Training courses

Kernel and Embedded Linux

Bootlin training courses

Embedded Linux, kernel,
Yocto Project, Buildroot, real-time,
graphics, boot time, debugging...

Bootlin logo

Elixir Cross Referencer

   1
   2
   3
   4
   5
   6
   7
   8
   9
  10
  11
  12
  13
  14
  15
  16
  17
  18
  19
  20
  21
  22
  23
  24
  25
  26
  27
  28
  29
  30
  31
  32
  33
  34
  35
  36
  37
  38
  39
  40
  41
  42
  43
  44
  45
  46
  47
  48
  49
  50
  51
  52
  53
  54
  55
  56
  57
  58
  59
  60
  61
  62
  63
  64
  65
  66
  67
  68
  69
  70
  71
  72
  73
  74
  75
  76
  77
  78
  79
  80
  81
  82
  83
  84
  85
  86
  87
  88
  89
  90
  91
  92
  93
  94
  95
  96
  97
  98
  99
 100
 101
 102
 103
 104
 105
 106
 107
 108
 109
 110
 111
 112
 113
 114
 115
 116
 117
 118
 119
 120
 121
 122
 123
 124
 125
 126
 127
 128
 129
 130
 131
 132
 133
 134
 135
 136
 137
 138
 139
 140
 141
 142
 143
 144
 145
 146
 147
 148
 149
 150
 151
 152
 153
 154
 155
 156
 157
 158
 159
 160
 161
 162
 163
 164
 165
 166
 167
 168
 169
 170
 171
 172
 173
 174
 175
 176
 177
 178
 179
 180
 181
 182
 183
 184
 185
 186
 187
 188
 189
 190
 191
 192
 193
 194
 195
 196
 197
 198
 199
 200
 201
 202
 203
 204
 205
 206
 207
 208
 209
 210
 211
 212
 213
 214
 215
 216
 217
 218
 219
 220
 221
 222
 223
 224
 225
 226
 227
 228
 229
 230
 231
 232
 233
 234
 235
 236
 237
 238
 239
 240
 241
 242
 243
 244
 245
 246
 247
 248
 249
 250
 251
 252
 253
 254
 255
 256
 257
 258
 259
 260
 261
 262
 263
 264
 265
 266
 267
 268
 269
 270
 271
 272
 273
 274
 275
 276
 277
 278
 279
 280
 281
 282
 283
 284
 285
 286
 287
 288
 289
 290
 291
 292
 293
 294
 295
 296
 297
 298
 299
 300
 301
 302
 303
 304
 305
 306
 307
 308
 309
 310
 311
 312
 313
 314
 315
 316
 317
 318
 319
 320
 321
 322
 323
 324
 325
 326
 327
 328
 329
 330
 331
 332
 333
 334
 335
 336
 337
 338
 339
 340
 341
 342
 343
 344
 345
 346
 347
 348
 349
 350
 351
 352
 353
 354
 355
 356
 357
 358
 359
 360
 361
 362
 363
 364
 365
 366
 367
 368
 369
 370
 371
 372
 373
 374
 375
 376
 377
 378
 379
 380
 381
 382
 383
 384
 385
 386
 387
 388
 389
 390
 391
 392
 393
 394
 395
 396
 397
 398
 399
 400
 401
 402
 403
 404
 405
 406
 407
 408
 409
 410
 411
 412
 413
 414
 415
 416
 417
 418
 419
 420
 421
 422
 423
 424
 425
 426
 427
 428
 429
 430
 431
 432
 433
 434
 435
 436
 437
 438
 439
 440
 441
 442
 443
 444
 445
 446
 447
 448
 449
 450
 451
 452
 453
 454
 455
 456
 457
 458
 459
 460
 461
 462
 463
 464
 465
 466
 467
 468
 469
 470
 471
 472
 473
 474
 475
 476
 477
 478
 479
 480
 481
 482
 483
 484
 485
 486
 487
 488
 489
 490
 491
 492
 493
 494
 495
 496
 497
 498
 499
 500
 501
 502
 503
 504
 505
 506
 507
 508
 509
 510
 511
 512
 513
 514
 515
 516
 517
 518
 519
 520
 521
 522
 523
 524
 525
 526
 527
 528
 529
 530
 531
 532
 533
 534
 535
 536
 537
 538
 539
 540
 541
 542
 543
 544
 545
 546
 547
 548
 549
 550
 551
 552
 553
 554
 555
 556
 557
 558
 559
 560
 561
 562
 563
 564
 565
 566
 567
 568
 569
 570
 571
 572
 573
 574
 575
 576
 577
 578
 579
 580
 581
 582
 583
 584
 585
 586
 587
 588
 589
 590
 591
 592
 593
 594
 595
 596
 597
 598
 599
 600
 601
 602
 603
 604
 605
 606
 607
 608
 609
 610
 611
 612
 613
 614
 615
 616
 617
 618
 619
 620
 621
 622
 623
 624
 625
 626
 627
 628
 629
 630
 631
 632
 633
 634
 635
 636
 637
 638
 639
 640
 641
 642
 643
 644
 645
 646
 647
 648
 649
 650
 651
 652
 653
 654
 655
 656
 657
 658
 659
 660
 661
 662
 663
 664
 665
 666
 667
 668
 669
 670
 671
 672
 673
 674
 675
 676
 677
 678
 679
 680
 681
 682
 683
 684
 685
 686
 687
 688
 689
 690
 691
 692
 693
 694
 695
 696
 697
 698
 699
 700
 701
 702
 703
 704
 705
 706
 707
 708
 709
 710
 711
 712
 713
 714
 715
 716
 717
 718
 719
 720
 721
 722
 723
 724
 725
 726
 727
 728
 729
 730
 731
 732
 733
 734
 735
 736
 737
 738
 739
 740
 741
 742
 743
 744
 745
 746
 747
 748
 749
 750
 751
 752
 753
 754
 755
 756
 757
 758
 759
 760
 761
 762
 763
 764
 765
 766
 767
 768
 769
 770
 771
 772
 773
 774
 775
 776
 777
 778
 779
 780
 781
 782
 783
 784
 785
 786
 787
 788
 789
 790
 791
 792
 793
 794
 795
 796
 797
 798
 799
 800
 801
 802
 803
 804
 805
 806
 807
 808
 809
 810
 811
 812
 813
 814
 815
 816
 817
 818
 819
 820
 821
 822
 823
 824
 825
 826
 827
 828
 829
 830
 831
 832
 833
 834
 835
 836
 837
 838
 839
 840
 841
 842
 843
 844
 845
 846
 847
 848
 849
 850
 851
 852
 853
 854
 855
 856
 857
 858
 859
 860
 861
 862
 863
 864
 865
 866
 867
 868
 869
 870
 871
 872
 873
 874
 875
 876
 877
 878
 879
 880
 881
 882
 883
 884
 885
 886
 887
 888
 889
 890
 891
 892
 893
 894
 895
 896
 897
 898
 899
 900
 901
 902
 903
 904
 905
 906
 907
 908
 909
 910
 911
 912
 913
 914
 915
 916
 917
 918
 919
 920
 921
 922
 923
 924
 925
 926
 927
 928
 929
 930
 931
 932
 933
 934
 935
 936
 937
 938
 939
 940
 941
 942
 943
 944
 945
 946
 947
 948
 949
 950
 951
 952
 953
 954
 955
 956
 957
 958
 959
 960
 961
 962
 963
 964
 965
 966
 967
 968
 969
 970
 971
 972
 973
 974
 975
 976
 977
 978
 979
 980
 981
 982
 983
 984
 985
 986
 987
 988
 989
 990
 991
 992
 993
 994
 995
 996
 997
 998
 999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
2189
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
2376
2377
2378
2379
2380
2381
2382
2383
2384
2385
2386
2387
2388
2389
2390
2391
2392
2393
2394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
2511
2512
2513
2514
2515
2516
2517
2518
2519
2520
2521
2522
2523
2524
2525
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
2541
2542
2543
2544
2545
2546
2547
2548
2549
2550
2551
2552
2553
2554
2555
2556
2557
2558
2559
2560
2561
2562
2563
2564
2565
2566
2567
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
2583
2584
2585
2586
2587
2588
2589
2590
2591
2592
2593
2594
2595
2596
2597
2598
2599
2600
2601
2602
2603
2604
2605
2606
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
2630
2631
2632
2633
2634
2635
2636
2637
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
2652
2653
2654
2655
2656
2657
2658
2659
2660
2661
2662
2663
2664
2665
2666
2667
2668
2669
2670
2671
2672
2673
2674
2675
2676
2677
2678
2679
2680
2681
2682
2683
2684
2685
2686
2687
2688
2689
2690
2691
2692
2693
2694
2695
2696
2697
2698
2699
2700
2701
2702
2703
2704
2705
2706
2707
2708
2709
2710
2711
2712
2713
2714
2715
2716
2717
2718
2719
2720
2721
2722
2723
2724
2725
2726
2727
2728
2729
2730
2731
2732
2733
2734
2735
2736
2737
2738
2739
2740
2741
2742
2743
2744
2745
2746
2747
2748
2749
2750
2751
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
2771
2772
2773
2774
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
2790
2791
2792
2793
2794
2795
2796
2797
2798
2799
2800
2801
2802
2803
2804
2805
2806
2807
2808
2809
2810
2811
2812
2813
2814
2815
2816
2817
2818
2819
2820
2821
2822
2823
2824
2825
2826
2827
2828
2829
2830
2831
2832
2833
2834
2835
2836
2837
2838
2839
2840
2841
2842
2843
2844
2845
2846
2847
2848
2849
2850
2851
2852
2853
2854
2855
2856
2857
2858
2859
2860
2861
2862
2863
2864
2865
2866
2867
2868
2869
2870
2871
2872
2873
2874
2875
2876
2877
2878
2879
2880
2881
2882
2883
2884
2885
2886
2887
2888
2889
2890
2891
2892
2893
2894
2895
2896
2897
2898
2899
2900
2901
2902
2903
2904
2905
2906
2907
2908
2909
2910
2911
2912
2913
2914
2915
2916
2917
2918
2919
2920
2921
2922
2923
2924
2925
2926
2927
2928
2929
2930
2931
2932
2933
2934
2935
2936
2937
2938
2939
2940
2941
2942
2943
2944
2945
2946
2947
2948
2949
2950
2951
2952
2953
2954
2955
2956
2957
2958
2959
2960
2961
2962
2963
2964
2965
2966
2967
2968
2969
2970
2971
2972
2973
2974
2975
2976
2977
2978
2979
2980
2981
2982
2983
2984
2985
2986
2987
2988
2989
2990
2991
2992
2993
2994
2995
2996
2997
2998
2999
3000
3001
3002
3003
3004
3005
3006
3007
3008
3009
3010
3011
3012
3013
3014
3015
3016
3017
3018
3019
3020
3021
3022
3023
3024
3025
3026
3027
3028
3029
3030
3031
3032
3033
3034
3035
3036
3037
3038
3039
3040
3041
3042
3043
3044
3045
3046
3047
3048
3049
3050
3051
3052
3053
3054
3055
3056
3057
3058
3059
3060
3061
3062
3063
3064
3065
3066
3067
3068
3069
3070
3071
3072
3073
3074
3075
3076
3077
3078
3079
3080
3081
3082
3083
3084
3085
3086
3087
3088
3089
3090
3091
3092
3093
3094
3095
3096
3097
3098
3099
3100
3101
3102
3103
3104
3105
3106
3107
3108
3109
3110
3111
3112
3113
3114
3115
3116
3117
3118
3119
3120
3121
3122
3123
3124
3125
3126
3127
3128
3129
3130
3131
3132
3133
3134
3135
3136
3137
3138
3139
3140
3141
3142
3143
3144
3145
3146
3147
3148
3149
3150
3151
3152
3153
3154
3155
3156
3157
3158
3159
3160
3161
3162
3163
3164
3165
3166
3167
3168
3169
3170
3171
3172
3173
3174
3175
3176
3177
3178
3179
3180
3181
3182
3183
3184
3185
3186
3187
3188
3189
3190
3191
3192
3193
3194
3195
3196
3197
3198
3199
3200
3201
3202
3203
3204
3205
3206
3207
3208
3209
3210
3211
3212
3213
3214
3215
3216
3217
3218
3219
3220
3221
3222
3223
3224
3225
3226
3227
3228
3229
3230
3231
3232
3233
3234
3235
3236
3237
3238
3239
3240
3241
3242
3243
3244
3245
3246
3247
3248
3249
3250
3251
3252
3253
3254
3255
3256
3257
3258
3259
3260
3261
3262
3263
3264
3265
3266
3267
3268
3269
3270
3271
3272
3273
3274
3275
3276
3277
3278
3279
3280
3281
3282
3283
3284
3285
3286
3287
3288
3289
3290
3291
3292
3293
3294
3295
3296
3297
3298
3299
3300
3301
3302
3303
3304
3305
3306
3307
3308
3309
3310
3311
3312
3313
3314
3315
3316
3317
3318
3319
3320
3321
3322
3323
3324
3325
3326
3327
3328
3329
3330
3331
3332
3333
3334
3335
3336
3337
3338
3339
3340
3341
3342
3343
3344
3345
3346
3347
3348
3349
3350
3351
3352
3353
3354
3355
3356
3357
3358
3359
3360
3361
3362
3363
3364
3365
3366
3367
3368
3369
3370
3371
3372
3373
3374
3375
3376
3377
3378
3379
3380
3381
3382
3383
3384
3385
3386
3387
3388
3389
3390
3391
3392
3393
3394
3395
3396
3397
3398
3399
3400
3401
3402
3403
3404
3405
3406
3407
3408
3409
3410
3411
3412
3413
3414
3415
3416
3417
3418
3419
3420
3421
3422
3423
3424
3425
3426
3427
3428
3429
3430
3431
3432
3433
3434
3435
3436
3437
3438
3439
3440
3441
3442
3443
3444
3445
3446
3447
3448
3449
3450
3451
3452
3453
3454
3455
3456
3457
3458
3459
3460
3461
3462
3463
3464
3465
3466
3467
3468
3469
3470
3471
3472
3473
3474
3475
3476
3477
3478
3479
3480
3481
3482
3483
3484
3485
3486
3487
3488
3489
3490
3491
3492
3493
3494
3495
3496
3497
3498
3499
3500
3501
3502
3503
3504
3505
3506
3507
3508
3509
3510
3511
3512
3513
3514
3515
3516
3517
3518
3519
3520
3521
3522
3523
3524
3525
3526
3527
3528
3529
3530
3531
3532
3533
3534
3535
3536
3537
3538
3539
3540
3541
3542
3543
3544
3545
3546
3547
3548
3549
3550
3551
3552
3553
3554
3555
3556
3557
3558
3559
3560
3561
3562
3563
3564
3565
3566
3567
3568
3569
3570
3571
3572
3573
3574
3575
3576
3577
3578
3579
3580
3581
3582
3583
3584
3585
3586
3587
3588
3589
3590
3591
3592
3593
3594
3595
3596
3597
3598
3599
3600
3601
3602
3603
3604
3605
3606
3607
3608
3609
3610
3611
3612
3613
3614
3615
3616
3617
3618
3619
3620
3621
3622
3623
3624
3625
3626
3627
3628
3629
3630
3631
3632
3633
3634
3635
3636
3637
3638
3639
3640
3641
3642
3643
3644
3645
3646
3647
3648
3649
3650
3651
3652
3653
3654
3655
3656
3657
3658
3659
3660
3661
3662
3663
3664
3665
3666
3667
3668
3669
3670
3671
3672
3673
3674
3675
3676
3677
3678
3679
3680
3681
3682
3683
3684
3685
3686
3687
3688
3689
3690
3691
3692
3693
3694
3695
3696
3697
3698
3699
3700
3701
3702
3703
3704
3705

