peters and James Hardy Wilkinson On the Stability of Gauss--Jordan Elimination with Pivoting . . . . . . . 20--24 Garrett Birkhoff Two Hadamard Numbers for Matrices . . . 25--29 A. van der Sluis Perturbations of Eigenvalues of Non-Normal Matrices . . . . . . . . . . 30--36 Marvin Marcus and Herbert Robinson Elementary Divisors of Tensor Products 36--39 Magnus R. Hestenes Pseudoinverses and Conjugate Gradients 40--43 Harlan D. Mills The New Math of Computer Programming . . 43--48 Tien Chi Chen and Irving T. Ho Storage-Efficient Representation of Decimal Data . . . . . . . . . . . . . . 49--52 Werner Liniger Connections Between Accuracy and Stability Properties of Linear Multistep Formulas . . . . . . . . . . . . . . . . 53--56 Richard J. Hanson Stably Updating Mean and Standard Deviation of Data . . . . . . . . . . . 57--58
G. J. Burnett and Edward G. Coffman, Jr. Analysis of Interleaved Memory Systems Using Blockage Buffers . . . . . . . . . 91--95 Neil M. Goldman Sentence Paraphrasing from a Conceptual Base . . . . . . . . . . . . . . . . . . 96--106 Gordon J. van der Brug and Jack Minker State-Space, Problem-Reduction, and Theorem Proving --- Some Relationships 107--115 Ove Skovgaard Remark on ``Algorithm 332: Jacobi Polynomials'' . . . . . . . . . . . . . 116--117 William J. Knight Certification of ``Algorithm 451: Chi-Square Quantiles'' . . . . . . . . . 116 T. W. Hancock Remark on ``Algorithm 434: Exact Probabilities for $R \times C$ Contingency Tables'' . . . . . . . . . . 117--119 H. S. Magnuski Remark on ``Algorithm 479: A Minimal Spanning Tree Clustering Method'' . . . 119 Maciej M. Syslo Remark on ``Algorithm 459: The Elementary Circuits of a Graph'' . . . . 119 Carolyn Kimme and Dana Ballard and Jack Sklansky Finding Circles by an Array of Accumulators . . . . . . . . . . . . . . 120--122 John McCarthy ACM Forum: Proposed Criterion for a Cipher to be Probable-Word-Proof . . . . 131--132
H. C. Johnston and C. A. R. Hoare Matrix Reduction --- an Efficient Method (school timetables) . . . . . . . . . . 141--150 Brian W. Kernighan and Lorinda L. Cherry A System for Typesetting Mathematics . . 151--157 Duncan H. Lawrie and T. Layman and D. Baer and J. M. Randal GLYPNIR --- A programming language for Illiac IV . . . . . . . . . . . . . . . 157--164 Robert W. Floyd and Ronald L. Rivest Expected Time Bounds for Selection . . . 165--172 Robert W. Floyd and Ronald L. Rivest ACM Algorithm 489: The Algorithm SELECT --- for Finding the $i$th Smallest of $n$ Elements [M1] . . . . . . . . . . . 173--173 Jerry D. Whitt and A. Gale Sullenberger The Algorithm Sequential Access Method: An Alternative to Index Sequential . . . 174--176 Richard Alan Karp A Reply to Gentleman and Marovich . . . 174 A. M. Erisman and W. F. Tinney On Computing Certain Elements of the Inverse of a Sparse Matrix . . . . . . . 177--179 L. F. Shampine Discrete Least Squares Polynomial Fits 179--180 A. van der Sluis Corrigendum: ``Perturbations of eigenvalues of non-normal matrices'' . . 180 David Lorge Parnas On a Solution to the Cigarette Smoker's Problem (Without Conditional Statements) 181--183
Jack A. Chambers and Ray V. Poore Computer Networks in Higher Education: Socio-Economic-Political Factors . . . . 193--199 E. S. Ginsberg and Dorothy Zaborowski ACM Algorithm 490: The Dilogarithm Function of a Real Argument [S22] . . . 200--202 K. K. Shen and J. L. Peterson Corrigendum: ``A Weighted Buddy Method for Dynamic Storage Allocation'' . . . . 202--202 Lawrence W. Frederick Remark on ``Algorithm 475'': Visible Surface Plotting Program [J6] . . . . . 202 Graham Smith On Maintenance of the Opportunity List for Class-Teacher Timetable Problems . . 203--208 I. C. Braid The Synthesis of Solids Bounded by Many Faces . . . . . . . . . . . . . . . . . 209--216 Vladimir Batagelj Quadratic Hash Method When the Table Size is not a Prime Number . . . . . . . 216--217 Henry S. Warren, Jr. A Modification of Warshall's Algorithm for the Transitive Closure of Binary Relations . . . . . . . . . . . . . . . 218--220 James A. Hinds Algorithm for Locating Adjacent Storage Blocks in the Buddy System . . . . . . . 221--222 Jean G. Vaucher and Pierre Duval A Comparison of Simulation Event List Algorithms . . . . . . . . . . . . . . . 223--230 Robert R. Korfhage and David W. Matula On Salazar and Oakford . . . . . . . . . 240--240 Michael R. Garey and David S. Johnson On Salazar and Oakford . . . . . . . . . 240--241
David A. Fisher Copying Cyclic List Structures in Linear Time Using Bounded Workspace . . . . . . 251--252 Alfonso F. Cardenas Analysis and Performance of Inverted Data Base Structures . . . . . . . . . . 253--263 Yorick Wilks An intelligent analyzer and understander of English . . . . . . . . . . . . . . . 264--274 Norman E. Gibbs ACM Algorithm 491: Basic Cycle Generation [H] . . . . . . . . . . . . . 275--276 Robert Piessens and Irene Mertens Remark and Certification on ``Algorithm 446: Ten Subroutines for the Manipulation of Chebyshev Series'' . . . 276--276 R. G. Mashburn Remark on ``Algorithm 475: Visible Surface Plotting Program'' . . . . . . . 276--277 C. J. Doran Remark on ``Algorithm 475: Visible Surface Plotting Program'' . . . . . . . 277 Fred N. Fritsch and Alan C. Hindmarsh Remark on ``Algorithm 478: Solution of an Overdetermined System of Equations in the $L_1$ Norm'' . . . . . . . . . . . . 277 D. J. Evans and Michael Hatzopoulos A note on the LU factorization of a symmetric matrix . . . . . . . . . . . . 278--279 B. L. Fox More on $k$th Shortest Paths . . . . . . 279--279 Anthony I. Wasserman A Problem-List of Public Policy Issues Concerning Computers and Health Care . . 279--280 Harlan D. Mills Corrigendum: ``The New Math of Computer Programming'' . . . . . . . . . . . . . 280--280 Steven L. Horowitz Syntactic Algorithm for Peak Detection in Waveforms with Applications to Cardiography . . . . . . . . . . . . . . 281--285 Charles E. Pfefferkorn Heuristic Problem Solving Design System for Equipment or Furniture Layouts . . . 286--297 Robert R. Korfhage and David W. Matula More on the Salazar and Oakford Paper 303--303
Norman E. Gibbs ACM Algorithm 492: Generation of All the Cycles of a Graph from a Set of Basic Cycles [H] . . . . . . . . . . . . . . . 310--310 Bui Tuong Phong Illumination for Computer Generated Pictures . . . . . . . . . . . . . . . . 311--317 Vincent Y. Lum and Michael E. Senko and C. P. Wang and H. Ling A Cost Oriented Algorithm for Data Set Allocation in Storage Hierarchies . . . 318--322 Alan F. Babich and John Grason and David Lorge Parnas Significant Event Simulation . . . . . . 323--329 Robert B. K. Dewar Indirect Threaded Code . . . . . . . . . 330--331 Ben Cranston and Rick Thomas Simplified Recombination Scheme for the Fibonacci Buddy System . . . . . . . . . 331--332 Alfred V. Aho and Margaret J. Corasick Efficient String Matching: an Aid to Bibliographic Search . . . . . . . . . . 333--340 Daniel S. Hirschberg A Linear Space Algorithm for Computing Maximal Common Subsequences . . . . . . 341--343 Stephen Soule Addition in an Arbitrary Base Without Radix Conversion . . . . . . . . . . . . 344--346 L. H. Harper and T. H. Payne and John E. Savage and E. Straus Sorting $X + Y$ . . . . . . . . . . . . 347--349 F. Paul Wyman Improved Event-Scanning Mechanisms for Discrete Event Simulation . . . . . . . 350--353 Donald E. Knuth and Charles T. Zahn, Jr. Ill-Chosen Use of ``Event'' . . . . . . 360--360
