


default search action
Communications of the ACM (CACM), Volume 31, 1988
Volume 31, Number 1, January 1988
- Graem A. Ringwood:

Parlog86 and the Dining Logicans. 10-25 - Jacques Cohen:

A View of the Origins and Development of Prolog. 26-36 - Robert A. Kowalski:

The Early Years of Logic Programming. 38-43
- Judy Kay, Piers Lauder:

A Fair Share Scheduler. 44-55 - Jack W. Stott, Jeffrey E. Kottemann:

Anatomy of a Compact User Interface Development Tool. 56-66
- Ron Weber:

Computer Technology and Jobs: An Impact Assessment Model. 68-77 - Yehuda Kahane, Seev Neumann, Charles S. Tapiero:

Computer Backup Pools, Disaster Recovery, and Default Risk. 78-83
Volume 31, Number 2, February 1988
- Karen A. Frenkel:

The Art and Science of Visualizing Data. 110-121 - Donald P. Greenberg:

Coons Award Lecture. 122-129, 151 - Paul S. Heckbert:

Ray Tracing Jell-0 Brand Gelatin. 130-134 - Clifford A. Pickover:

Pattern Formation and Chaos in Networks. 136-151 - Stephen I. Gallant:

Connectionist Expert Systems. 152-169 - Jerome A. Feldman, Mark A. Fanty, Nigel H. Goddard, Kenton J. Lynne:

Computing with Structured Connectionist Networks. 170-187
- Brian A. Nejmeh:

Npath: A Measure of Execution Path Complexity and Its Applications. 188-200 - Gerard Salton, Chris Buckley:

Parallel Text Search Methods. 202-215
- Voratas Kachitvichyanukul, Bruce W. Schmeiser:

Binomial Random Variate Generation. 216-222
Volume 31, Number 3, March 1988
- Abraham Peled:

Introduction: Turing Award Lecture (on behalf of John Cocke). Commun. ACM 31(3): 249 (1988) - John Cocke:

The Search for Performance in Scientific Processors (Turing Award Lecture). 250-253
- Alan Shaw:

Special Section on Operating Systems - Introduction. 255-257 - David Notkin, Andrew P. Black

, Edward D. Lazowska
, Henry M. Levy, Jan Sanislo, John Zahorjan:
Interconnecting Heterogeneous Computer Systems. 258-273 - Stuart R. Faulk, David Lorge Parnas:

On Synchronization in Hard-Real-Time Systems. 274-287 - David K. Gifford, Roger M. Needham, Michael D. Schroeder:

The Cedar System. 288-298 - Barbara Liskov:

Distributed Programming in Argus. 300-312 - David R. Cheriton:

The V Distributed System. 314-333
- John C. Munson:

Self-Assessment Procedure XVIII: A Self-Assessment Procedure Dealing with the Fundamentals of Data Communications. 334-341
- Jan L. Guynes:

Impact of System Response Time on State Anxiety. 342-347 - Bing-Chao Huang, Michael A. Langston:

Practical In-Place Merging. 348-352
Volume 31, Number 4, April 1988
- Robert E. Filman:

Reasoning with Worlds and Truth Maintenance in a Knowledge-Based Programming Environment. 382-401 - Christopher Cherniak:

Undebuggability and Cognitive Science. 402-412
- Michael R. Blaha, William J. Premerlani, James E. Rumbaugh:

Relational Database Design Using an Object-Oriented Methodology. 414-427 - Marilyn M. Mantei, Toby J. Teorey:

Cost/Benefit Analysis for Incorporating Human Factors in the Software Lifecycle. 428-439
- Bennett L. Fox, Peter W. Glynn:

Computing Poisson Probabilities. 440-445 - Per-Åke Larson:

Dynamic Hash Tables. 446-457
Volume 31, Number 5, May 1988
- Clifford Stoll:

Stalking the Wily Hacker. 484-497 - Roger A. Clarke

:
Information Technology and Dataveillance. 498-512 - David Harel:

On Visual Formalisms. 514-530
- John L. Gustafson:

Reevaluating Amdahl's Law. 532-533
- James M. Cupello, David J. Mishelevich:

Managing Prototype Knowledge/Expert System Projects. 534-541, 550 - Sid L. Huff, Malcolm Munro, Barbara H. Martin:

Growth Stages of End User Computing. 542-550
- Suzanne Rivard, Sid L. Huff:

Factors of Success for End-User Computing. 552-561 - Narayan S. Umanath, Richard W. Scamell:

An Experimental Evaluation of the Impact of Data Display Format on Recall Performance. 562-570 - Andrew W. Appel

, Guy J. Jacobson:
The World's Fastest Scrabble Program. 572-578 - Thomas E. Gerasch:

An Insertion Algorithm for a Minimal Internal Path Length Binary Search Tree. 579-585 - Michael J. Ginzberg, Jack J. Baroudi:

MIS Careers - A Theoretical Perspective. 586-594
Volume 31, Number 6, June 1988
- Paul W. Abrahams:

The Strategic Defense Initiative - President's Letter. 628-629
- Bartlett W. Mel, Stephen M. Omohundro, Arch Douglas Robison, Steven Skiena

, Kurt H. Thearling, Luke T. Young, Stephen Wolfram:
Tablet: Personal Computer in the Year 2000. 638-646 - Michael J. Callahan, David Hoffman, James T. Hoffman:

Computer Graphics Tools for the Study of Minimal Surfaces. 648-661
- Richard G. Hamlet:

Special Section on Software Testing. 662-667 - Elaine J. Weyuker:

The Evaluation of Program-Based Software Test Data Adequacy Criteria. 668-675 - Thomas J. Ostrand, Marc J. Balcer:

The Category-Partition Method for Specifying and Generating Functional Tests. 676-686 - David Gelperin, Bill Hetzel:

The Growth of Software Testing. 687-695
- Scott B. Guthery:

Self-Timing Programs and the Quantum Scheduler. 696-702
- Daniel R. Dolk:

Model Management and Structured Modeling: The Role of an Information Resource Dictionary System. 704-718 - Karen Appleby, Mats Carlsson, Seif Haridi, Dan Sahlin:

Garbage Collection for Prolog Based on WAM. 719-741 - Pierre L'Ecuyer

:
Efficient and Portable Combined Random Number Generators. 742-749 - Sukhamay Kundu:

The Equivalence of the Subregion Representation and the Wall Representation for a Certain Class of Rectangular Dissections. 752-763 - Sirkka L. Jarvenpaa, Gary W. Dickson:

Graphics and Managerial Decision Making: Research Based Guidlines. 764-774
Volume 31, Number 7, July 1988
- John B. Smith, Stephen F. Weiss:

Hypertext: Introduction to the Special Issue. Commun. ACM 31(7): 816-819 (1988) - Robert M. Akscyn, Donald L. McCracken, Elise A. Yoder:

KMS: A Distributed Hypermedia System for Managing Knowledge in Organizations. 820-835 - Frank G. Halasz:

Reflections on NoteCards: Seven Issues for the Next Generation of Hypermedia Systems. 836-852 - Brad Campbell, Joseph M. Goodman:

HAM: A General Purpose Hypertext Abstract Machine. 856-861 - Pankaj K. Garg:

Abstraction Mechanisms in Hypertext. 862-870 - Darrell R. Raymond, Frank Wm. Tompa

:
Hypertext and the Oxford English Dictionary. 871-879 - Mark E. Frisse

:
Searching for Information in a Hypertext Medical Handbook. 880-886 - Andries van Dam:

Hypertext '87: Keynote Address. 887-895
- Jason L. Frand, Ephraim R. McLean, Julia A. Britt:

Fourth Annual UCLA Survey of Business School Computer Usage. 896-910 - James L. Poirot, Harriet G. Taylor, Cathleen A. Norris:

Retraining Teachers to Teach High School Computer Science. 912-917
Volume 31, Number 8, August 1988
- Edward A. Fox

:
ACM Press Database and Electronic Products - New Services for the Information Age. 948-951
- Judith D. Wilson, Elizabeth S. Adams, Helene P. Baouendi, William A. Marion, Gayle J. Yaverbaum:

Computer Science Education in the People's Republic of China in the late 1980s. 956-964 - Shui F. Lam:

An Empirical Study of Computer Capacity Planning in Japan. 965-976 - Norman P. Archer, M. W. Luke Chan, Shu-Ji Huang, Rui-Ting Liu:

A Chinese-English Microcomputer System. 977-982
- David Gries

, Dorothy Marsh:
The 1986-1987 Taulbee Survey. 984-991 - Monty Newborn, Danny Kopec:

Results of ACM's Eighteenth Computer Chess Championship. 992-995
- Douglas W. Jones:

Application of Splay Trees to Data Compression. 996-1007 - Dilip V. Sarwate:

Computation of Cyclic Redundancy Checks via Table Look-Up. 1008-1013 - Larry Press:

Benchmarks for LAN Performance Evaluation. 1014-1017
Volume 31, Number 9, September 1988
- James H. Fetzer:

Program Verification: The Very Idea. 1048-1063 - John M. Carroll

, Amy P. Aaronson:
Learning by Doing with Simulated Intelligent Help. 1064-1079 - Wilfred J. Hansen, Christina Haas:

Reading and Writing with Computers: A Framework for Explaining Differences in Performance. 1080-1089
- Surya B. Yadav, Ralph R. Bravoco, Akemi T. Chatfield

, T. M. Rajkumar:
Comparison of Analysis Techniques for Information Requirement Determination. 1090-1097 - Alan M. Davis:

A Comparison of Techniques for the Specification of External System Behavior. 1098-1115
- Alok Aggarwal, Jeffrey Scott Vitter

:
The Input/Output Complexity of Sorting and Related Problems. 1116-1127 - Robert Courts:

Improving Locality of Reference in a Garbage-Collecting Memory Management System. 1128-1138
Volume 31, Number 10, October 1988
- Karen A. Frenkel:

Computers and Elections. 1176-1183 - Roy G. Saltman:

Accuracy, Integrity and Security in Computerized Vote-Tallying. 1184-1191, 1218
- Stephen K. Park, Keith W. Miller:

Random Number Generators: Good Ones Are Hard to Find. 1192-1201 - James E. Smith:

Characterizing Computer Performance with a Single Number. 1202-1206 - Michael D. Gordon:

Probabilistic and Genetic Algorithms in Document Retrieval. 1208-1218
- Randy Brown:

Calendar Queues: A Fast 0(1) Priority Queue Implementation for the Simulation Event Set Problem. 1220-1227 - David Rubinstein, Jeffrey O. Shallit, Mario Szegedy:

A Subset Coloring Algorithm and Its Applications to Computer Graphics. 1228-1232
Volume 31, Number 11, November 1988
- Ben Shneiderman, John M. Carroll:

Ecological Studies of Professional Programmers (Introduction to the Special Section). 1256-1258 - Elliot Soloway, Jeannine Pinto, Stanley Letovsky, David C. Littman, Robin Lampert:

Designing Documentation to Compensate for Delocalized Plans. 1259-1267 - Bill Curtis, Herb Krasner, Neil Iscoe:

A Field Study of the Software Design Process for Large Systems. 1268-1287 - Mary Beth Rosson, Susanne Maaß, Wendy A. Kellogg:

The Designer As User: Building Requirements for Design Tools From Design Practice. 1288-1298
- Udi Manber:

Using Induction to Design Algorithms. 1300-1313 - Paul C. K. Kwok

:
A Thinning Algorithm by Contour Generation. 1314-1324
- Clifford A. Pickover:

A Note on Chaos and Halley's Method. 1326-1329
- Joachim H. Ahrens, Ulrich Dieter:

Efficient Table-Free Sampling Methods for the Exponential, Cauchy, and Normal Distributions. 1330-1337 - Alon Itai, Yoav Raz:

The Number of Buffers Required for Sequential Processing of a Disk File. 1338-1342 - James R. Driscoll, Harold N. Gabow, Ruth Shrairman, Robert Endre Tarjan:

Relaxed Heaps: An Alternative to Fibonacci Heaps with Applications to Parallel Computation. 1343-1354
Volume 31, Number 12, December 1988
- Christopher J. Van Wyk, Eric Hamilton, Don Colner:

Expanding Generalized Regular Expressions. Commun. ACM 31(12): 1376-1385 (1988)
- Richard C. Holt, James R. Cordy:

The Turing Programming Language. 1410-1423 - Tore Risch, René Reboh, Peter E. Hart, Richard O. Duda:

A Functional Approach to Integrating Database and Expert Systems. 1424-1437 - Starr Roxanne Hiltz:

Productivity Enhancement from Computer-Mediated Communication: A System Contingency Approach. 1438-1454
- Feng-Yan Kuo, Jahangir Karimi:

User Interface Design from a Real Time Perspective. 1456-1466 - Niv Ahituv, Magid Igbaria:

A Model for Predicting and Evaluating Computer Resource Consumption. 1467-1473
- Gautam Mitra, Mehrdad Tamiz, Joseph Yadegar:

Experimental Investigation of an Interior Search Method Within a Simplex Framework. 1474-1482 - Michael Lebowitz:

The Use of Memory in Text Processing. 1483-1502

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