Communications of the ACM
Volume 4,  Number 4, April, 1961

                  J. R. Herndon   ACM Algorithm 49: Spherical Neumann
                                  Function . . . . . . . . . . . . . . . .  179

Communications of the ACM
Volume 5,  Number 12, December, 1962

                   J. N. Merner   ACM Algorithm 149: Complete Elliptic
                                  Integral . . . . . . . . . . . . . . . .  605

Communications of the ACM
Volume 6,  Number 6, June, 1963

                   O. G. Ludwig   ACM Algorithm 179: Incomplete Beta Ratio  314

Communications of the ACM
Volume 6,  Number 12, December, 1963

                     R. H. Kase   ACM Algorithm 219: Topological Ordering
                                  for Pert Networks  . . . . . . . . . . . 738--739

Communications of the ACM
Volume 7,  Number 8, August, 1964

                    W. Gautschi   ACM Algorithm 236: Bessel Functions of
                                  the First Kind . . . . . . . . . . . . . 479--480

Communications of the ACM
Volume 7,  Number 12, December, 1964

                   J. Boothroyd   ACM Algorithm 246: Graycode  . . . . . .  701

Communications of the ACM
Volume 8,  Number 8, August, 1965

                    W. Gautschi   ACM Algorithm 259: Legendre Functions
                                  for Arguments Larger than One  . . . . . 488--492

Communications of the ACM
Volume 9,  Number 5, May, 1966

                    W. Fletcher   ACM Algorithm 284: Interchange of Two
                                  Blocks of Data . . . . . . . . . . . . .  326

Communications of the ACM
Volume 10,  Number 4, April, 1967

                 I. D. Hill and   
                     M. C. Pike   ACM Algorithm 299: Chi-Squared Integral  243--244

Communications of the ACM
Volume 11,  Number 3, March, 1968

           Edsger Wybe Dijkstra   Go to statement considered harmful . . . 147--148

Communications of the ACM
Volume 12,  Number 5, May, 1969

         ANSI Subcommittee X3J3   Clarification of Fortran Standards ---
                                  Initial Progress . . . . . . . . . . . . 289--294

Communications of the ACM
Volume 12,  Number 9, September, 1969

                       N. Wirth   On Multiprogramming, Machine Coding, and
                                  Computer Organization  . . . . . . . . . 489--498

Communications of the ACM
Volume 1,  Number 11, November, 1970

                      V. Y. Lum   Multi-Attribute Retrieval with Combined
                                  Indexes  . . . . . . . . . . . . . . . . 660--665

Communications of the ACM
Volume 13,  Number 1, January, 1970

                     T. C. Lowe   Automatic segmentation of cyclic program
                                  structures based on connectivity and
                                  processor timing . . . . . . . . . . . . 3--6
            Walter Gautschi and   
                 Bruce J. Klein   Recursive computation of certain
                                  derivatives --- A study of error
                                  propagation  . . . . . . . . . . . . . . 7--9
              A. P. Mullery and   
                 G. C. Driscoll   A processor allocation method for
                                  time-sharing . . . . . . . . . . . . . . 10--14
                  R. F. Simmons   Natural Language Question-Answering
                                  Systems: 1969  . . . . . . . . . . . . . 15--30
                    E. T. Irons   Experience with an extensible language   31--40
                   U. Montanari   A note on minimal length polygonal
                                  approximation to a digitized contour . . 41--47
                Harald Stehfest   ACM Algorithm 368: Numerical Inversion
                                  of Laplace Transforms  . . . . . . . . . 47--49
                 H. E. Schaffer   ACM Algorithm 369: Generator of Random
                                  Numbers Satisfying the Poisson
                                  Distribution . . . . . . . . . . . . . . 49--49
                   E. L. Butler   ACM Algorithm 370: General Random Number
                                  Generator  . . . . . . . . . . . . . . . 49--52
                 J. K. S. McKay   ACM Algorithm 371: Partitions in Natural
                                  Order  . . . . . . . . . . . . . . . . . 52--52
                   K. B. Dunham   ACM Algorithm 372: An Algorithm to
                                  Produce Complex Primes CSIEVE  . . . . . 52--54
                 R. Griffin and   
                   K. A. Redich   Remark on ``Algorithm 347 [M1]: An
                                  Efficient Algorithm for Sorting with
                                  Minimal Storage'', by R. C. Singleton    54--54
                      Anonymous   Representation for calendar date for
                                  machine-to-machine data interchange  . . 55--55
                      Anonymous   Interchange rolls of perforated tape for
                                  information interchange  . . . . . . . . 56--56
                    W. H. Payne   Fortran Tausworthe pseudorandom number
                                  generator  . . . . . . . . . . . . . . . 57--57

Communications of the ACM
Volume 13,  Number 2, February, 1970

             David K. Hsiao and   
                Frank D. Harary   A Formal System for Information
                                  Retrieval from Files . . . . . . . . . . 67--73
          E. von Glaserfeld and   
                   P. P. Pisani   The multistore parser for hierarchical
                                  syntactic structures . . . . . . . . . . 74--82
                    Steven Vere   Translation equations  . . . . . . . . . 83--89
                   H. L. Morgan   Spelling correction in systems programs  90--94
                      J. Earley   An Efficient Context-Free Parsing
                                  Algorithm  . . . . . . . . . . . . . . . 94--102
                    C. E. Radke   The Use of Quadratic Residue Research    103--105
                       B. Jones   A Variation on Sorting by Address
                                  Calculation  . . . . . . . . . . . . . . 105--107
                  James R. Bell   The Quadratic Quotient Method: A Hash
                                  Code Eliminating Secondary Clustering    107--109
                 D. N. Ness and   
                R. S. Green and   
               W. A. Martin and   
                  G. A. Moulton   Computer education in a graduate school
                                  of management  . . . . . . . . . . . . . 110--114, 19
              M. F. Robbins and   
                    J. D. Beyer   An interactive computer system using
                                  graphical flowchart input  . . . . . . . 115--119
                    J. S. White   ACM Algorithm 373: Number of Doubly
                                  Restricted Partitions  . . . . . . . . . 120--120
                    J. S. White   ACM Algorithm 374: Restricted Partition
                                  Generator  . . . . . . . . . . . . . . . 120--120
                       H. Spath   ACM Algorithm 375: Fitting Data to One
                                  Exponential  . . . . . . . . . . . . . . 120--121
                       H. Spath   Fitting data to one exponential  . . . . 120--121
                       H. Spath   ACM Algorithm 376: Least Squares Fit by
                                  $f(x)=A\cos(Bx+C)$ . . . . . . . . . . . 121--122