P. J. Courtois Decomposability, Instabilities, and Saturation in Multiprogramming Systems 371--377 Sòren Lauesen A Large Semaphore Based Operating System 377--389 Naomi Sager and Ralph Grishman Restriction Language for Computer Grammars of Natural Language . . . . . . 390--400 David Lorge Parnas and Daniel P. Siewiorek Use of the Concept of Transparency in the Design of Hierarchically Structured Systems . . . . . . . . . . . . . . . . 401--408 Herbert Freeman and Ruth Shapira Determining the Minimum-Area Encasing Rectangle for an Arbitrary Closed Curve 409--413 Daniel G. Bobrow A Note on Hash Linking . . . . . . . . . 413--415 Richard E. Weber and Bruce Gilchrist Discrimination in the employment of women in the computer industry . . . . . 416--418
John E. Shore On the External Storage Fragmentation Produced by First-Fit and Best-Fit Allocation Strategies . . . . . . . . . 433--440 Alfred V. Aho and Stephen C. Johnson and Jeffrey D. Ullman Deterministic Parsing of Ambiguous Grammars . . . . . . . . . . . . . . . . 441--452 Edsger W. Dijkstra Guarded Commands, Nondeterminacy and Formal Derivation of Programs . . . . . 453--457 Ira W. Cotton Remark on stably updating mean and standard deviation of data . . . . . . . 458--458 Stuart C. Shapiro and Stanley C. Kwasny Interactive Consulting via Natural Language . . . . . . . . . . . . . . . . 459--462 John Todd Corrigendum: ``The Lemniscate Constants'' . . . . . . . . . . . . . . 462--462 J. G. Vaucher and P. Duval Corrigendum: ``A comparison of simulation event list algorithms'' . . . 462--462 Alan Jay Smith Comments on a paper by T. C. Chen and I. T. Ho . . . . . . . . . . . . . . . . . 463--463 A. J. Smith Comments on a paper by T. C. Chen and I. T. Ho . . . . . . . . . . . . . . . . . 463--463 Sakti P. Ghosh Consecutive Storage of Relevant Records with Redundancy . . . . . . . . . . . . 464--471 Leslie Lamport Multiple Byte Processing with Full-Word Instructions . . . . . . . . . . . . . . 471--475 Keith Shwayder Combining Decision Rules in a Decision Table . . . . . . . . . . . . . . . . . 476--480
Guy L. Steele, Jr. Multiprocessing Compactifying Garbage Collection . . . . . . . . . . . . . . . 495--508 Jon Louis Bentley Multidimensional Binary Search Trees Used for Associative Searching . . . . . 509--517 R. Mark Claudson Digital Simulation of River Plankton Population Dynamics . . . . . . . . . . 517--523 William F. Piepmeier Optimal Balancing of I/O Requests to Disks . . . . . . . . . . . . . . . . . 524--527 Ben Wegbreit Mechanical Program Analysis . . . . . . 528--539
Rob Gerritsen A Preliminary System for the Design of DBTG Data Structures . . . . . . . . . . 551--557 Nan C. Shu and Barron C. Housel and Vincent Y. Lum CONVERT: A High Level Translation Definition Language for Data Conversion 557--567 T. Sterling and V. Lum and N. Shu and B. Housel \em CONVERT: A High Level Translation Definition Language for Data Conversion 557--567 John Miles Smith and Philip Yen-Tang Chang Optimizing the Performance of a Relational Algebra Data Base Interface 568--579 Morton M. Astrahan and Donald D. Chamberlin Implementation of a Structured English Query Language . . . . . . . . . . . . . 580--588 Fanica Gavril Merging with Parallel Processors . . . . 588--591 Martin Reiser and H. Kobayashi Horner's Rule for the Evaluation of General Closed Queueing Networks . . . . 592--593
Gerard Salton and A. Wong and C. S. Yang A Vector Space Model for Automatic Indexing . . . . . . . . . . . . . . . . 613--620 Raymond F. Boyce and Donald D. Chamberlin and W. Frank King III and Michael M. Hammer Specifying Queries as Relational Expressions: The SQUARE Data Sublanguage 621--628 Henry F. Ledgard and Michael Marcotty A Genealogy of Control Structures . . . 629--639 Susan L. Graham and Steven P. Rhodes Practical Syntactic Error Recovery . . . 639--650 James R. Bitner and Edward M. Reingold Backtrack Programming Techniques . . . . 651--656 Lawrence T. Kou and C. K. Wong A Note on the Set Basis Problem Related to the Compaction of Character Sets . . 656--657
Peter Naur Programming Languages, Natural Languages, and Mathematics . . . . . . . 676--683 John B. Goodenough Exception Handling: Issues and a Proposed Notation . . . . . . . . . . . 683--696 Mehdi Jazayeri and William F. Ogden and William C. Rounds The Intrinsically Exponential Complexity of the Circularity Problem for Attribute Grammars . . . . . . . . . . . . . . . . 697--706 Harry B. Hunt, III and Thomas G. Szymanski and Jeffrey D. Ullman On the Complexity of LR(k) Testing . . . 707--716 Susan L. Graham and Mark N. Wegman A Fast and Usually Linear Algorithm for Global Flow Analysis (Abstract) . . . . 716--716 Richard J. Lipton Reduction: A Method of Proving Properties of Parallel Programs . . . . 717--721 Jacob T. Schwartz Automatic Data Structure Choice in a Language of Very High Level . . . . . . 722--728
Leonard Kleinrock and William E. Naylor and Holger Opderbeck A Study of Line Overhead in the ARPANET 3--13 Neil C. Wilhelm An Anomaly in Disk Scheduling: A Comparison of FCFS and SSTF Seek Scheduling Using an Empirical Model for Disk Accesses . . . . . . . . . . . . . 13--17 Carson E. Agnew On Quadratic Adaptive Routing Algorithms 18--22 Philip L. Karlton and Samuel H. Fuller and R. E. Scroggs and E. B. Kaehler Performance of Height-Balanced Trees . . 23--28 J. J. Florentin Information Reference Coding . . . . . . 29--33 Charles R. Litecky and Gordon B. Davis Study of Errors, Error-Proneness, and Error Diagnosis in Cobol . . . . . . . . 33--37
Gregor von Bochmann Semantic Evaluation from Left to Right 55--62 Ronald L. Rivest On Self-Organizing Sequential Search Heuristics . . . . . . . . . . . . . . . 63--67 F. M. Ives Permutation Enumeration: Four New Permutation Algorithms . . . . . . . . . 68--72 Alberto Martelli Application of Heuristic Search Methods to Edge and Contour Detection . . . . . 73--83 Kenneth F. Siler A Stochastic Evaluation Model for Database Organization in Data Retrieval Systems . . . . . . . . . . . . . . . . 84--95 Ronald Fagin A Counterintuitive Example of Computer Paging . . . . . . . . . . . . . . . . . 96--97 Ehud Artzy and James A. Hinds and Harry J. Saal A Fast Division Technique for Constant Divisors . . . . . . . . . . . . . . . . 98--101 Donald E. Knuth Errata: ``Ancient Babylonian algorithms'' . . . . . . . . . . . . . .