Communications of the ACM
Volume 13,  Number 3, March, 1970

                   H. L. Morgan   Spelling correction in systems programs  90--94
             R. R. Fenichel and   
              J. Weizenbaum and   
                J. C. Yochelson   A Program to Teach Programming . . . . . 141--146
               J. R. Slagle and   
                    J. K. Dixon   Experiments with the M & N
                                  Tree-Searching Program . . . . . . . . . 147--154, 159
                  A. Batson and   
             Shy-Ming M. Ju and   
                     D. C. Wood   Measurements of Segment Size . . . . . . 155--159
                   G. A. Watson   On an Algorithm for Nonlinear Minimax
                                  Approximation  . . . . . . . . . . . . . 160--162
               D. G. Schweikert   A Comparison of Error Improvement
                                  Estimates for Adaptive Trapezoid
                                  Integration  . . . . . . . . . . . . . . 163--166
         Robert M. Schwarcz and   
             John F. Burger and   
              Robert F. Simmons   A Deductive Question Answerer for
                                  Natural Language Inference . . . . . . . 167--183
             A. F. Cardenas and   
                  W. J. Karplus   PDEL, a Language for Partial
                                  Differential Equations . . . . . . . . . 184--191 (or 184--190??)
               M. J. Levine and   
                  S. M. Swanson   ACM Algorithm 377: Symbolic Expansion of
                                  Algebraic Expressions  . . . . . . . . . 191--192
                   M. V. Kailas   Another method of converting from
                                  hexadecimal to decimal . . . . . . . . . 193--193
                       D. Pager   A number system for the permutations . . 193--193
              J. R. H. Dempster   Comment on a Paging Anomaly  . . . . . . 193--194
                   H. A. Maurer   A Note on the Complement of Inherently
                                  Ambiguous Context-Free Languages . . . . 194--194
                D. K. Hsiao and   
                   F. D. Harary   Corrigenda: ``A Formal System for
                                  Information Retrieval from Files'' . . . 266--266

Communications of the ACM
Volume 13,  Number 4, April, 1970

             A. J. DeSalvio and   
                J. G. Purdy and   
                         J. Rau   Creation and Control of Internal Data
                                  Bases Under a Fortran Programming
                                  Environment  . . . . . . . . . . . . . . 211--215
                    H. D. Mills   Syntax-Directed Documentation for PL360  216--222
               Rudolf Bayer and   
             Christoph Witzgall   Some Complete Calculi for Matrices . . . 223--237
               P. Brinch Hansen   The Nucleus of a Multiprogramming System 238--241, 250
                  C. M. Eastman   Representations for Space Planning . . . 242--250
             J. E. Pomeranz and   
                R. L. Weil, Jr.   The cyclical majority problem  . . . . . 251--254
                   E. N. Nilson   Cubic Splines on Uniform Meshes  . . . . 255--258
                  W. Pankiewicz   ACM Algorithm 378: Discretized
                                  Newton-like Method for Solving a System
                                  of Simultaneous Nonlinear Equations  . . 259--260
                   J. N. Lyness   ACM Algorithm 379: SQUANK (Simpson
                                  Quadrature Used Adaptively-Noise Killed) 260--263 (or 260--262??)
               W. F. Heess, Jr.   Comments on a paper by Wallace and Mason 264--265
                    J. L. Smith   Comment on multiprogramming under a page
                                  on demand strategy . . . . . . . . . . . 265--265
             Ronald C. de Vries   Comment on Lawler's Multilevel Boolean
                                  minimization . . . . . . . . . . . . . . 265--266
                   K. R. Knight   An Algol construction for procedures as
                                  parameters of procedures . . . . . . . . 266--266
                       N. Wirth   Corrigenda: ``On Multiprogramming,
                                  Machine Coding, and Computer
                                  Organization'' . . . . . . . . . . . . . 266--266

Communications of the ACM
Volume 13,  Number 5, May, 1970

                       L. Hodes   Programming System for the On-Line
                                  Analysis of Biomedical Images  . . . . . 279--283, 286
                   G. A. Sitton   Operations on Generalized Arrays with
                                  the Genie Compiler . . . . . . . . . . . 284--286
                        S. Vere   Translation Equations (Errata) . . . . . 286--286
               W. E. Sasser and   
              D. S. Burdick and   
               D. A. Graham and   
                   T. H. Naylor   Application of Sequential Sampling to
                                  Simulation. an Example Inventory Model   287--296
                      J. Loeckx   Algorithm for the Construction of
                                  Bounded-Context Parsers  . . . . . . . . 297--307
               John C. Reynolds   GEDANKEN --- A Simple Typeless Language
                                  Based on the Principle of Completeness
                                  and the Reference Concept  . . . . . . . 308--319
         S. Crespi-Reghizzi and   
                    R. Morpurgo   A language for treating graphs . . . . . 319--323
                  S. Laflin and   
                  M. A. Brebner   ACM Algorithm 380: In-situ Transposition
                                  of a Rectangular Matrix  . . . . . . . . 324--326 (or 324--325??)
                     R. E. Knop   ACM Algorithm 381: Random Vectors
                                  Uniform In Solid Angle . . . . . . . . . 326--326

Communications of the ACM
Volume 13,  Number 6, June, 1970

                    H. A. Elder   On the Feasibility of Voice Input to an
                                  On-Line Computer Processing System . . . 339--346
        C. R. Muthukrishnan and   
                   V. Rajaraman   On the Conversion of Decision Tables to
                                  Computer Programs  . . . . . . . . . . . 347--351
                   J. E. Grimes   Scheduling to Reduce Conflict in
                                  Meetings . . . . . . . . . . . . . . . . 351--352
                   D. G. Frantz   A PL\slash 1 program to assist the
                                  comparative linguist . . . . . . . . . . 353--356
                  F. J. Damerau   Automatic Parsing for Content Analysis   356--360
                     Peter Linz   Accurate Floating-Point Summation  . . . 361--362
                K. E. Hillstrom   Comparison of Several Adaptive
                                  Newton-Cotes Quadrature Routines in
                                  Evaluating Definite Integrals with
                                  Peaked Integrands  . . . . . . . . . . . 362--365
                  G. W. Stewart   Incorporating Origin Shifts into the QR
                                  Algorithm for Symmetric Tridiagonal
                                  Matrices . . . . . . . . . . . . . . . . 365--367
                    P. J. Chase   ACM Algorithm 382: Combinations of ${M}$
                                  Out of ${N}$ Objects . . . . . . . . . . 368--368
                    P. J. Chase   ACM Algorithm 383: Permutations of a Set
                                  with Repetitions . . . . . . . . . . . . 368--369
                  G. W. Stewart   ACM Algorithm 384: Eigenvalues and
                                  Eigenvectors of a Real Symmetric Matrix
                                  [F2] . . . . . . . . . . . . . . . . . . 369--371
                   R. L. London   Certification of Algorithm 245 (M1)
                                  Treesort 3: Proof of Algorithms --- A
                                  New Kind of Certification  . . . . . . . 371--374
             J. P. Chandler and   
                 W. C. Harrison   R201--SHELLSORT  . . . . . . . . . . . . 373--374
                     E. F. Codd   A Relational Model of Data for Large
                                  Shared Data Banks  . . . . . . . . . . . 377--387

Communications of the ACM
Volume 13,  Number 7, July, 1970

                    C. A. Grant   An interactive command generating
                                  facility . . . . . . . . . . . . . . . . 403--406
                   M. A. Wilkes   Conversational Access to a 2048-Word
                                  Machine  . . . . . . . . . . . . . . . . 407--414
                    W. M. Waite   The mobile programming system: STAGE 2   415--421
                Burton H. Bloom   Space/Time Trade-offs in Hash Coding
                                  with Allowable Errors  . . . . . . . . . 422--426
         E. G. Coffman, Jr. and   
                         J. Eve   File Structures Using Hashing Functions  427--432, 436
              Gordon H. Bradley   Algorithm and Bound for the Greatest
                                  Common Divisor of $n$ Integers . . . . . 433--436
                    W. A. Woods   Context-Sensitive Parsing  . . . . . . . 437--445
                 K. A. Paciorek   ACM Algorithm 385: Exponential Integral
                                  ${E}_i(x)$ . . . . . . . . . . . . . . . 446--447
                  G. H. Bradley   ACM Algorithm 386: Greatest Common
                                  Divisor of $n$ Integers and Multipliers  447--448
                 K. Sattley and   
                   R. Millstein   Comments on a paper by Lowe  . . . . . . 450--451
                  H. D. Baecker   A note on data base deadlocks  . . . . . 451--451
                 J. E. Pomeranz   Note on an Anomaly in Paging . . . . . . 451--451
                     B. R. Hunt   A Comment on Axiomatic Approaches to
                                  Programming  . . . . . . . . . . . . . . 452--452

Communications of the ACM
Volume 13,  Number 8, August, 1970

                  N. R. Nielsen   Allocation of Computer Resources. is
                                  Pricing the Answer . . . . . . . . . . . 467--474
                    G. Nagy and   
                       N. Tuong   Normalization Techniques for Handprinted
                                  Numerals . . . . . . . . . . . . . . . . 475--481
                      A. C. Day   Full Table Quadratic Searching for
                                  Scatter Storage  . . . . . . . . . . . . 481--482
                B. S. Brawn and   
            F. G. Gustavson and   
                   E. S. Mankin   Sorting in a Paging Environment  . . . . 483--494
              J. H. Saltzer and   
                  J. W. Gintell   The instrumentation of Multics . . . . . 495--500
              J. D. Ichbiah and   
                    S. P. Morse   A technique for generating almost
                                  optimal Floyd-Evans productions for
                                  precedence grammars  . . . . . . . . . . 501--508
                    K. Fielding   ACM Algorithm 387: Function Minimization
                                  and Linear Search  . . . . . . . . . . . 509--510
                  H. Hubner and   
                  H. Kremer and   
                 K. O. Linn and   
                   W. Schwering   ACM Algorithm 388: Rademacher Function   510--511
                  H. Hubner and   
                  H. Kremer and   
                 K. O. Linn and   
                   W. Schwering   ACM Algorithm 389: Binary Ordered Walsh
                                  Functions  . . . . . . . . . . . . . . . 511--511
                  H. Hubner and   
                  H. Kremer and   
                 K. O. Linn and   
                   W. Schwering   ACM Algorithm 390: Sequency Ordered
                                  Walsh Functions  . . . . . . . . . . . . 511--512 (or 511--511??)
                       J. McKay   ACM Algorithm 391: Unitary Symmetric
                                  Polynomials  . . . . . . . . . . . . . . 512--512
                      Anonymous   Identification of States of the United
                                  States (including the District of
                                  Columbia) for information interchange    514--515

Communications of the ACM
Volume 13,  Number 9, September, 1970

              W. Jack Bouknight   A Procedure for Generation of
                                  Three-Dimensional Half-Toned Computer
                                  Graphics Presentations . . . . . . . . . 527--536
                 G. Bracchi and   
                   M. Somalvico   Interactive Software System for
                                  Computer-Aided Design. an Application to
                                  Circuit Project  . . . . . . . . . . . . 537--545
                  I. Hirschsohn   AMESPLOT, a Higher Level Data Plotting
                                  Software System  . . . . . . . . . . . . 546--555
             Cleve B. Moler and   
               Louis P. Solomon   Integrating Square Roots . . . . . . . . 556--557
                   G. W. Kimble   A Variation of the Goodman-Lance Method
                                  for the Solution of Two-Point Boundary
                                  Value Problems . . . . . . . . . . . . . 557--558
                M. Wayne Wilson   Optimal Starting Approximations for
                                  Generating Square Root for Slow or No
                                  Divide . . . . . . . . . . . . . . . . . 559--561 (or 559--560??)
                  L. W. Ehrlich   Complex Matrix Inversion Versus Real . . 561--562
                M. H. van Emden   Increasing the Efficiency of Quicksort   563--567 (or 563--566??)
            Robert R. Smith and   
                  Dennis McCall   ACM Algorithm 392: Systems of Hyperbolic
                                  P.D.E. . . . . . . . . . . . . . . . . . 567--570
                   S. K. Abdali   ACM Algorithm 393: Special Series
                                  Summation with Arbitrary Precision . . . 570--570
                     R. B. Dial   ACM Algorithm 394: Decision Table
                                  Translation  . . . . . . . . . . . . . . 571--573 (or 571--572??)
             Leslie Lamport and   
                     J. R. Bell   Comment on Bell's Quadratic Quotient
                                  Method for Hash Code Searching . . . . . 573--574
                       Z. Bavel   On the Number of Automorphisms of a
                                  Singly Generated Automaton . . . . . . . 574--575

Communications of the ACM
Volume 13,  Number 10, October, 1970

                    W. A. Woods   Transition Network Grammars for Natural
                                  Language Analysis  . . . . . . . . . . . 591--606
                  J. Earley and   
                     H. Sturgis   A formalism for translator interactions  607--617
                     G. W. Hill   ACM Algorithm 395: Student's
                                  $t$-Distribution . . . . . . . . . . . . 617--619
                     G. W. Hill   ACM Algorithm 396: Student's
                                  $t$-Quantiles  . . . . . . . . . . . . . 619--620
                S. K. Chang and   
                        A. Gill   ACM Algorithm 397: An Integer
                                  Programming Problem  . . . . . . . . . . 620--621
                    R. A. Stone   ACM Algorithm 398: Tableless Date
                                  Conversion . . . . . . . . . . . . . . . 621--621
                 J. J. Seppanen   ACM Algorithm 399: Spanning Tree . . . . 621--622
                  G. C. Wallick   ACM Algorithm 400: Modified Havie
                                  Integration  . . . . . . . . . . . . . . 622--624
                        R. Peto   Remark on ``Algorithm 347 [M1]: An
                                  Efficient Algorithm for Sorting with
                                  Minimal Storage''  . . . . . . . . . . .  624
                    L. B. Smith   The use of interactive graphics to solve
                                  numerical problems . . . . . . . . . . . 625--634

Communications of the ACM
Volume 13,  Number 11, November, 1970

                  P. LaFata and   
                    J. B. Rosen   An interactive display for approximation
                                  by linear programming  . . . . . . . . . 651--659
                      V. Y. Lum   Multi-attribute retrieval with combined
                                  indexes  . . . . . . . . . . . . . . . . 660--665
                   C. J. Mifsud   A multiple-precision division algorithm  666--668
                  K. Conrow and   
                    R. G. Smith   NEATER2: A PL/I Source Statement
                                  Reformatter  . . . . . . . . . . . . . . 669--675
              James R. Bell and   
               Charles H. Kaman   The Linear Quotient Hash Code  . . . . . 675--677
                   C. J. Cheney   A Nonrecursive List Compacting Algorithm 677--678
                      Anonymous   Proposed American National Standard.
                                  Recorded magnetic tape for information
                                  interchange (1600 CPI, phase encoded)    679--685
                      Anonymous   Proposed American National Standard.
                                  Unrecorded magnetic tape for information
                                  interchange (9 track-200 and 800 CPI,
                                  NRZI and 1600 CPI, P.E.) . . . . . . . . 686--692
                     P. Bratley   ACM Algorithm 401: An Improved Algorithm
                                  to Produce Complex Primes  . . . . . . . 693--693
                M. H. van Emden   ACM Algorithm 402: Increasing the
                                  Efficiency of Quicksort  . . . . . . . . 693--694
                   W. J. Wilson   A generalized method for generating
                                  argument/function values . . . . . . . . 696--697
                   J. R. Ehrman   Correction to 'logical' arithmetic on
                                  computers with two's complement binary
                                  arithmetic . . . . . . . . . . . . . . . 697--698
                   A. Bernstein   Comment on the working set model for
                                  program behavior . . . . . . . . . . . . 698--699
                       J. Rokne   Condition numbers of Pei matrices  . . . 699--699

Communications of the ACM
Volume 13,  Number 12, December, 1970

              M. V. Mathews and   
                    F. R. Moore   GROOVE-A program to compose, store, and
                                  edit functions of time . . . . . . . . . 715--721
               James C. Tiernan   An Efficient Search Algorithm to Find
                                  the Elementary Circuits of a Graph . . . 722--726
                C. Betourne and   
               J. Boulenger and   
                  J. Ferrie and   
                  C. Kaiser and   
               S. Krakowiak and   
                    J. Mossiere   Process management and resource sharing
                                  in the multiaccess system ESOPE  . . . . 727--733
                   H. L. Morgan   An interrupt based organization for
                                  management information systems . . . . . 734--739
                 R. J. Thompson   Improving round-off in Runge-Kutta
                                  computations with Gill's method  . . . . 739--740
                  S. C. Shapiro   The list set generator: a construct for
                                  evaluating set expressions . . . . . . . 741--744
                    N. A. Black   Optimum Merging from Mass Storage  . . . 745--749
                  G. W. Stewart   Errata: ACM Algorithm 384: Eigenvalues
                                  and Eigenvectors of a Real Symmetric
                                  Matrix [F2]  . . . . . . . . . . . . . . 750--750
                E. A. Fuchs and   
                  P. E. Jackson   Estimates of Distributions of Random
                                  Variables for Certain Computer
                                  Communications Traffic Models  . . . . . 752--757
                   C. C. Pinter   On decomposing a Boolean function and
                                  simplifying the components separately    758--758
                 W. J. Raduchel   Efficient handling of binary data  . . . 758--759
               Robert A. Wagner   Finiteness Assumptions and Intellectual
                                  Isolation of Computer Scientists . . . . 759--760

Communications of the ACM
Volume 12,  Number 1, January, 1971

                   E. Lowry and   
                  C. W. Medlock   Object Code Optimization . . . . . . . . 13--22
                    Carl Hammer   Signature Simulation and Certain
                                  Cryptographic Codes  . . . . . . . . . . 3--14
                     A. Klinger   Pattern width at a given angle . . . . . 15--20
                  Shi-Kuo Chang   The Reconstruction of Binary Patterns
                                  from Their Projections . . . . . . . . . 21--25
                 G. Bracchi and   
                     D. Ferrari   Language for Treating Geometric Patterns
                                  in a Two-Dimensional Space . . . . . . . 26--32
                  R. A. Broucke   Construction of rational and negative
                                  powers of a formal series  . . . . . . . 32--35
                     R. C. Holt   Comments on Prevention of System
                                  Deadlocks  . . . . . . . . . . . . . . . 36--38
                 C. A. R. Hoare   Proof of a Program: FIND . . . . . . . . 39--45
                    L. G. Proll   Further evidence for the analysis of
                                  algorithms for the zero-one programming
                                  problem  . . . . . . . . . . . . . . . . 46--47
              M. W. Coleman and   
                   M. S. Taylor   ACM Algorithm 403: Circular Integer
                                  Partitioning . . . . . . . . . . . . . . 48--48
           C. W. Lucas, Jr. and   
                  C. W. Terrill   ACM Algorithm 404: Complex Gamma
                                  Function . . . . . . . . . . . . . . . . 48--49 (or 48--48??)
                   K. A. Redish   Comment on London's Certification of
                                  Algorithm 245  . . . . . . . . . . . . . 50--51
                  S. L. Pollack   Comment on the conversion of decision
                                  tables to computer programs  . . . . . . 52--52

Communications of the ACM
Volume 14,  Number 2, February, 1971

                   K. Schwayder   Conversion of Limited-Entry Decision
                                  Tables to Computer Programs. a Proposed
                                  Modification to Pollack's Algorithm  . . 69--73
                    K. Shwayder   Conversion of limited-entry decision
                                  tables to computer programs-a proposed
                                  modification to Pollack's algorithm  . . 69--73
            A. J. Bernstein and   
                    J. C. Sharp   A policy-driven scheduler for a
                                  time-sharing system  . . . . . . . . . . 74--78
                  N. R. Nielsen   An analysis of some time-sharing
                                  techniques . . . . . . . . . . . . . . . 79--90
               J. R. Slagle and   
                  C. D. Farrell   Experiments in Automatic Learning for a
                                  Multipurpose Heuristic Program . . . . . 91--99 (or 91--98??)
                H. Hurwitz, Jr.   On the Probability Distribution of the
                                  Values of Binary Trees . . . . . . . . . 99--102
               J. R. Slagle and   
                   R. C. T. Lee   Application of Game Tree Searching
                                  Techniques to Sequential Pattern
                                  Recognition  . . . . . . . . . . . . . . 103--110
                   J. Rokne and   
                   P. Lancaster   Complex Interval Arithmetic  . . . . . . 111--112
                 A. M. Dell and   
                 R. L. Weil and   
                 G. L. Thompson   ACM Algorithm 405: Roots of Matrix
                                  Pencils: The Generalized Eigenvalue
                                  Problem  . . . . . . . . . . . . . . . . 113--117

Communications of the ACM
Volume 14,  Number 3, March, 1971

                     A. M. Noll   Scanned-Display Computer Graphics  . . . 143--150
                   Z. Manna and   
                R. J. Waldinger   Toward Automatic Program Synthesis . . . 151--165
                  W. K. Winters   Scheduling Algorithm for a Computer
                                  Assisted Registration System . . . . . . 166--171
                 J. G. Williams   Storage Utilization in a Memory
                                  Hierarchy When Storage Assignment is
                                  Performed by a Hashing Algorithm . . . . 172--175
                     C. W. Gear   The Automatic Integration of Ordinary
                                  Differential Equations . . . . . . . . . 176--179
                   J. A. Howell   ACM Algorithm 406: Exact Solution of
                                  Linear Equations Using Residue
                                  Arithmetic . . . . . . . . . . . . . . . 180--184
                     C. W. Gear   ACM Algorithm 407: DIFSUB for Solution
                                  of Ordinary Differential Equations . . . 185--190

Communications of the ACM
Volume 14,  Number 4, April, 1971

                       N. Wirth   Program Development by Stepwise
                                  Refinement . . . . . . . . . . . . . . . 221--227
                  V. Y. Lum and   
              P. S. T. Yuen and   
                        M. Dodd   Key-to-Address Transform Techniques: A
                                  Fundamental Performance Study on Large
                                  Existing Formatted Files . . . . . . . . 228--239
               A. B. Tucker and   
                    M. J. Flynn   Dynamic Microprogramming. Processor
                                  Organization and Programming . . . . . . 240--250
               P. A. Talbot and   
                 J. W. Carr and   
         R. R. Coulter, Jr. and   
                    R. C. Hwang   Animator: an on-line two-dimensional
                                  film animation system  . . . . . . . . . 251--259
                M. L. Stein and   
                    W. D. Munro   On Complement Division . . . . . . . . . 260--264
                  J. M. McNamee   ACM Algorithm 408: A Sparse Matrix
                                  Package (Part I) . . . . . . . . . . . . 265--273

Communications of the ACM
Volume 14,  Number 5, May, 1971

 T. William Olle (Chairman) and   
      Codasyl Systems Committee   Introduction to `Feature analysis of
                                  generalized data base management
                                  systems' . . . . . . . . . . . . . . . . 308--318
                  N. R. Nielsen   The merit of regional computing networks 319--326
                  P. Krolak and   
                   W. Felts and   
                      G. Marble   A Man-Machine Approach Toward Solving
                                  the Traveling Salesman Problem . . . . . 327--334
                  Ugo Montanari   On the optimal detection of curves in
                                  noisy pictures . . . . . . . . . . . . . 335--345
                 D. L. Richards   How to Keep the Addresses Short  . . . . 346--349
                 R. R. Fenichel   On Implementation of Label Variables . . 349--350
           James H. Morris, Jr.   Another Recursion Induction Principle    351--354
                     H. Schmitt   ACM Algorithm 409: Discrete Chebychev
                                  Curve Fit  . . . . . . . . . . . . . . . 355--356
                 J. M. Chambers   ACM Algorithm 410: Partial Sorting [M1]  357--358