Allen Newell and Herbert A. Simon Computer Science as Empirical Inquiry: Symbols and Search . . . . . . . . . . . 113--126 Jair M. Babad and Mario M. Modiano Joining Policies in a Multipriority Multiclass Batch Computer System . . . . 127--136 Frances E. Allen and John Cocke A Program Data Flow Analysis Procedure 137--147 Naftaly H. Minsky Intentional Resolution of Privacy Protection in Database Systems . . . . . 148--159 Whitfield Diffie and Martin E. Hellman A critique of the proposed Data Encryption Standard . . . . . . . . . . 164--165
Oliver R. Smoot Development of an international system for legal protection of computer programs . . . . . . . . . . . . . . . . 171--174 Bennet P. Lientz A Comparative Evaluation of Versions of BASIC . . . . . . . . . . . . . . . . . 175--181 J. Raymond LG: A Language for Analytic Geometry . . 182--187 Ronald Fagin Corrigendum: ``A Counterintuitive Example of Computer Paging'' . . . . . . 187 Shmuel Katz and Zohar Manna Logical Analysis of Programs . . . . . . 188--206
Dorothy E. Denning A Lattice Model of Secure Information Flow . . . . . . . . . . . . . . . . . . 236--243 Jonathan K. Millen Security Kernel Validation in Practice 243--250 Butler W. Lampson and Howard E. Sturgis Reflections on an Operating System Design . . . . . . . . . . . . . . . . . 251--265 A. Nico Habermann and Lawrence Flon and Lee W. Cooprider Modularization and Hierarchy in a Family of Operating Systems . . . . . . . . . . 266--272 John H. Howard Proving Monitors . . . . . . . . . . . . 273--279 Susan S. Owicki and David Gries Verifying Properties of Parallel Programs: An Axiomatic Approach . . . . 279--285 A. Wayne Madison and Alan P. Batson Characteristics of Program Localities 285--294 Barton G. Prieve and Robert S. Fabry VMIN --- an Optimal Variable-Space Page Replacement Algorithm . . . . . . . . . 295--297 Wesley W. Chu and Holger Opderbeck Analysis of the PFF Replacement Algorithm via a Semi-Markov Model . . . 298--304
Orrin E. Taulbee and Samuel D. Conte Production and employment of Ph.D.'s in computer science . . . . . . . . . . . . 311--313 Dennis G. Severance and Ricardo A. Duhne A Practitioner's Guide To Addressing Algorithms . . . . . . . . . . . . . . . 314--326 Forest Baskett and Alan Jay Smith Interference in Multiprocessor Computer Systems with Interleaved Memory . . . . 327--334 Gideon Frieder and Harry J. Saal Process for the Determination of Addresses in Variable Length Addressing 335--338 David S. Wise Referencing Lists by an Edge . . . . . . 338--342 Helmut Schumacher and Kenneth C. Sevcik The Synthetic Approach to Decision Table Conversion . . . . . . . . . . . . . . . 343--351 Douglas W. Clark An Efficient List Moving Algorithm Using constant Workspace . . . . . . . . . . . 352--354 Guy L. Steele, Jr. Corrigendum: ``Multiprocessing Compactifying Garbage Collection'' . . . 354--354 Gary D. Knott A Numbering System for Permutations of Combinations . . . . . . . . . . . . . . 355--356
Samuel D. Conte and Maurice H. Halstead Technology of Computer Center Management: a Proposed Course for Graduate Professional Programs in Computer Science or in Information Systems . . . . . . . . . . . . . . . . 369--370 Robert M. Keller Formal Verification of Parallel Programs 371--384 James C. King Symbolic Execution and Program Testing 385--394 Robert M. Metcalfe and David R. Boggs Ethernet: Distributed Packet Switching for Local Computer Networks . . . . . . 395--404 Cheng-Wen Cheng and Jonas Rabin Synthesis of Decision Rules . . . . . . 404--406 George S. Fishman Sampling from the Gamma-distribution on a computer . . . . . . . . . . . . . . . 407--409 Kurt Maly Compressed Tries . . . . . . . . . . . . 409--415 Warren Burton A Buddy System Variation for Disk Storage Allocation . . . . . . . . . . . 416--417 Gaston H. Gonnet Heaps Applied to Event Driven Mechanisms 417--418
John J. Donovan Tools and Philosophy for Software Education . . . . . . . . . . . . . . . 430--436 Robert D. Tennent The Denotational Semantics of Programming Languages . . . . . . . . . 437--453 James H. Clark Designing Surfaces in 3-D . . . . . . . 454--460 Michael A. Harrison and Walter L. Ruzzo and Jeffrey D. Ullman Protection in Operating Systems . . . . 461--471 Daniel S. Hirschberg An Insertion Technique for One-Sided Height-Balanced Trees . . . . . . . . . 471--473
Philip L. Wadler Analysis of an Algorithm for Real Time Garbage Collection . . . . . . . . . . . 491--500 Chee K. Yap New Upper Bounds for Selection . . . . . 501--508 Michael C. Loui Weighted Derivation Trees . . . . . . . 509--513 Kenneth G. Walter Recursion Analysis for Compiler Optimization . . . . . . . . . . . . . . 514--516 James R. Bitner and Gideon Ehrlich and Edward M. Reingold Efficient Generation of the Binary Reflected Gray Code and Its Applications 517--521 L. Peter Deutsch and Daniel G. Bobrow An Efficient, Incremental, Automatic Garbage Collector . . . . . . . . . . . 522--526 Ben Wegbreit Faster Retrieval from Context Trees . . 526--529 Wesley W. Chu and Holger Opderbeck Corrigendum: ``Analysis of the PFF replacement algorithm via a semi-Markov model'' . . . . . . . . . . . . . . . .
Udo W. Pooch Papers from SIGGRAPH 76 --- Introduction 541 James F. Blinn and Martin E. Newell Texture and Reflection in Computer Generated Images . . . . . . . . . . . . 542--547 James H. Clark Hierarchical Geometric Models for Visible Surface Algorithms . . . . . . . 547--554 Joshua Z. Levin A Parametric Algorithm for Drawing Pictures of Solid Objects Composed of Quadric Surfaces . . . . . . . . . . . . 555--563 N. Burtnyk and M. Wein Interactive Skeleton Techniques for Enhancing Motion Dynamics in Key Frame Animation . . . . . . . . . . . . . . . 564--569 James W. Frane The BMD and BMDP Series of Statistical Computer Programs . . . . . . . . . . . 570--576 C. Duong-Kien and Hans-Jürgen Hoffmann and D. Muth An improvement to Martin's algorithm for computation of linear precedence functions . . . . . . . . . . . . . . . 576--577 Richard G. Montanelli, Jr. and Sandra A. Mamrak Status of Women and Minorities in Academic Computer Science . . . . . . . 578--581
Douglas T. Ross Homilies for humble standards (computer applications) . . . . . . . . . . . . . 595--600 Henry F. Ledgard and William C. Cave Cobol Under Control . . . . . . . . . . 601--608 Thomas R. Wilcox and Alan M. Davis and Michael H. Tindall Design and Implementation of a Table Driven, Interactive Diagnostic Programming System . . . . . . . . . . . 609--616 Frank Rubin Experiments in Text File Compression . . 617--623 Kapali P. Eswaran and Jim N. Gray and Raymond A. Lorie and Irving L. Traiger The notions of consistency and predicate locks in a database system . . . . . . . 624--633 K. Maruyama and S. E. Smith Optimal Reorganization of Distributed Space Disk Files . . . . . . . . . . . . 634--642 Richard G. Hamlet High-Level Binding with Low-Level Linkers . . . . . . . . . . . . . . . . 642--644
Jean E. Sammet Roster of Programming Languages for 1974--75 . . . . . . . . . . . . . . . . 655--669 Bruce W. Arden The Computer Science and Engineering Research Study (COSERS) . . . . . . . . 670--673 Jay F. Nunamaker, Jr. and Benn R. Konsynski, Jr. and Thomas Ho and Carl Singer Computer-Aided Analysis and Design of Information Systems . . . . . . . . . . 674--687 George Stockman and Laveen N. Kanal and M. C. Kyle Structural Pattern Recognition of Carotid Pulse Waves Using a General Waveform Parsing System . . . . . . . . 688--695