Communications of the ACM
Volume 14,  Number 6, June, 1971

                 Kazuaki Harada   Generation of rosary permutations
                                  expressed in Hamiltonian circuits  . . . 373--379
                    J. D. Foley   An approach to the optimum design of
                                  computer graphics systems  . . . . . . . 380--390
                      S. Amarel   Computer Science: A Conceptual Framework
                                  for Curriculum Planning  . . . . . . . . 391--401
         W. E. Bosarge, Jr. and   
                  O. G. Johnson   Numerical properties of the Ritz-Trefftz
                                  algorithm for optimal control  . . . . . 402--406
                 H. Tim Gladwin   A Note on Compiling Fixed Point Binary
                                  Multiplications  . . . . . . . . . . . . 407--408
                   A. G. Fraser   On the Meaning of Names in Programming
                                  Systems  . . . . . . . . . . . . . . . . 409--416
                   R. J. Walker   Binary summation . . . . . . . . . . . . 417--417
                   M. Zelkowitz   Interrupt driven programming . . . . . . 417--418

Communications of the ACM
Volume 14,  Number 7, July, 1971

             J. L. McKenney and   
                    F. M. Tonge   The State of Computer-Oriented Curricula
                                  in Business Schools 1970 . . . . . . . . 443--448
                A. J. Bernstein   A programmer training project  . . . . . 449--452
            Franklin L. DeRemer   Simple LR(k) grammars  . . . . . . . . . 453--460
          Terrence W. Pratt and   
             Daniel P. Friedman   A Language Extension for Graph
                                  Processing, and Its Formal Semantics . . 460--467 (or 461--467??)
                    Keith Paton   An algorithm for the blocks and cut
                                  nodes of a graph . . . . . . . . . . . . 468--475
                 D. E. Ferguson   Buffer Allocation in Merge-Sorting . . . 476--478
          C. V. Ramamoorthy and   
                 M. J. Gonzalez   Subexpression ordering in the execution
                                  of arithmetic expressions  . . . . . . . 479--485
              D. G. McVitie and   
                   L. B. Wilson   The Stable Marriage Problem  . . . . . . 486--490
              D. G. McVitie and   
                   L. B. Wilson   ACM Algorithm 411: Three Procedures for
                                  the Stable Marriage Problem  . . . . . . 491--492
                    J. \vCermak   ACM Algorithm 412: Graph Plotter . . . . 492--493

Communications of the ACM
Volume 14,  Number 8, August, 1971

                      Anonymous   Papers from the 2nd symposium on
                                  symbolic and algebraic manipulation  . .   ??
               Anthony C. Hearn   Applications of Symbolic Manipulation in
                                  Theoretical Physics  . . . . . . . . . . 511--516
                A. D. Hall, Jr.   The Altran system for rational function
                                  manipulation --- a survey  . . . . . . . 517--521
             Robert R. Fenichel   List Tracing in Systems Allowing
                                  Multiple Cell Types  . . . . . . . . . . 522--526
                       J. Moses   Algebraic Simplification: A Guide for
                                  the Perplexed  . . . . . . . . . . . . . 527--537
                 W. H. Jefferys   Automatic algebraic manipulation in
                                  celestial mechanics  . . . . . . . . . . 538--541
                  D. Barton and   
                    J. P. Fitch   General relativity and the application
                                  of algebraic manipulative systems  . . . 542--547
                     Joel Moses   Symbolic Integration: The Stormy Decade  548--560

Communications of the ACM
Volume 14,  Number 9, September, 1971

               Daniel Teichroew   Education Related to the Use of
                                  Computers in Organizations . . . . . . . 573--588
             Sadahiro Isoda and   
                Eiichi Goto and   
                   Izumi Kimura   An Efficient Bit Table Technique for
                                  Dynamic Storage Allocation of $2^n$-word
                                  Blocks . . . . . . . . . . . . . . . . . 589--592
                    Keith Paton   Corrigendum: ``An algorithm for the
                                  blocks and cutnodes of a graph'' . . . . 592--592
                Eugene Wong and   
                   T. C. Chiang   Canonical Structure in Attribute Based
                                  File Organization  . . . . . . . . . . . 593--597
              David L. Phillips   A note on best one-sided approximations  598--600
                     W. Liniger   A stopping criterion for the
                                  Newton-Raphson method in implicit
                                  multistep integration algorithms for
                                  nonlinear systems of ordinary
                                  differential equations . . . . . . . . . 600--601
                Ivan Flores and   
                  George Madpis   Average Binary Search Length for Dense
                                  Ordered Lists  . . . . . . . . . . . . . 602--603
                 R. R. Fenichel   Comment on Cheney's List-Compaction
                                  Algorithm  . . . . . . . . . . . . . . . 603--604

Communications of the ACM
Volume 14,  Number 10, October, 1971

                     Jay Earley   Toward an Understanding of Data
                                  Structures . . . . . . . . . . . . . . . 617--627
         ANSI Subcommittee X3J3   Clarification of Fortran Standards ---
                                  Second Report  . . . . . . . . . . . . . 628--642
            A. E. Oldehoeft and   
                    S. D. Conte   Experiments with an automated
                                  instructional system for numerical
                                  methods  . . . . . . . . . . . . . . . . 643--650
                   W. M. Newman   Display procedures . . . . . . . . . . . 651--660
               A. G. Nemeth and   
                   P. D. Rovner   User program measurement in a
                                  time-shared environment  . . . . . . . . 661--666
             P. J. Courtois and   
                 F. Heymans and   
                   D. L. Parnas   Concurrent Control with `Readers' and
                                  `Writers'  . . . . . . . . . . . . . . . 667--668
               J. N. Lyness and   
                       G. Sande   ACM Algorithm 413: ENTCAF and ENTCRE:
                                  Evaluation of Normalized Taylor
                                  Coefficients of an Analytic Function
                                  (C5) . . . . . . . . . . . . . . . . . . 669--675

Communications of the ACM
Volume 14,  Number 11, November, 1971

               P. Branquart and   
                    J. Lewi and   
                M. Sintzoff and   
                    P. L. Wodon   The composition of semantics in Algol 68 697--708
                  J. W. Hamblen   Using computers in higher education:
                                  past recommendations, status, and needs  709--712
                    D. L. Shell   Optimizing the Polyphase Sort  . . . . . 713--719
                 I. Aramaki and   
                T. Kawabata and   
                     K. Arimoto   Automation of etching-pattern layout . . 720--730
             Michael A. Malcolm   On Accurate Floating-Point Summation . . 731--736
                G. H. Golub and   
                    L. B. Smith   ACM Algorithm 414: Chebyshev
                                  Approximation of Continuous Functions by
                                  a Chebyshev System of Functions  . . . . 737--746

Communications of the ACM
Volume 14,  Number 12, December, 1971

                  R. Gordon and   
                   G. T. Herman   Reconstruction of Pictures from Their
                                  Projections  . . . . . . . . . . . . . . 759--768
               E. L. Amidon and   
                     G. S. Akin   Algorithmic Selection of the Best Method
                                  for Compressing Map Data Strings . . . . 769--774
                James K. Mullin   Retrieval-Update Speed Trade-offs Using
                                  Combined Indexes . . . . . . . . . . . . 775--776
                 M. C. Harrison   Implementation of the Substring Test by
                                  Hashing  . . . . . . . . . . . . . . . . 777--779
                 W. A. Wulf and   
              D. B. Russell and   
                A. N. Habermann   BLISS: A language for systems
                                  programming  . . . . . . . . . . . . . . 780--790
                    A. Rochfeld   New LISP Techniques for a Paging
                                  Environment  . . . . . . . . . . . . . . 791--795
             J. W. Blumberg and   
                    C. R. Foulk   A note on `a modification of Nordsieck's
                                  method using an ``off-step'' point'  . . 796--796
        Sven-\AAke A. Gustafson   Rapid Computation of General
                                  Interpolation Formulas and Mechanical
                                  Quadrature Rules . . . . . . . . . . . . 797--801
       Fran\ccois Bourgeois and   
           Jean-Claude Lassalle   An extension of the Munkres algorithm
                                  for the assignment problem to
                                  rectangular matrices . . . . . . . . . . 802--804
               F. Bourgeois and   
                 J. C. Lassalle   ACM Algorithm 415: Algorithm for the
                                  Assignment Problem (Rectangular
                                  Matrices)  . . . . . . . . . . . . . . . 805--806
           Sven-\AAke Gustafson   ACM Algorithm 416: Rapid Computation of
                                  Coefficients of Interpolation Formulas
                                  [E1] . . . . . . . . . . . . . . . . . . 806--807
           Sven-\AAke Gustafson   ACM Algorithm 417: Rapid Computation of
                                  Weights of Interpolatory Quadrature
                                  Rules [D1] . . . . . . . . . . . . . . . 807--807

Communications of the ACM
Volume 18,  Number 1, January, 1971

                  A. V. Aho and   
              P. J. Denning and   
                   J. D. Ullman   Principles of optimal page replacement   80--93

Communications of the ACM
Volume 5,  Number 6, June, 1972

              S. C. Johnson and   
                B. W. Kernighan   Remark on ``CACM Algorithm 397'' . . . .  469

Communications of the ACM
Volume 8,  Number 9, September, 1972

              R. H. Bartels and   
                  G. W. Stewart   Algorithm 432: The Solution of the
                                  Matrix Equation $AX -+BX = C$  . . . . . 820--826

Communications of the ACM
Volume 15,  Number 1, January, 1972

                     A. M. Lesk   Pictorial pattern recognition and the
                                  phase problem of X-ray crystallography   3--6
                    S. Levialdi   On Shrinking Binary Picture Patterns . . 7--10
                 R. O. Duda and   
                     P. E. Hart   Use of the Hough transformation to
                                  detect lines and curves in pictures  . . 11--15
                E. T. Irons and   
                   F. M. Djorup   A CRT editing system . . . . . . . . . . 16--20
                    T. A. Dwyer   Teacher/student authored CAI using the
                                  NEWBASIC system  . . . . . . . . . . . . 21--28
                Donald L. Shell   Corrigendum: ``Optimizing the Polyphase
                                  Sort'' . . . . . . . . . . . . . . . . . 28--28
              G. I. McCalla and   
                  J. R. Sampson   MUSE: A Model to Understand Simple
                                  English  . . . . . . . . . . . . . . . . 29--40
                  R. I. Shrager   Quadratic programming for nonlinear
                                  regression . . . . . . . . . . . . . . . 41--45
                   H. E. Salzer   Ordering
                                  +or-f(+or-f(+or-f(\ldots+or-f(x)\ldots))) when f(x) is positive monotonic  45--46
                   B. Einarsson   ACM Algorithm 418: Calculation of
                                  Fourier Integrals  . . . . . . . . . . . 47--48

Communications of the ACM
Volume 15,  Number 2, February, 1972

                    David Pager   A Proposal for a Computer-Based
                                  Interactive Scientific Community . . . . 71--75
                  C. M. Eastman   Preliminary report on a system for
                                  general space planning . . . . . . . . . 76--87
               W. A. Martin and   
                     D. N. Ness   Optimizing Binary Trees Grown with a
                                  Storing Algorithm  . . . . . . . . . . . 88--93
            A. E. Oldehoeft and   
                 M. H. Halstead   Maximum computing power and cost factors
                                  in the centralization problem  . . . . . 94--96
              M. A. Jenkins and   
                    J. F. Traub   ACM Algorithm 419: Zeros of a Complex
                                  Polynomial . . . . . . . . . . . . . . . 97--99
                  H. Williamson   ACM Algorithm 420: Hidden-Line Plotting
                                  Program  . . . . . . . . . . . . . . . . 100--103
                   J. A. Moorer   Music and computer composition . . . . . 104--113
                Ivan Flores and   
                  George Madpis   Corrigendum: ``Average Binary Search
                                  Length for Dense Ordered Lists'' . . . . 113--113
             Richard Gordon and   
                Gabor T. Herman   Corrigendum: ``Reconstruction of
                                  Pictures from Their Projections''  . . . 113--113

Communications of the ACM
Volume 15,  Number 3, March, 1972

                      Anonymous   Papers from the 3rd ACM symposium on
                                  operating systems principles . . . . . .   ??
               D. G. Bobrow and   
            J. D. Burchfiel and   
               D. L. Murphy and   
                R. S. Tomlinson   TENEX, A Paged Time-Sharing System for
                                  the PDP-10 . . . . . . . . . . . . . . . 135--143
                   B. H. Liskov   The Design of the Venus Operating System 144--149
              R. Stockton Gains   An operating system based on the concept
                                  of a supervisory computer  . . . . . . . 150--156
       Michael D. Schroeder and   
              Jerome H. Saltzer   A Hardware Architecture for Implementing
                                  Protection Rings . . . . . . . . . . . . 157--170
              A. Nico Habermann   Synchronization of Communicating
                                  Processes  . . . . . . . . . . . . . . . 171--176
             Toby J. Teorey and   
               Tad B. Pinkerton   A Comparative Analysis of Disk
                                  Scheduling Policies  . . . . . . . . . . 177--184
         E. G. Coffman, Jr. and   
                T. A. Ryan, Jr.   A study of storage partitioning using a
                                  mathematical model of locality . . . . . 185--190
           Peter J. Denning and   
             Stuart C. Schwartz   Properties of the working-set model  . . 191--198

Communications of the ACM
Volume 15,  Number 4, April, 1972

               R. W. Conway and   
              W. L. Maxwell and   
                   H. L. Morgan   On the Implementation of Security
                                  Measures in Information Systems  . . . . 211--220
                   D. C. Walden   A system for interprocess communication
                                  in a resource sharing computer network   221--230
               N. M. Herbst and   
                     P. M. Will   An experimental laboratory for pattern
                                  recognition and signal processing  . . . 231--244
              Yutaka Matsushita   Hidden lines elimination for a rotating
                                  object . . . . . . . . . . . . . . . . . 245--252
                    S. M. Chase   An implemented graph algorithm for
                                  winning Shannon Switching Games  . . . . 253--256
                E. Horowitz and   
               H. L. Morgan and   
                     A. C. Shaw   Computers and Society: A Proposed Course
                                  for Computer Scientists  . . . . . . . . 257--261
                        H. Kuki   Complex gamma function with error
                                  control  . . . . . . . . . . . . . . . . 262--267
                    C. B. Moler   Matrix Computations with Fortran and
                                  Paging . . . . . . . . . . . . . . . . . 268--270
                   Hirondo Kuki   ACM Algorithm 421: Complex Gamma
                                  Function with Error Control  . . . . . . 271--272
               V. K. M. Whitney   ACM Algorithm 422: Minimal Spanning Tree 273--274
                    C. B. Moler   ACM Algorithm 423: Linear Equation
                                  Solver . . . . . . . . . . . . . . . . . 274--274
                   D. C. Walden   A Note on Cheney's Nonrecursive
                                  List-Compacting Algorithm  . . . . . . . 275--275
                       T. C. Hu   A Comment on the Double-Chained Tree . . 276--276

Communications of the ACM
Volume 15,  Number 5, May, 1972

                James K. Mullin   An Improved Indexed-Sequential Access
                                  Method Using Hashed Overflow . . . . . . 301--307
              A. Bensoussan and   
              C. T. Clingen and   
                    R. C. Daley   The Multics Virtual Memory: Concepts and
                                  Design . . . . . . . . . . . . . . . . . 308--318
                R. D. Christman   MUX, a simple approach to on-line
                                  computing  . . . . . . . . . . . . . . . 319--329
                David L. Parnas   A technique for software module
                                  specification with examples  . . . . . . 330--336
            W. Morven Gentleman   Implementing Clenshaw-Curtis quadrature.
                                  I. Methodology and experience  . . . . . 337--342
            W. Morvin Gentleman   Implementing Clenshaw-Curtis quadrature.
                                  II. Computing the cosine transformation  343--346
               D. Greenspan and   
                     D. Schultz   Fast finite-difference solution of
                                  biharmonic problems  . . . . . . . . . . 347--350
                   C. B. Dunham   Minimax nonlinear approximation by
                                  approximation on subsets . . . . . . . . 351--351
                 Richard Harter   The Optimality of Winograd's Formula . . 352--352
                W. M. Gentleman   ACM Algorithm 424: Clenshaw-Curtis
                                  Quadrature . . . . . . . . . . . . . . . 353--355
                R. L. Hurst and   
                     R. E. Knop   ACM Algorithm 425: Generation of Random
                                  Correlated Normal Variables  . . . . . . 355--357
                        C. Bron   ACM Algorithm 426: Merge Sort Algorithm  357--358
                        P. Linz   ACM Algorithm 427: Fourier Cosine
                                  Integral . . . . . . . . . . . . . . . . 358--360
                     J. M. Yohe   ACM Algorithm 428: Hu-Tucker Minimum
                                  Redundancy Alphabetic Coding Method  . . 360--362
               R. L. Ashenhurst   A report of the ACM curriculum committee
                                  on computer education for management.
                                  Curriculum recommendations for graduate
                                  professional programs in information
                                  systems  . . . . . . . . . . . . . . . . 363--398

Communications of the ACM
Volume 15,  Number 6, June, 1972

                  J. Blatny and   
                S. R. Clark and   
                   T. A. Rourke   On the optimization of performance of
                                  time-sharing systems by simulation . . . 411--420
                   T. R. Spacek   A proposal to establish a pseudo virtual
                                  memory via writable overlays . . . . . . 421--426
                 P. Gilbert and   
                 W. J. Chandler   Interference between Communicating
                                  Parallel Processes . . . . . . . . . . . 427--437
                   J. F. Gimpel   Blocks-a new datatype for SNOBOL 4 . . . 438--447
                David F. Martin   A Boolean matrix method for the
                                  computation of linear precedence
                                  functions  . . . . . . . . . . . . . . . 448--454
             Robert T. O'Reagan   Computer Assigned Codes from Verbal
                                  Responses  . . . . . . . . . . . . . . . 455--459
                      K. Iguchi   A starting method for solving nonlinear
                                  Volterra integral equations of the
                                  second kind  . . . . . . . . . . . . . . 460--461
                        I. Pohl   A Sorting Problem and Its Complexity . . 462--464
                   K. S. Kolbig   Certification of algorithm 363 (complex
                                  error function)  . . . . . . . . . . . . 465--466
                    H. Niessner   Remark on algorithm 343 (Eigenvalues and
                                  eigenvectors of a real general matrix)   466--466
                    L. G. Proll   Remark on ``ACM Algorithm 370 (General
                                  random number generator) [G5]''  . . . . 467--468
                  G. F. Schrack   Remark on algorithm 381 (Random vectors
                                  uniform in solid angle)  . . . . . . . . 468--468
                  A. H. J. Sale   Remark on algorithm 393 (Special series
                                  summation with arbitrary precision)  . . 468--469
                   B. Einarsson   Remark on algorithm 418 (Calculation of
                                  Fourier integrals) . . . . . . . . . . . 469--469
              S. C. Johnson and   
                B. W. Kernighan   Remark on algorithm 397 (An integer
                                  programming problem) . . . . . . . . . . 469--469
                 Abraham Kandel   Computer Science --- A Vicious Circle    470--471
                  E. B. Koffman   Individualizing instruction in a
                                  generative CAI tutor . . . . . . . . . . 472--473
              E. N. Houstis and   
             W. F. Mitchell and   
                     J. R. Rice   ACM Algorithm 438: Product Type
                                  Two-point Gauss-Legendre-Simpson's
                                  Integration  . . . . . . . . . . . . . . 1071

Communications of the ACM
Volume 15,  Number 7, July, 1972

                     Lee Revens   The first twenty-five years ACM
                                  1947--1962 . . . . . . . . . . . . . . . 485--490
                  Eric A. Weiss   Publications in computing: an informal
                                  review . . . . . . . . . . . . . . . . . 491--497
                   A. P. Ershov   Aesthetics and the Human Factor in
                                  Programming  . . . . . . . . . . . . . . 501--505
                      Anonymous   As the industry sees it  . . . . . . . . 506--517
               Michael A. Arbib   Toward an Automata Theory of Brains  . . 521--527
                Zohar Manna and   
                 Jean Vuillemin   Fixpoint Approach to the Theory of
                                  Computation  . . . . . . . . . . . . . . 528--536
                    J. F. Traub   Numerical Mathematics and Computer
                                  Science  . . . . . . . . . . . . . . . . 537--541
            David F. Shanno and   
                  Roman L. Weil   Management science: a view from
                                  nonlinear programming  . . . . . . . . . 542--549
                     Joel Moses   Toward a General Theory of Special
                                  Functions  . . . . . . . . . . . . . . . 550--556 (or 550--554??)
                   C. C. Foster   A view of computer architecture  . . . . 557--565
                   A. G. Fraser   On the interface between computers and
                                  data communications systems  . . . . . . 566--573
              Per Brinch Hansen   Structured Multiprogramming  . . . . . . 574--578
                    W. C. Lynch   Operating system performance . . . . . . 579--585
                S. R. Kimbleton   The role of computer system models in
                                  performance evaluation . . . . . . . . . 586--590
                     Saul Rosen   Programming Systems and Languages
                                  (1965--1975) . . . . . . . . . . . . . . 591--600
                 Jean E. Sammet   Programming Languages: History and
                                  Future . . . . . . . . . . . . . . . . . 601--610
                  L. D. Fosdick   The production of better mathematical
                                  software . . . . . . . . . . . . . . . . 611--617
                   D. G. Bobrow   Requirements for Advanced Programming
                                  Systems for List Processing  . . . . . . 618--627
             Charles W. Bachman   The Evolution of Storage Structures  . . 628--634
                     J. R. Rice   On the present and future of scientific
                                  computation  . . . . . . . . . . . . . . 637--639
             Robert I. Benjamin   A generational perspective of
                                  information system development . . . . . 640--643
                  S. Y. Sedelow   Language analysis in the humanities  . . 644--647
                     K. L. Zinn   Computers in the instructional process:
                                  directions for research and development  648--651
                  G. M. Sturman   Computers and urban society  . . . . . . 652--657
                      G. Salton   Dynamic document processing  . . . . . . 658--668
                Donald E. Knuth   Ancient Babylonian algorithms  . . . . . 671--677
                F. L. Bauer and   
                 H. Wossner and   
                    Konrad Zuse   The ``Plankalkul'' of Konrad Zuse: a
                                  forerunner of today's programming
                                  languages. . . . . . . . . . . . . . . . 678--685
             Richard E. Sprague   A Western View of Computer History . . . 686--692
                   Franz L. Alt   Archaeology of computers ---
                                  reminiscences, 1945--1947  . . . . . . . 693--694
                 A. Borodin and   
                  C. C. Gotlieb   Computers and employment . . . . . . . . 695--702