Allen van Gelder Structured programming in COBOL: an approach for application programmers . . 2--12 Richard H. Austing and Bruce H. Barnes and Gerald L. Engel A Survey of the Literature in Computer Science Education Since Curriculum '68 13--21 Jair M. Babad A Record and File Partitioning Model . . 22--30 Albert L. Zobrist and Frederick R. Carlson, Jr. Detection of Combined Occurrences . . . 31--35 Alan P. Batson and Robert E. Brundage Segment Sizes and Lifetimes in Algol 60 Programs . . . . . . . . . . . . . . . . 36--44 David Gries On Believing Programs to be Correct . . 49--50
Mervin E. Muller An Approach to Multidimensional Data Array Processing by Computer . . . . . . 63--77 Douglas W. Clark and C. Cordell Green An Empirical Study of List Structure in Lisp . . . . . . . . . . . . . . . . . . 78--87 Franco P. Preparata and S. J. Hong Convex Hulls of Finite Sets of Points in Two and Three Dimensions . . . . . . . . 87--93 Malcolm C. Easton and B. T. Bennett Transient-Free Working-Set Statistics 93--99 Jack Bresenham A Linear Algorithm for Incremental Digital Display of Circular Arcs . . . . 100--106 Thoddi C. T. Kotiah and David I. Steinberg Occurrences of Cycling and Other Phenomena Arising in a Class of Linear Programming Models . . . . . . . . . . . 107--112 Gary D. Knott A Numbering System for Binary Trees . . 113--115
Philip Clapson Improving the Access Time for Random Access Files . . . . . . . . . . . . . . 127--135 Clement T. Yu and Gerard Salton Effective Information Retrieval Using Term Accuracy . . . . . . . . . . . . . 135--142 Åmund Lunde Empirical Evaluation of Some Features of Instruction Set Processor Architectures 143--153 R. M. Brown and James C. Browne and K. Mani Chandy Memory Management and Response Time . . 153--165 Warren Burton Representation of Many-Sided Polygons and Polygonal Lines for Rapid Processing 166--171 Harry B. Hunt III and Thomas G. Szymanski and Jeffrey D. Ullman Operations on Sparse Relations . . . . . 171--176 Richard L. Nolan Effects of Chargeout on User/Manager Attitudes . . . . . . . . . . . . . . . 177--185 Israel Borovits and Phillip Ein-Dor Cost/utilization: A measure of system performance . . . . . . . . . . . . . . 185--191 Carter Bays A Comparison of Next-fit, First-fit, and Best-fit . . . . . . . . . . . . . . . . 191--192 Eberhard Bertsch The Storage Requirement in Precedence Parsing . . . . . . . . . . . . . . . . 192--194
James H. Morris, Jr. and Ben Wegbreit Subgoal Induction . . . . . . . . . . . 209--222 Steven L. Tanimoto and Theodosios Pavlidis Editing of Picture Segmentations Using Local Analysis of Graphs . . . . . . . . 223--229 Nicholas V. Findler Studies in Machine Cognition Using the Game of Poker . . . . . . . . . . . . . 230--245 K. Maruyama and S. E. Smith Analysis of Design Alternatives for Virtual Memory Indexes . . . . . . . . . 245--254 Henry C. Lucas, Jr. and Jimmy A. Sutton The Stage Hypothesis and the S-Curve: Some Contradictory Evidence . . . . . . 254--259 S. Bing Yao Approximating the Number of Accesses in Database Organizations . . . . . . . . . 260--261 Clifford R. Hollander Remark on Uniform Insertion in Structured Data Structures . . . . . . . 261--262 S. K. Bandypadhyay Comment on Weighted Increment Linear Search for Scatter Tables . . . . . . . 262--263 C. D. Thompson and H. T. Kung Sorting on a Mesh-Connected Parallel Computer . . . . . . . . . . . . . . . . 263--271 Lawrence Robinson and Karl N. Levitt Proof Techniques for Hierarchically Structured Programs . . . . . . . . . . 271--283
Richard C. Holt and David B. Wortman and David T. Bardnard and James R. Cordy SP/k: A System for Teaching Computer Programming . . . . . . . . . . . . . . 301--309 George S. Fishman Achieving Specific Accuracy in Simulation Output Analysis . . . . . . . 310--315 Howard L. Morgan and K. Dan Levin Optimal Program and Data Locations in Computer Networks . . . . . . . . . . . 315--322 Jean-Loup Baer and B. Schwab A Comparison of Tree-Balancing Algorithms . . . . . . . . . . . . . . . 322--330 Neil J. Stillman and P. Bruce Berra A Comparison of Hardware and Software Associative Memories in the Context of Computer Graphics . . . . . . . . . . . 331--339 Marvin B. Shapiro Choice of Reference Points in Best-Match File Searching . . . . . . . . . . . . . 339--343 Michael Z. Hanani An Optimal Evaluation of Boolean Expressions in an Online Query System 344--347 Y. Milman An Approach to Optimal Design of Storage Parameters in Databases . . . . . . . . 347--350 James W. Hunt and Thomas G. Szymanski A Fast Algorithm for Computing Longest Common Subsequences . . . . . . . . . . 350--353
Orrin E. Taulbee and Samuel D. Conte Production and Employment of Ph.D.'s in Computer Science --- 1976 . . . . . . . 370--372 Ben Shneiderman and Richard E. Mayer and Don McKay and Peter Heller Experimental Investigations of the Utility of Detailed Flowcharts in Programming . . . . . . . . . . . . . . 373--381 Henry F. Ledgard and Robert W. Taylor Two Views of Data Abstraction --- Introduction to the Special Section . . 382--384 Moshé M. Zloof and S. Peter de Jong The System for Business Automation (SBA): Programming Language . . . . . . 385--396 John V. Guttag Abstract Data Types and the Development of Data Structures . . . . . . . . . . . 396--404 John Miles Smith and Diane C. P. Smith Database Abstractions: Aggregation . . . 405--413 David Gries and Narain H. Gehani Some Ideas on Data Types in High-Level Languages . . . . . . . . . . . . . . . 414--420 James L. Peterson and Theodore A. Norman Buddy Systems . . . . . . . . . . . . . 421--431 J. M. Robson A Bounded Storage Algorithm for Copying Cyclic Structures . . . . . . . . . . . 431--433 Richard S. Bird Notes on Recursion Elimination . . . . . 434--439 Henry S. Warren, Jr. Functions Realizable with Word-Parallel Logical and Two's-Complement Addition Instructions . . . . . . . . . . . . . . 439--441
Sandra A. Mamrak Dynamic Response Time Prediction for Computer Networks . . . . . . . . . . . 461--468 Manfred Ruschitzka and Robert S. Fabry A Unifying Approach to Scheduling . . . 469--477 William D. Tajibnapis A Correctness Proof of a Topology Information Maintenance Protocol for a Distributed Computer Network . . . . . . 477--485 Paul G. Heckel and Butler W. Lampson A Terminal-Oriented Communication System 486--494 Ben Ross Schneider, Jr. and Reid M. Watts SITAR: an Interactive Text Processing System for Small Computers . . . . . . . 495--499 Joep L. W. Kessels Alternative to Event Queues for Synchronization in Monitors . . . . . . 500--503 Dorothy E. Denning and Peter J. Denning Certification of Programs for Secure Information Flow . . . . . . . . . . . . 504--513 Jeffrey M. Barth Shifting Garbage Collection Overhead to Compile Time . . . . . . . . . . . . . . 513--518 Edward A. Ashcroft and William W. Wadge Lucid, a Nonprocedural Language with Iteration . . . . . . . . . . . . . . . 519--526 J. Nevil Brownlee An Algol-based implementation of SNOBOL 4 patterns . . . . . . . . . . . . . . . 527--529
James J. Horning Selected Papers from the ACM Conference on Language Design for Reliable Software --- Introduction . . . . . . . . . . . . 539 Charles M. Geschke and James H. Morris, Jr. and Edwin H. Satterthwaite Early Experience with Mesa . . . . . . . 540--553 Mary Shaw and William A. Wulf and Ralph L. London Abstraction and Verification in Alphard: Defining and Specifying Iteration and Generators . . . . . . . . . . . . . . . 553--564 Barbara Liskov and Alan Snyder and Russell R. Atkinson and Craig Schaffert Abstraction Mechanisms in CLU . . . . . 564--576 Niklaus Wirth Toward a Discipline of Real-Time Programming . . . . . . . . . . . . . . 577--583 John D. Gannon An Experimental Evaluation of Data Type Conventions . . . . . . . . . . . . . . 584--595 William R. Franta and Kurt Maly An Efficient Data Structure for the Simulation Event Set . . . . . . . . . . 596--602 Orrin E. Taulbee and Samuel D. Conte Corrigendum: Production and Employment of Ph.D.'s in Computer Science --- 1976 602 Eugene L. Lawler Comment on computing the $k$ shortest paths in a graph . . . . . . . . . . . . 603--604 Nissim Francez Another advantage of keyword notation for parameter communication with subprograms . . . . . . . . . . . . . . 604--605