Communications of the ACM
Volume 15,  Number 8, August, 1972

                John G. Herriot   In memory of George E. Forsythe  . . . . 719--720
                Donald E. Knuth   George Forsythe and the development of
                                  Computer Science . . . . . . . . . . . . 721--726
                    David Crowe   Generating parsers for affix grammars.
                                  Collection of articles in honor of
                                  George E. Forsythe (ACM Student
                                  Competition Award Papers)  . . . . . . . 728--734
           Robert E. Helbig and   
             Patrick K. Orr and   
             Robert R. Roediger   Political Redistricting by Computer  . . 735--741
             Arthur J. Benjamin   Extensible Editor for a Small Machine
                                  with Disk Storage  . . . . . . . . . . . 742--747
            Robert F. Rosin and   
             Gideon Frieder and   
       Richard H. Eckhouse, Jr.   Environment for Research in
                                  Microprogramming and Emulation . . . . . 748--760
                 P. H. Oden and   
                  G. S. Shedler   A Model of Memory Contention in a Paging
                                  Machine  . . . . . . . . . . . . . . . . 761--771
            H. J. Bernstein and   
                  H. T. Gladwin   Compiling fixed-point multiplications    772--772
             W. L. van der Poel   Comment on the composition of semantics
                                  in Algol 68  . . . . . . . . . . . . . . 772--772
           James H. Morris, Jr.   A Bonus from van Wijngaarden's Device    773--773
                    P. R. Jones   Comment on average binary search length  774--774
             Ronald C. Read and   
                      K. Harada   A note on the generation of rosary
                                  permutations. With a response by K.
                                  Harada . . . . . . . . . . . . . . . . . 775--775
                      W. Squire   ACM Algorithm 429: Localization of the
                                  Roots of a Polynomial  . . . . . . . . . 776--777
           P. W. Purdom Jr. and   
                    E. F. Moore   ACM Algorithm 430: Immediate
                                  Predominators in a Directed Graph  . . . 777--778

Communications of the ACM
Volume 15,  Number 9, September, 1972

               K. N. Levitt and   
                    W. H. Kautz   Cellular Arrays for the Solution of
                                  Graph Problems . . . . . . . . . . . . . 789--801
                 Sakti P. Ghosh   File Organization --- The Consecutive
                                  Retrieval Property . . . . . . . . . . . 802--808
                     M. Mor and   
                      T. Lamdan   A New Approach to Automatic Scanning of
                                  Contour Maps . . . . . . . . . . . . . . 809--812
                Paul L. Richman   Automatic Error Analysis for Determining
                                  Precision  . . . . . . . . . . . . . . . 813--817
                   A. Ravindran   ACM Algorithm 431: A Computer Routine
                                  for Quadratic and Linear Programming
                                  Problems . . . . . . . . . . . . . . . . 818--820
              R. H. Bartels and   
                  G. W. Stewart   ACM Algorithm 432: Solution of the
                                  Matrix Equation
                                  ${\bf{A}}x+x{\bf{B}}={\bf{C}}$ . . . . . 820--826
                  E. S. Deutsch   Thinning Algorithms on Rectangular,
                                  Hexagonal, and Triangular Arrays . . . . 827--837
                     J. Gregory   A Comparison of Floating Point Summation
                                  Methods  . . . . . . . . . . . . . . . . 838--838
                Hatem M. Khalil   The eigenproblem of block tridiagonal
                                  matrices . . . . . . . . . . . . . . . . 839--839
               D. L. Parnas and   
            A. N. Habermann and   
                     R. C. Holt   Comment on Deadlock Prevention Method    840--841
              R. Rubinstein and   
                     J. Feldman   A controller for a Braille terminal  . . 841--842
                      K. C. Tan   On Foster's Information Storage and
                                  Retrieval Using AVL Trees  . . . . . . . 843--843

Communications of the ACM
Volume 15,  Number 10, October, 1972

                 E. W. Dijkstra   The Humble Programmer  . . . . . . . . . 859--866
                James B. Morris   Demand Paging Through Utilization of
                                  Working Sets on the Maniac II  . . . . . 867--872
               J. H. Ahrens and   
                      U. Dieter   Computer Methods for Sampling from the
                                  Exponential and Normal Distributions . . 873--882
              Richard J. Hanson   Integral Equations of Immunology . . . . 883--890
          Robert F. Simmons and   
                Jonathan Slocum   Generating English Discourse from
                                  Semantic Networks  . . . . . . . . . . . 891--905
                     Gert Dathe   Conversion of Decision Tables by Rule
                                  Mask Method without Rule Mask  . . . . . 906--909
               W. D. Frazer and   
                     C. K. Wong   Sorting by Natural Selection . . . . . . 910--913
                   A. P. Ershov   Corrigendum: ``Aesthetics and the Human
                                  Factor in Programming''  . . . . . . . . 913--913
                       H. Akima   ACM Algorithm 433: Interpolation and
                                  Smooth Curve Fitting Based on Local
                                  Procedures . . . . . . . . . . . . . . . 914--918

Communications of the ACM
Volume 15,  Number 11, November, 1972

                    Phyllis Fox   Comparative Study of Computer Programs
                                  for Integrating Differential Equations   941--948
             Michael A. Malcolm   Algorithms to Reveal Properties of
                                  Floating-Point Arithmetic  . . . . . . . 949--951
             Merrell L. Patrick   A Highly Parallel Algorithm for
                                  Approximating All Zeros of a Polynomial
                                  with Only Real Zeros . . . . . . . . . . 952--955
               Henry F. Ledgard   Model for Type Checking --- with an
                                  Application to Algol 60  . . . . . . . . 956--966
                Peter Henderson   Derived Semantics for Some Programming
                                  Language Constructs  . . . . . . . . . . 967--973
                    M. Verhelst   Conversion of Limited-Entry Decision
                                  Tables to Optimal and Near-Optimal
                                  Flowcharts: Two New Algorithms . . . . . 974--980
                  H. D. Baecker   Garbage Collection for Virtual Memory
                                  Computer Systems . . . . . . . . . . . . 981--986
            John S. Ramberg and   
             Bruce W. Schmeiser   Approximate Method for Generating
                                  Symmetric Random Variables . . . . . . . 987--990
                    D. L. March   ACM Algorithm 434: Exact Probabilities
                                  for ${R\times{C}}$ Contingency Tables    991--992
                   W. Fullerton   ACM Algorithm 435: Modified Incomplete
                                  Gamma Function . . . . . . . . . . . . . 993--995
                  V. Y. Lum and   
                  P. S. T. Yuen   Additional results on key-to-address
                                  transform techniques: a fundamental
                                  performance study on large existing
                                  formatted files  . . . . . . . . . . . . 996--997
                     S. Kennedy   A note on optimal doubly-chained trees   997--998
        Murray A. Eisenberg and   
             Michael R. McGuire   Further comments on Dijkstra's
                                  concurrent programming control problem   999--999
                  S. W. Smoliar   Comments on Moorer's Music and computer
                                  composition  . . . . . . . . . . . . . . 1000--1001

Communications of the ACM
Volume 15,  Number 12, December, 1972

        J. Richard Phillips and   
                    H. C. Adams   Dynamic Partitioning for Array Languages 1023--1032
                   R. Bayer and   
                    C. Witzgall   Index Ranges for Matrix Calculi  . . . . 1033--1039
                 Jay Earley and   
                Paul Caizergues   Method for Incrementally Compiling
                                  Languages with Nested Statement
                                  Structure  . . . . . . . . . . . . . . . 1040--1044
                Fabrizio Luccio   Weighted Increment Linear Search for
                                  Scatter Tables . . . . . . . . . . . . . 1045--1047
                 D. R. Barr and   
                   N. L. Slezak   A comparison of multivariate normal
                                  generators . . . . . . . . . . . . . . . 1048--1049
                 John Moore and   
              Prentiss Robinson   New Method for the Solution of the
                                  Cauchy Problem for Parabolic Equations   1050--1052
                   D. L. Parnas   On the Criteria to Be Used in
                                  Decomposing Systems into Modules . . . . 1053--1058
                    P. J. Brown   Levels of Language for Portable Software 1059--1062
            Stephen Sherman and   
        Forest Baskett, III and   
                   J. C. Browne   Trace-Driven Modeling and Analysis of
                                  CPU Scheduling in a Multiprogramming
                                  System . . . . . . . . . . . . . . . . . 1063--1069
                   W. R. Boland   ACM Algorithm 436: Product Type
                                  Trapezoidal Integration  . . . . . . . . 1070--1070
                   W. R. Boland   ACM Algorithm 437: Product Type
                                  Simpson's Integration  . . . . . . . . . 1070--1071
                   W. R. Boland   ACM Algorithm 439: Product Type
                                  Three-point Gauss-Legendre-Simpson's
                                  Integration  . . . . . . . . . . . . . . 1072

Communications of the ACM
Volume 15,  Number 2, February, 1973

           Peter J. Denning and   
             Stuart C. Schwartz   Corrigendum: ``Properties of the
                                  working-set model''  . . . . . . . . . . 191--198

Communications of the ACM
Volume 16,  Number 1, January, 1973

                  G. S. Shedler   A Queuing Model of a Multiprogrammed
                                  Computer with a Two-Level Storage System 3--10
                    Carter Bays   The Reallocation of Hash-Coded Tables    11--14
           James H. Morris, Jr.   Protection in Programming Languages  . . 15--21
             Yoichi Muraoka and   
                  David J. Kuck   On the Time Required for a Sequence of
                                  Matrix Products  . . . . . . . . . . . . 22--26
                E. B. James and   
                D. P. Partridge   Adaptive Correction of Program
                                  Statements . . . . . . . . . . . . . . . 27--37
                  P. L. Richman   Variable-Precision Exponentiation  . . . 38--40
                 C. R. Crawford   Reduction of a Band-Symmetric
                                  Generalized Eigenvalue Problem . . . . . 41--44
               S. E. Blount and   
                        L. Fein   The practical aspect of computer science
                                  education --- discussion . . . . . . . . 45--46
                        C. Bays   A note on when to chain overflow items
                                  within a direct-access table . . . . . . 46--47
                   M. S. Atkins   Mutual recursion in Algol 60 using
                                  restricted compilers . . . . . . . . . . 47--48
                 L. J. Gallaher   ACM Algorithm 440: A Multidimensional
                                  Monte Carlo Quadrature with Adaptive
                                  Stratified Sampling  . . . . . . . . . . 49--50
                     R. E. Knop   ACM Algorithm 441: Random samples from
                                  the dipole distribution [G5] . . . . . . 51--51
                 G. W. Hill and   
                    A. W. Davis   ACM Algorithm 442: Normal deviate [S14]  51--52

Communications of the ACM
Volume 16,  Number 2, February, 1973

                  R. D. Merrill   Representation of Contours and Regions
                                  for Efficient Computer Search  . . . . . 69--82
         S. Crespi-Reghizzi and   
            M. A. Melkanoff and   
                     L. Lichten   The Use of Grammatical Inference for
                                  Designing Programming Languages  . . . . 83--90
                   J. F. Gimpel   A Theory of Discrete Patterns and Their
                                  Implementation in SNOBOL4  . . . . . . . 91--100
                       J. Rokne   Automatic Errorbounds for Simple Zeros
                                  of Analytic Functions  . . . . . . . . . 101--104
               Richard P. Brent   Reducing the Retrieval Time of Scatter
                                  Storage Techniques . . . . . . . . . . . 105--109
           Robert M. Graham and   
      Gerald J. Clancy, Jr. and   
               David B. DeVaney   A software design and evaluation system  110--116
                   R. M. Balzer   An overview of the ISPL computer system
                                  design . . . . . . . . . . . . . . . . . 117--122
              F. N. Fritsch and   
               R. E. Shafer and   
                  W. P. Crowley   ACM Algorithm 443: Solution of the
                                  Transcendental Equation $w e^w = x$  . . 123--124