Michael O. Rabin Complexity of Computations . . . . . . . 625--633 Dana S. Scott Logic and Programming Languages . . . . 634--641 Richard H. Austing The GRE Advanced Test in Computer Science . . . . . . . . . . . . . . . . 642--645 Robert W. Scheifler An Analysis of Inline Substitution for a Structured Programming Language . . . . 647--654 David K. Gifford Hardware Estimation of a Process' Primary Memory Requirements . . . . . . 655--663 Harry G. Mairson Some New Upper Bounds on the Generation of Prime Numbers . . . . . . . . . . . . 664--669 Edward M. McCreight Pagination of B*-Trees with Variable-Length Records . . . . . . . . 670--674
H. Fuchs and Zvi M. Kedem and Samuel P. Uselton Optimal Surface Reconstruction from Planar Contours . . . . . . . . . . . . 693--702 Sheng-Chuan C. Wu and John F. Abel and Donald P. Greenberg An Interactive Computer Graphics Approach to Surface Representation . . . 703--712 Barry K. Rosen High-Level Data Flow Analysis . . . . . 712--724 Carlo Montangero and Giuliano Pacini and Franco Turini Two-Level Control Structure for Nondeterministic Programming . . . . . . 725--730 Wilf R. LaLonde Regular Right Part Grammars and Their Parsers . . . . . . . . . . . . . . . . 731--741 Raymond R. Devillers Game Interpretation of the Deadlock Avoidance Problem . . . . . . . . . . . 741--745 Evan L. Ivie Programmer's Workbench --- a Machine for Software Development . . . . . . . . . . 746--753 Alan Jay Smith Multiprocessor Memory Organization and Memory Interference . . . . . . . . . . 754--761 Ben Ross Schneider, Jr. and Reid M. Watts Corrigendum: SITAR: An Interactive Text Processing System for Small Computers 761 Robert S. Boyer and J. Strother Moore A Fast String Searching Algorithm . . . 762--772
John A. N. Lee Considerations for future programming language standards activities . . . . . 788--794 Rollins Turner and William D. Strecker Use of the LRU Stack Depth Distribution for Simulation of Paging Behavior . . . 795--798 Franklin C. Crow The Aliasing Problem in Computer-Generated Shaded Images . . . . 799--805 Leslie Lamport Concurrent Reading and Writing . . . . . 806--811 John E. Shore Anomalous Behavior of the Fifty-Percent Rule in Dynamic Memory Allocation . . . 812--820 G. C. Stockman and Ashok K. Agrawala Equivalence of Hough curve detection to template matching . . . . . . . . . . . 820--822 Niklaus Wirth What can we do about the unnecessary diversity of notation for syntactic definitions? . . . . . . . . . . . . . . 822--823 M. K. Roy A note on reflection-free permutation enumeration . . . . . . . . . . . . . . 823--823 Mohit Kumar Roy A Note On Refection-Free Permutation Enumeration . . . . . . . . . . . . . . 823 Zohar Manna and Adi Shamir The Optimal Approach to Recursive Programs . . . . . . . . . . . . . . . . 824--831 Michael Hammer and W. Gerry Howe and Vincent J. Kruskal and Irving Wladawsky Very High Level Programming Language for Data Processing Applications . . . . . . 832--840 Renzo Sprugnoli Perfect Hashing Functions: A Single Probe Retrieving Method for Static Sets 841--850 John Cocke and Ken Kennedy An Algorithm for Reduction of Operator Strength . . . . . . . . . . . . . . . . 850--856 Richard S. Bird Improving Programs by the Introduction of Recursion . . . . . . . . . . . . . . 856--863 Norman R. Nielsen Dynamic Memory Allocation in Computer Simulation . . . . . . . . . . . . . . . 864--873 Michael W. Blasgen and Richard G. Casey and Kapali P. Eswaran An Encoding Method for Multifield Sorting and Indexing . . . . . . . . . . 874--878 Enrique Grapa and Geneva G. Belford Some Theorems to Aid in Solving the File Allocation Problem . . . . . . . . . . . 878--882
A. A. Lopez and Robert Raymond and Robert Tardiff A survey of computer science offerings in small liberal arts colleges . . . . . 902--906 Joep L. W. Kessels A Conceptual Framework for a Nonprocedural Programming Language . . . 906--913 J. Lawrence Carter A Case Study of a New Code Generation Technique for Compilers . . . . . . . . 914--920 David Gries An Exercise in Proving Parallel Programs Correct . . . . . . . . . . . . . . . . 921--930 Irene Greif A Language for Formal Problem Specification . . . . . . . . . . . . . 931--935 Marshall D. Abrams and Siegfried Treu A Methodology for Interactive Computer Service Measurement . . . . . . . . . . 936--944 James N. Danziger and William H. Dutton Computers as an innovation in American local governments . . . . . . . . . . . 945--956
Gordon Bell and Samuel H. Fuller and Daniel P. Siewiorek Forword to the Special Issue on Computer Architecture . . . . . . . . . . . . . . 3 Simon H. Lavington The Manchester Mark I and Atlas: a historical perspective . . . . . . . . . 4--12 R. N. Ibbett and P. C. Capon The Development of the MU5 Computer System . . . . . . . . . . . . . . . . . 13--24 B. R. Borgerson and M. L. Hanson and P. A. Hartley Evolution of the Sperry Univac 1100 Series: a History, Analysis, and Projection . . . . . . . . . . . . . . . 25--43 C. Gordon Bell and A. Kotok and Thomas N. Hastings and R. Hill The Evolution of the DECsystem 10 . . . 44--63 Richard M. Russell The Cray-1 Computer System . . . . . . . 63--72 Richard P. Case and Andris Padegs Architecture of the IBM System/370 . . . 73--96
Sandra A. Mamrak and Richard G. Montanelli, Jr. Computer Science Faculties: The Current Status of Minorities and Woman . . . . . 115--119 Ronald L. Rivest and Adi Shamir and Leonard M. Adleman A Method for Obtaining Digital Signatures and Public-Key Cryptosystems 120--126 Marc A. Auslander and H. Raymond Strong Systematic Recursion Removal . . . . . . 127--134 Lawrence T. Kou and Larry J. Stockmeyer and C. K. Wong Covering Edges by Cliques with Regard to Keyword Conflicts and Intersection Graphs . . . . . . . . . . . . . . . . . 135--139 Gerald Held and Michael Stonebraker B-trees Re-examined . . . . . . . . . . 139--143 William J. Stewart A Comparison of Numerical Techniques in Markov Modeling . . . . . . . . . . . . 144--152 Gabor T. Herman and Arnold Lent and Peter H. Lutz Relaxation Methods for Image Reconstruction . . . . . . . . . . . . . 152--158 Zohar Manna and Richard J. Waldinger Is `Sometime' Sometimes Better Than `Always'? (Intermittent Assertions in Proving Program Correctness) . . . . . . 159--172 Bruce J. Schachter and Azriel Rosenfeld Some New Methods of Detecting Step Edges in Digital Pictures . . . . . . . . . . 172--176
Henry C. Lucas, Jr. Use of an Interactive Information Storage and Retrieval System in Medical Research . . . . . . . . . . . . . . . . 197--205 William H. Dutton and Kenneth L. Kraemer Management Utilization of Computers in American Local Governments . . . . . . . 206--218 Ronald E. Anderson Value Orientation of Computer Science Students . . . . . . . . . . . . . . . . 219--225 S. Rao Kosaraju Insertions and Deletions in One-Sided Height-Balanced Trees . . . . . . . . . 226--227 Richard A. DeMillo and Stanley C. Eisenstat and Richard J. Lipton Preserving Average Proximity in Arrays 228--231 Mark A. Franklin and G. Scott Graham and R. K. Gupta Anomalies with Variable Partition Paging Algorithms . . . . . . . . . . . . . . . 232--236 Andrew S. Tanenbaum Implications of Structured Programming for Machine Architecture . . . . . . . . 237--246 Michael O. Rabin Corrigendum: ``Complexity of computations'' . . . . . . . . . . . . .
W. H. Payne and K. L. McMillen Orderly Enumeration of Nonsingular Binary Matrices Applied to Text Encryption . . . . . . . . . . . . . . . 259--263 Paul Heckel A Technique for Isolating Differences Between Files . . . . . . . . . . . . . 264--268 Art Lew Optimal Conversion of Extended-Entry Decision Tables with General Cost Criteria . . . . . . . . . . . . . . . . 269--279 Henry G. Baker, Jr. List Processing in Real Time on a Serial Computer . . . . . . . . . . . . . . . . 280--294 Ralph C. Merkle Secure Communications Over Insecure Channels . . . . . . . . . . . . . . . . 294--299 Thomas G. Szymanski Assembling Code for machines with Span-Dependent Instructions . . . . . . 300--308 Jean Vuillemin A Data Structure for Manipulating Priority Queues . . . . . . . . . . . . 309--315 Shimon Even and Michael Rodeh Economical Encoding of Commas Between Strings . . . . . . . . . . . . . . . . 315--317 R. C. H. Cheng Generating beta variates with nonintegral shape parameters . . . . . . 317--322
Douglas W. Clark A Fast Algorithm for Copying List Structures . . . . . . . . . . . . . . . 351--357 Anita K. Jones and Barbara H. Liskov A Language Extension for Expressing Constraints on Data Access . . . . . . . 358--367 Matthew M. Geller Test Data as an Aid in Proving Program Correctness . . . . . . . . . . . . . . 368--375 James R. Low Automatic Data Structure Selection: an Example and Overview . . . . . . . . . . 376--385 Michael Karr and David B. Loveman III Incorporation of Units into Programming Languages . . . . . . . . . . . . . . . 385--391 David R. Hanson and Ralph E. Griswold The SL5 Procedure Mechanism . . . . . . 392--400 Frederick Hayes-Roth and John P. McDermott An Interference Matching Technique for Inducing Abstractions . . . . . . . . . 401--410 J. M. Fleisher and R. R. Meyer New Sufficient Optimality Conditions for Integer Programming and Their Application . . . . . . . . . . . . . . 411--418 Pandu R. Tadikamalla Computer Generation of Gamma Random Variables . . . . . . . . . . . . . . . 419--422 Richard L. Sites Optimal Shift Strategy for a Block-Transfer CCD Memory . . . . . . . 423--425
Stuart H. Zweben and M. A. McDonald An Optimal Method for Deletion in One-Sided Height-Balanced Trees . . . . 441--445 James R. Driscoll and Y. Edmund Lien A Selective Traversal Algorithm for Binary Search Trees . . . . . . . . . . 445--447 Jacques Cohen and Martin S. Roth Analyses of Deterministic Parsing Algorithms . . . . . . . . . . . . . . . 448--458 M. Dennis Mickunas and John A. Modry Automatic Error Recovery for LR Parsers 459--465 Bennet P. Lientz and E. Burton Swanson and G. E. Tompkins Characteristics of Application Software Maintenance . . . . . . . . . . . . . . 466--471 Earl Chrysler Some Basic Determinants of Computer Programming Productivity . . . . . . . . 472--483 Rob Kling Automated Welfare Client-Tracking and Service Integration: the Political Economy of Computing . . . . . . . . . . 484--493 Erol Gelenbe and D. Derochette Performance of Rollback Recovery Systems Under Intermittent Failures . . . . . . 493--499 Toby J. Teorey General Equations for Idealized CPU-I/O Overlap Configurations . . . . . . . . . 500--507
David L. Waltz An English Language Query Answering System for a Large Relational Data Base 526--539 Michael L. Fredman and Bruce W. Weide On the complexity of computing the measure of $\bigcup[a_i,b_i]$ . . . . . 540--544 Francis Y. Chin An ${O}(n)$ Algorithm for Determining a Near-Optimal Computation Order of Matrix Chain Products . . . . . . . . . . . . . 544--549 Yehoshua Perl and Alon Itai and Haim Avni Interpolation Search --- A Log Log N Search . . . . . . . . . . . . . . . . . 550--553 Constantine Halatsis and George Philokyprou Pseudochaining in Hash Tables . . . . . 554--557 Leslie Lamport Time, Clocks, and the Ordering of Events in a Distributed System . . . . . . . . 558--565 Henry Givens Baker, Jr. Shallow Binding in Lisp 1.5 . . . . . . 565--569 Hanan Samet Proving the Correctness of Heuristically Optimized Code . . . . . . . . . . . . . 570--582 Robert E. Shostak An Algorithm for Reasoning About Equality . . . . . . . . . . . . . . . . 583--585 Rahul Chattergy and Udo W. Pooch Analysis of the Availability of Computer Systems Using Computer-Aided Algebra . . 586--591 Lawrence Snyder B-Trees Re-examined . . . . . . . . . . 594--594 Lawrence Snyder On B-trees Re-examined . . . . . . . . . 594
John Backus Can Programming Be Liberated From the von Neumann Style? A Functional Style and its Algebra of Programs . . . . . . 613--641 Rob Kling Value conflicts and social choice in electronic funds transfer system developments . . . . . . . . . . . . . . 642--657 Daniel S. Hirschberg Fast Parallel Sorting Algorithms . . . . 657--661 F. Lockwood Morris A Time- and Space-Efficient Garbage Compaction Algorithm . . . . . . . . . . 662--665 C. A. R. Hoare Communicating Sequential Processes . . . 666--677 Richard S. Brice and James C. Browne Feedback Coupled Resource Allocation Policies in the Multiprogramming-Multiprocessor Computer System . . . . . . . . . . . . . . . . . 678--686 Peter Scheuermann and C. Robert Carlson Self-Assessment Procedure V: a self-assessment procedure dealing with database systems . . . . . . . . . . . . 687--693
R. A. Harris and J. D. Zund An algorithm using symbolic techniques for the Bel-Petrov classification of gravitational fields . . . . . . . . . . 715--717 Herbert D. Schwetman Hybrid Simulation Models of Computer Systems . . . . . . . . . . . . . . . . 718--723 Jeffrey M. Barth A Practical Interprocedural Data Flow Analysis Algorithm . . . . . . . . . . . 724--736 Gerald J. Popek and David A. Farber Model for Verification of Data Security in Operating Systems . . . . . . . . . . 737--749 Peter J. Denning and Donald R. Slutz Generalized Working Sets for Segment Reference Strings . . . . . . . . . . . 750--759 Glenford J. Myers A Controlled Experiment in Program Testing and Code Walkthroughs/Inspections . . . . . . . . 760--768 Thomas Ottmann and Hans-Werner Six and Derick Wood Right Brother Trees . . . . . . . . . . 769--776 Ernst G. Ulrich Event Manipulation for Discrete Simulations Requiring Large Numbers of Events . . . . . . . . . . . . . . . . . 777--785 Kurt Maly A Note on Virtual Memory Indexes . . . . 786--787 Stephen A. Ward Real Time Plotting of Approximate Contour Maps . . . . . . . . . . . . . . 788--790 Aaron M. Tenenbaum Simulations of Dynamic Sequential Search Algorithms . . . . . . . . . . . . . . . 790--791
Walt Brainerd Fortran 77 . . . . . . . . . . . . . . . 806--820 Donald F. Towsley and K. Mani Chandy and James C. Browne Models for Parallel Processing Within Programs: Application to CPU:I/O and I/O:I/O Overlap . . . . . . . . . . . . 821--831 Ben Shneiderman Jump Searching: A Fast Sequential Search Technique . . . . . . . . . . . . . . . 831--834 Shi-Kuo Chang and Yin-Wah Wong Optimal Histogram Matching by Monotone Gray Level Transformation . . . . . . . 835--840 Robert Morris Counting Large Numbers of Events in Small Registers . . . . . . . . . . . . 840--842 Colin L. McMaster An Analysis of Algorithms for the Dutch National Flag Problem . . . . . . . . . 842--846 Robert Sedgewick Implementing Quicksort Programs . . . . 847--857 Gordon Lyon Packed Scatter Tables . . . . . . . . . 857--865 Malcolm C. Easton and Ronald Fagin Cold-Start Vs. Warm-Start Miss Ratios 866--872 William R. Franta and Kurt Maly A comparison of heaps and the TL structure for the simulation event set 873--875
Norman R. Lyons Systems Design Education: A Gaming Approach . . . . . . . . . . . . . . . . 889--895 J. W. Wendorf A Simply Extended and Modified Batch Environment Graphical System (Sembegs) 897--904 B. Kumar and Edward S. Davidson Performance Evaluation of Highly Concurrent Computers by Deterministic Simulation . . . . . . . . . . . . . . . 904--913 Berthold K. P. Horn and Brett L. Bachman Using Synthetic Images to Register Real Images with Surface Models . . . . . . . 914--924 Pandu R. Tadikamalla Computer Generation of Gamma Random Variables --- II . . . . . . . . . . . . 925--928 G. David Ripley A Simple Recovery-Only Procedure For Simple Precedence Parsers . . . . . . . 928--930 Daniel P. Friedman and David S. Wise A Note on Conditional Expressions . . . 931--933 Per Brinch Hansen Distributed Processes: A Concurrent Programming Concept . . . . . . . . . . 934--941 Fabrizio Luccio and Linda Pagli Power Trees . . . . . . . . . . . . . . 941--947 B. A. Sheil Median Split Trees: A Fast Lookup Technique for Frequently Occurring Keys 947--958 C. A. R. Hoare Corrigendum: ``Communicating Sequential Processes'' . . . . . . . . . . . . . . 958--958 Eugene C. Freuder Synthesizing Constraint Expressions . . 958--966 Edsger W. Dijkstra and Leslie Lamport and Alain J. Martin and C. S. Scholten and E. F. M. Steffens On-the-Fly Garbage Collection: An Exercise in Cooperation . . . . . . . . 966--975
Roger M. Needham and Michael D. Schroeder Using Encryption for Authentication in Large Networks of Computers . . . . . . 993--999 David Gries and Jayadev Misra A Linear Sieve Algorithm for Finding Prime Numbers . . . . . . . . . . . . . 999--1003 James L. Peterson and James R. Bitner and John H. Howard The Selection of Optimal Tab Settings 1004--1007 James C. Wetherbe and V. Thomas Dock Strategic Planning Methodology for the Computing Effort in Higher Education: an Empirical Evaluation . . . . . . . . . . 1008--1015 M. Ibramsha and V. Rajaraman Detection of Logical Errors in Decision Table Programs . . . . . . . . . . . . . 1016--1025 Alberto Martelli and Ugo Montanari Optimizing Decision Trees Through Heuristically Guided Search . . . . . . 1025--1039 Yogen K. Dalal and Robert M. Metcalfe Reverse Path Forwarding of Broadcast Packets . . . . . . . . . . . . . . . . 1040--1048 John V. Guttag and Ellis Horowitz and David R. Musser Abstract Data Types and Software Validation . . . . . . . . . . . . . . . 1048--1064 Jay M. Spitzen and Karl N. Levitt and Lawrence Robinson An Example of Hierarchical Design and Proof . . . . . . . . . . . . . . . . . 1064--1075 David Gries Corrigendum: ``An exercise in proving parallel programs correct'' . . . . . .
John W. Boyse Interference Detection Among Solids and Surfaces . . . . . . . . . . . . . . . . 3--9 Kent W. Colton The impact and use of computer technology by the police . . . . . . . . 10--20 Gian Carlo Bongiovanni and Fabrizio Luccio Permutation of Data Blocks in a Bubble Memory . . . . . . . . . . . . . . . . . 21--25 Charles H. Sauer and K. Mani Chandy The Impact of Distributions and Disciplines on Multiple Processor Systems . . . . . . . . . . . . . . . . 25--34 Jean-Pierre P. Banâtre and Jean-Paul P. Routeau and L. Trilling An Event-Driven Compiling Technique . . 34--42 Jacques J. Arsac Syntactic Source to Source Transforms and Program Manipulation . . . . . . . . 43--54
Orrin E. Taulbee and Samuel D. Conte Production and employment of Ph.D.s in computer science --- 1977 and 1978 . . . 75--76 Richard E. Fairley Employment characteristics of doctoral level computer scientists . . . . . . . 77--78 W. E. Gull and Michael A. Jenkins Recursive data structures in APL . . . . 79--96 É. Morel and C. Renvoise Global Optimization by Suppression of Partial Redundancies . . . . . . . . . . 96--103 M. R. Anderson and M. G. Anderson Comments on Perfect Hashing Functions: A Single Probe Retrieving Method for Static Sets . . . . . . . . . . . . . . 104--105 David R. Cheriton and Michael A. Malcolm and Lawrence S. Melen and Gary R. Sager Thoth, a Portable Real-Time Operating System . . . . . . . . . . . . . . . . . 105--115 David P. Reed and Rajendra K. Kanodia Synchronization with Eventcounts and Sequencers . . . . . . . . . . . . . . . 115--123 Haim Mendelson and Joseph S. Pliskin and Uri Yechiali Optimal Storage Allocation for Serial Files . . . . . . . . . . . . . . . . . 124--130
Richard H. Austing and Bruce H. Barnes and Della T. Bonnette and Gerald L. Engel and Gordon Stokes Curriculum '78: Recommendations for the Undergraduate Program in Computer Science --- A Report of the ACM Curriculum Committee on Computer Science 147--166 Albert D. Edgar and Samuel C. Lee FOCUS Microcomputer Number System . . . 166--177 James R. Slagle Experiments with Some Algorithms that Find Central Solutions for Pattern Classification . . . . . . . . . . . . . 178--183 Amaryllis Deliyanni and Robert A. Kowalski Logic and Semantic Networks . . . . . . 184--192 Dalia Motzkin Use of Normal Multiplication Tables for Information Storage and Retrieval . . . 193--207 C. L. McMaster Corrigendum: ``An Analysis of Algorithms for the Dutch National Flag Problem'' 207--207
Arthur M. Lesk Detection of Three-Dimensional Patterns of Atoms in Chemical Structures . . . . 219--224 E. G. Cale and Lee L. Gremillion and J. L. McKenney Price/Performance Patterns of U.S. Computer Systems . . . . . . . . . . . . 225--232 Giacomo Bucci and Donald N. Streeter Methodology for the Design of Distributed Information Systems . . . . 233--245 Richard J. Hanson and John A. Wisniewski A Mathematical Programming Updating Method Using Modified Givens Transformations and Applied to LP Problems . . . . . . . . . . . . . . . . 245--251 Daniel Brélaz New Methods to Color the Vertices of a Graph . . . . . . . . . . . . . . . . . 251--256
Richard A. De Millo and Richard J. Lipton and Alan J. Perlis Social Processes and Proofs of Theorems and Programs . . . . . . . . . . . . . . 271--280 Ernest J. H. Chang and Rosemary Roberts An improved algorithm for decentralized extrema-finding in circular configurations of processes . . . . . . 281--283 Theodor D. Sterling Consumer Difficulties with Computerized Transactions: an Empirical Investigation 283--289 John C. Reynolds Reasoning About Arrays . . . . . . . . . 290--299 Michael J. Manthey Model for and Discussion of Multi-Interpreter Systems . . . . . . . 299--309
Ronald S. Lemos An Implementation of Structured Walk-Throughs in Teaching Cobol Programming . . . . . . . . . . . . . . 335--340 Stavros N. Busenberg and Wing C. Tam An academic program providing realistic training in software engineering . . . . 341--345 Steven Alter Model for Automating File and Program Design in Business Application Systems 345--353 Jerome A. Feldman High Level Programming for Distributed Computing . . . . . . . . . . . . . . . 353--368 Robert Sedgewick Corrigendum: ``Implementing Quicksort Programs'' . . . . . . . . . . . . . . . 368--368 Ruth Shapira and Herbert Freeman The Cyclic Order Property of Vertices as an Aid in Scene Analysis . . . . . . . . 368--375
Terry Winograd Beyond Programming Languages . . . . . . 391--401 Franco P. Preparata An Optimal Real-Time Algorithm for Planar Convex Hulls . . . . . . . . . . 402--405 Patrick C. Fischer and Robert L. Probert Storage Reorganization Techniques for Matrix Computation in a Paging Environment . . . . . . . . . . . . . . 405--415 J. H. Hine and Isi Mitrani and S. Tsur The Control of Response Times in Multi-Class Systems by Memory Allocation 415--424 Robert A. Kowalski Algorithm = Logic + Control . . . . . . 424--436
J. W. Wong and G. Scott Graham Self-Assessment Procedure VI: a self-assessment procedure dealing with queueing network models of computer systems . . . . . . . . . . . . . . . . 449--454 Robert W. Floyd The Paradigms of Programming . . . . . . 455--460 Daniel S. Hirschberg and Ashok K. Chandra and Dilip V. Sarwate Computing Connected Components on Parallel Computers . . . . . . . . . . . 461--464 Nachum Dershowitz and Zohar Manna Proving Termination with Multiset Orderings . . . . . . . . . . . . . . . 465--476 Dorothy E. Denning Secure Personal Computing in an Insecure Network . . . . . . . . . . . . . . . . 476--482 Lloyd S. Nelson Further remark on stably updating mean and standard deviation estimates . . . . 483--483
Jerome A. Feldman and William R. Sutherland Rejuvenating Experimental Computer Science --- A Report to the National Science Foundation and Others . . . . . 497--502 Daniel D. McCracken, CCP and Peter J. Denning and David H. Brandin Addendum: An ACM Executive Committee Position on the Crisis in Experimental Computer Science . . . . . . . . . . . . 503--504 Zvi Galil On Improving the Worse Case Running Time of the Boyer--Moore String Matching Algorithm . . . . . . . . . . . . . . . 505--508 Kari-Jouko Räihä and Stuart H. Zweben An Optimal Insertion Algorithm for One-Sided Height-Balanced Binary Search Trees . . . . . . . . . . . . . . . . . 508--512 Wilfred J. Hansen Progressive acyclic digraphs --- a tool for database integrity . . . . . . . . . 513--518 George Nagy and Sharad G. Wagle Approximation of Polygonal Maps by Cellular Maps . . . . . . . . . . . . . 518--525 Tony F. Chan and John Gregg Lewis Computing Standard Deviations: Accuracy 526--531 D. H. D. West Updating mean and variance estimates: an improved method . . . . . . . . . . . . 532--535
Philip D. Laird Comment on: ``An optimal evaluation of Boolean expressions in an online query system'' [Comm. ACM, 20, 1977, no. 5, 344--347, MR 55 #9627] by M. Z. Hanani 549--550 Ehud Gudes and Anthony Hoffman A note on: ``An optimal evaluation of Boolean expressions in an online query system'' [Comm. ACM, 20, 1977, no. 5, 344--347, MR 55 #9627] by M. Z. Hanani 550--553 M. R. Anderson and M. G. Anderson Corrigendum: ``Comments on Perfect Hashing Functions: A Single Probe Retrieving Method for Static Sets'' . . 553 Leslie Lamport On the Proof of Correctness of a Calendar Program . . . . . . . . . . . . 554--556 Paul Klint Line Numbers Made Cheap . . . . . . . . 557--559 Tomás Lozano-Pérez and Michael A. Wesley An Algorithm for Planning Collision-Free Paths Among Polyhedral Obstacles . . . . 560--570 F. L. Morris On a Comparison of Garbage Collection Techniques . . . . . . . . . . . . . . . 571
Richard E. Mayer A Psychology of Learning BASIC . . . . . 589--593 Robert Morris and Ken Thompson Password Security --- A Case History . . 594--597 Shmuel Peleg and Azriel Rosenfeld Breaking Substitution Ciphers Using a Relaxation Algorithm . . . . . . . . . . 598--605 Robert Endre Tarjan and Andrew Chi Chih Yao Storing a Sparse Table . . . . . . . . . 606--611 Adi Shamir How to Share a Secret . . . . . . . . . 612--613
Rob Kling Introduction to the EFT Symposium . . . 639--640 Kenneth L. Kraemer and Kent W. Colton Overview of the EFT Symposium . . . . . 641--643 Allen H. Lipis Costs of the Current U.S. Payments System . . . . . . . . . . . . . . . . . 644--647 Robert H. Long Public Protection and Education with EFT 648--654 Donn B. Parker Vulnerabilities of EFTs to intentionally caused losses . . . . . . . . . . . . . 654--660 Kenneth L. Kraemer and Kent W. Colton Policy, values, and EFT research: anatomy of a research agenda . . . . . . 660--671 M. van der Nat On Interpolation Search . . . . . . . . 681
Peter K. Pearson Fast Hashing of Variable-Length Text Strings . . . . . . . . . . . . . . . . 677--680
Daniel M. Sunday A Very Fast Substring Search Algorithm 132--142
I. Dittmer Note on Fast Hashing of Variable Length Text Strings . . . . . . . . . . . . . . 118 Jacques Savoy Note on Fast Hashing of Variable Length Text Strings . . . . . . . . . . . . . . 118--119 James Litsios Note on Fast Hashing of Variable Length Text Strings . . . . . . . . . . . . . . 118--120 Peter Pearson Note on Fast Hashing of Variable Length Text Strings . . . . . . . . . . . . . . 120
Ricardo Baeza-Yates and Gaston H. Gonnet A new approach to text searching . . . . 74--82 Sun Wu and Udi Manber Fast text searching allowing errors . . 83--91
Donald E. Knuth Structured Programming with go to Statements . . . . . . . . . . . . . . . 261--301
Susan L. Graham and Mark Wegman A Fast and Usually Linear Algorithm for Global Flow Analysis . . . . . . . . . . 172--202
R. J. Brown Chromatic scheduling and the chromatic number problem . . . . . . . . . . . . . 451--463
Donald E. Knuth and J. H. Morris and V. R. Pratt Fast pattern matching in strings . . . . 323--350
A. L. Tharp and K.-C. Tai The practicality of text signatures for accelerating string searching . . . . . 35--44
Ove Skovgaard Remark on ``Algorithm 236: Bessel Functions of the First Kind [S17]'' . . 282--284 Jayadev Misra Remark on ``Algorithm 246: Graycode [Z]'' . . . . . . . . . . . . . . . . . 285--285
Robert Feinstein Remark on ``Algorithm 483: Masked Three-Dimensional Plot Program with Rotations [J6]'' . . . . . . . . . . . . 285--285
D. M. Boulton Remark on ``Algorithm 434: Exact Probabilities for $R\times{C}$ Contingency Tables [G2]'' . . . . . . . 108--108 Lucian D. Duta Remark on ``Algorithm 475: Visible Surface Plotting Program [J6]'' . . . . 109--110 G. M. White and S. Goudreau and J. L. Legros Remark on ``Algorithm 479: A Minimal Spanning Tree Clustering Method [Z]'' 110--111 J. Pomeranz Remark on ``Algorithm 487: Exact Cumulative Distribution of the Kolmogorov--Smirnov Statistic for Small Samples [S14]'' . . . . . . . . . . . . 111--111 Robert Morris Remark on ``Algorithm 490: The Dilogarithm Function of a Real Argument [S22]'' . . . . . . . . . . . . . . . . 112--112
Malcolm C. Pike and Jennie SooHoo Remark on ``Algorithm 179: Incomplete Beta Ratio [S14]'' . . . . . . . . . . . 207--208 Michael R. Anderson Remark on ``Algorithm 433: Interpolation and Smooth Curve Fitting Based on Local Procedures [E2]'' . . . . . . . . . . . 208--208
Alan M. Davies Remark on ``Algorithm 450: Rosenbrock Function Minimization [E4]'' . . . . . . 300--301 Theodore Brown Remark on ``Algorithm 489: The Algorithm SELECT --- for Finding the $i$th Smallest of $n$ Elements [M1]'' . . . . 301--304
M. R. Ito Remark on ``Algorithm 284: Interchange of Two Blocks of Data [K2]'' . . . . . . 392--393 Mohamed el Lozy Remark on ``Algorithm 299: Chi-Squared Integral [S15]'' . . . . . . . . . . . . 393--395 Henk Koppelaar and Peter Molenaar Remark on ``Algorithm 486: Numerical Inversion of Laplace Transform [D5]'' 395--396
Esko G. Cate and David W. Twigg Algorithm 513: Analysis of In-Situ Transposition [F1] . . . . . . . . . . . 104--110 Françoise Veillon Remark on ``Algorithm 486: Numerical Inversion of Laplace Transform'' . . . . 111--111
J. K. M. Jansen Remark on ``Algorithm 259: Legendre Functions for Arguments Larger than One'' . . . . . . . . . . . . . . . . . 204--250
Paolo Sipala Remark on ``Algorithm 408: A Sparse Matrix Package (Part I) [F4]'' . . . . . 303--303 Dennis Tenney Remark on ``Algorithm 219: Topological Ordering for PERT Networks'' . . . . . . 303--303
Ove Skovgaard Remark on ``Algorithm 149: Complete Elliptic Integral [S21]'' . . . . . . . 95--95
John P. Coleman Remark on ``Algorithm 49: Spherical Neumann Function'' . . . . . . . . . . . 295--295 Fred G. Gustavson Remark on ``Algorithm 408: A Sparse Matrix Package (Part I) [F4]'' . . . . . 295--295 Andrew Y. Schoene Remark on ``Algorithm 435: Modified Incomplete Gamma Function [S14]'' . . . 296--304
Mohamed el Lozy Remark on ``Algorithm 395: Student's $t$-Distribution'' and Remark on ``Algorithm 396: Student's Quantiles [S14]'' . . . . . . . . . . . . . . . . 238--239 K. O. Geddes Remark on ``Algorithm 424: Clenshaw--Curtis Quadrature [O1]'' . . . 240--240 M. R. Anderson Remark on ``Algorithm 474: Bivariate Interpolation and Smooth Surface Fitting Based on Local Procedures'' . . . . . . 241--241
Burton L. Leathers Remark on ``Algorithm 513: Analysis of In-Situ Transposition [F1]'' and Remark on ``Algorithm 467: Matrix Transposition in Place'' . . . . . . . . . . . . . . . 520--520 A. C. M. van Swieten and J. Th. M. de Hosson Remark on ``Algorithm 475: Visible Surface Plotting Program'' . . . . . . . 521--523
U. Harms and H. Kollakowski and G. Möller Remark on ``Algorithm 408: A Sparse Matrix Package (Part 1) [F4]'' . . . . . 456--457
G. W. Hill Remark on ``Algorithm 395: Student's $t$-Distribution'' . . . . . . . . . . . 247--249 G. W. Hill Remark on ``Algorithm 396: Student's $t$-Quantiles'' . . . . . . . . . . . . 250--251
Jürgen Peemöller A correction to Brélaz's modification of Brown's coloring algorithm . . . . . . . 595--597
M. C. Er Remark on ``Algorithm 246: Graycode [Z]'' . . . . . . . . . . . . . . . . . 441--443
I. D. Hill and M. C. Pike Remark on ``Algorithm 299: Chi-Squared Integral'' . . . . . . . . . . . . . . . 185--185
Marek Kubale and Boguslaw Jackowski A generalized implicit enumeration algorithm for graph coloring . . . . . . 412--418
Douglas W. Jones An empirical comparison of priority-queue and event-set implementations . . . . . . . . . . . . 300--311