Communications of the ACM
Volume 16,  Number 3, March, 1973

         Richard H. Austing and   
                Gerald L. Engel   A Computer Science Course Program for
                                  Small Colleges . . . . . . . . . . . . . 139--147
               Robert A. Wagner   Common Phrases and Minimum-Space Text
                                  Storage  . . . . . . . . . . . . . . . . 148--152
                Y. Feinroth and   
            E. Franceschini and   
                   M. Goldstein   Telecommunications Using a Front-End
                                  Minicomputer . . . . . . . . . . . . . . 153--160
                Charles D. Pack   The Effects of Multiplexing on a
                                  Computer-Communications System . . . . . 161--168
          Richard W. Conway and   
               Thomas R. Wilcox   Design and Implementation of Diagnostic
                                  Compiler for PL/I  . . . . . . . . . . . 169--179
                   H. E. Salzer   Gray code and the +or-sign sequence when
                                  +or-f(+or-f(+or-f( . . +or-f(x) . . .)))
                                  is ordered . . . . . . . . . . . . . . . 180--180
              Abraham Bookstein   On Harrison's Substring Testing
                                  Technique  . . . . . . . . . . . . . . . 180--181
                    W. H. Payne   Graduate Education: The Ph.D. Glut . . . 181--182
                   R. A. Wagner   ACM Algorithm 444: An Algorithm for
                                  Extracting Phrases in a Space-Optimal
                                  Fashion  . . . . . . . . . . . . . . . . 183--185
                  Shi-Kuo Chang   ACM Algorithm 445: Binary Pattern
                                  Reconstruction from Projections  . . . . 185--186
                         J. Lau   Binary pattern reconstruction from
                                  projections  . . . . . . . . . . . . . . 186--186

Communications of the ACM
Volume 16,  Number 4, April, 1973

                 A. Hassitt and   
          J. W. Lageschulte and   
                     L. E. Lyon   Implementation of a High Level Language
                                  Machine  . . . . . . . . . . . . . . . . 199--212
               John G. Williams   Asymmetric Memory Hierarchies  . . . . . 213--222
                    H. Kuki and   
                     W. J. Cody   A Statistical Study of the Accuracy of
                                  Floating Point Number Systems  . . . . . 223--230
             W. A. Burkhard and   
                   R. M. Keller   Some Approaches to Best-Match File
                                  Searching  . . . . . . . . . . . . . . . 230--236
       James P. Strong, III and   
               Azriel Rosenfeld   A region coloring technique for scene
                                  analysis . . . . . . . . . . . . . . . . 237--246
      Juan Rodriguez-Rosell and   
              Jean-Pierre Dupuy   The design, implementation, and
                                  evaluation of a working set dispatcher   247--253
                     R. Broucke   ACM Algorithm 446: Ten Subroutines for
                                  the Manipulation of Chebyshev Series . . 254--256
              L. C. Ragland and   
                     D. I. Good   Greatest common divisor of $n$ integers
                                  and multipliers  . . . . . . . . . . . . 257--257

Communications of the ACM
Volume 16,  Number 5, May, 1973

                    David Pager   On the Problem of Communicating Complex
                                  Information  . . . . . . . . . . . . . . 275--281
                   David W. Low   Programming by Questionnaire: an
                                  Effective Way to Use Decision Tables . . 282--286
              P. J. H. King and   
                  R. G. Johnson   Some Comments on the Use of Ambiguous
                                  Decision Tables and Their Conversion to
                                  Computer Programs  . . . . . . . . . . . 287--290
                   John Salasin   Hierarchical Storage in Information
                                  Retrieval  . . . . . . . . . . . . . . . 291--295
              D. G. Corneil and   
              C. C. Gotlieb and   
                      Y. M. Lee   Minimal Event-Node Network of Project
                                  Precedence Relations . . . . . . . . . . 296--298
              Andrew Mercer and   
               Azriel Rosenfeld   An array grammar programming system  . . 299--305
             Edward M. Reingold   A Nonrecursive List Moving Algorithm . . 305--307
                         H. Vos   Coulomb wave functions . . . . . . . . . 308--309
                       G. Bayer   Maxflow  . . . . . . . . . . . . . . . . 309--309
                B. Holmgren and   
                    A. Kolm and   
                   D. Obradovic   Minit algorithm for linear programming   310--310
                   D. Obradovic   Minit algorithm for linear programming   310--310
                   J. A. Howell   Exact solution of linear equations using
                                  residue arithmetic . . . . . . . . . . . 311--311
                  A. H. J. Sale   A sparse matrix package  . . . . . . . . 311--311
                  R. E. Wheeler   Increasing the efficiency of quicksort   311--311
                      M. K. Roy   Reflection-free permutations, rosary
                                  permutations and adjacent transposition
                                  algorithms . . . . . . . . . . . . . . . 312--312
                 C. H. McMorrow   Concerning music and computer
                                  composition in computational linguistics 313--313
                R. L. Wexelblat   Another comment on computer music  . . . 313--314
                   R. G. Estell   A comment on the practical aspects of
                                  computer science education . . . . . . . 314--315
               Roger Fajman and   
                   John Borgelt   WYLBUR, An Interactive Text Editing and
                                  Remote Job Entry System  . . . . . . . . 314--322
              Dennis J. Frailey   A Practical Approach to Managing
                                  Resources and Avoiding Deadlocks . . . . 323--329

Communications of the ACM
Volume 16,  Number 6, June, 1973

                   R. G. Hamlet   Efficient multiprogramming resource
                                  allocation and accounting  . . . . . . . 337--342
                 E. Gelenbe and   
         J. C. A. Boekhorst and   
               J. L. W. Kessels   Minimizing wasted space in partitioned
                                  segmentation . . . . . . . . . . . . . . 343--349
                     J. C. Hill   Synchronizing processors with
                                  memory-content-generated interrupts  . . 350--351
            Harold S. Stone and   
               Samuel F. Fuller   On the Near-Optimality of the
                                  Shortest-Latency-Time-First Drum
                                  Scheduling Discipline  . . . . . . . . . 352--353
              P. F. Stockhausen   Adapting optimal code generation for
                                  arithmetic expressions to the
                                  instruction sets available on
                                  present-day computers  . . . . . . . . . 353--354
                     R. F. Ling   A computer generated aid for cluster
                                  analysis . . . . . . . . . . . . . . . . 355--361
                Ben Shneiderman   Optimum Data Base Reorganization Points  362--365
                      H. Strunz   The development of decision tables via
                                  parsing of complex decision situations   366--369
                  James R. Bell   Threaded Code  . . . . . . . . . . . . . 370--372
                J. Hopcroft and   
                      R. Tarjan   ACM Algorithm 447: Efficient Algorithms
                                  for Graph Manipulation . . . . . . . . . 372--378
                   T. Beyer and   
                D. F. Swinehart   ACM Algorithm 448: Number of
                                  Multiply-Restricted Partitions . . . . . 379--379
                J. Ferguson and   
                   P. A. Staley   Least squares piecewise cubic curve
                                  fitting  . . . . . . . . . . . . . . . . 380--382
                  W. D. Hoskins   Cubic spline solutions to fourth-order
                                  boundary value problems  . . . . . . . . 382--385
               Franz L. Alt and   
               Judith Yuni Kirk   Computer Photocomposition of Technical
                                  Text . . . . . . . . . . . . . . . . . . 386--391

Communications of the ACM
Volume 16,  Number 7, July, 1973

               Richard L. Nolan   Managing the Computer Resource: Stage
                                  Hypothesis . . . . . . . . . . . . . . . 399--405
                    J. C. Huang   A Note on Information Organization and
                                  Storage  . . . . . . . . . . . . . . . . 406--410
      Edward W. Kozdrowicki and   
               Dennis W. Cooper   COKO III: the Cooper-Koz Chess Program   411--427 (or 411--426??)
            John H. Howard, Jr.   Mixed Solutions for the Deadlock Problem 427--430
                   Erol Gelenbe   Distribution of a Program in Primary and
                                  Fast Buffer Storage  . . . . . . . . . . 431--434
                Robert F. Rosin   Teaching ``About Programming'' . . . . . 435--439
         F. Warren McFarlan and   
               Richard L. Nolan   Curriculum Recommendations for Graduate
                                  Professional Programs in Information
                                  Systems: Recommended Addendum on
                                  Information Systems Administration . . . 439--442 (or 439--441??)
                      A. Kandel   Computer Science --- Seminars for
                                  Undergraduates . . . . . . . . . . . . . 442--442
                 G. V. Bochmann   Multiple Exits from a Loop Without the
                                  GOTO . . . . . . . . . . . . . . . . . . 443--444
             Patrick A. V. Hall   Equivalence Between AND/OR Graphs and
                                  Context-Free Grammars  . . . . . . . . . 444--445
                       F. Fiala   ACM Algorithm 449: Solution of Linear
                                  Programming Problems in 0-1 Variables    445--448 (or 445--447??)
                B. W. Kernighan   Remark on ``Algorithm 422: Minimal
                                  Spanning Tree''  . . . . . . . . . . . . 448--448
           I. D. G. Macleod and   
                  A. M. Collins   Hidden-line plotting program . . . . . . 448--448
                  P. J. Nikolai   DIFSUB for solution of ordinary
                                  differential equations . . . . . . . . . 448--448

Communications of the ACM
Volume 16,  Number 8, August, 1973

               Michael H. Smith   A learning program which plays
                                  partnership dominoes . . . . . . . . . . 462--467
                B. J. MacLennan   Fen --- an Axiomatic Basis for Program
                                  Semantics  . . . . . . . . . . . . . . . 468--474
                  David Misunas   Petri Nets and Speed Independent Design  474--482 (or 474--481??)
                 M. MacHura and   
                      A. Mulawa   ACM Algorithm 450: Rosenbrock Function
                                  Minimization . . . . . . . . . . . . . . 482--483
                R. B. Goldstein   ACM Algorithm 451: Chi-Square Quantiles  483--485
                  C. N. Liu and   
                     D. T. Tang   ACM Algorithm 452: Enumerating
                                  Combinations of $m$ Out of $n$ Objects   485--485
                Robert Piessens   ACM Algorithm 453: Gaussian Quadrature
                                  Formulas for Bromwich's Integral . . . . 486--487
           J. A. Richardson and   
                  J. L. Kuester   ACM Algorithm 454: The Complex Method
                                  for Constrained Optimization . . . . . . 487--489
              G. Andrejkova and   
                       J. Vinar   Complex gamma function . . . . . . . . . 489--489
                R. M. De Morgan   Remark on ``Algorithm 357 [A1]: An
                                  Efficient Prime Number Generator'' . . . 489--489
                  R. P. Watkins   Graph plotter  . . . . . . . . . . . . . 489--490
                    J. G. Byrne   Hu-Tucker minimum redundancy alphabetic
                                  coding method  . . . . . . . . . . . . . 490--490
                     A. J. Good   Clenshaw-Curtis quadrature . . . . . . . 490--490
                 E. J. Williams   Localization of the roots of a
                                  polynomial . . . . . . . . . . . . . . . 490--490
                Zohar Manna and   
               Stephen Ness and   
                 Jean Vuillemin   Inductive Methods for Proving Properties
                                  of Programs  . . . . . . . . . . . . . . 491--502
             W. W. Peterson and   
                  T. Kasami and   
                      N. Tokura   On the Capabilities of While, Repeat,
                                  and Exit Statements  . . . . . . . . . . 503--512
               Caxton C. Foster   A Generalization of AVL Trees  . . . . . 513--517

Communications of the ACM
Volume 16,  Number 9, September, 1973

               Jeffrey P. Buzen   Computational Algorithms for Closed
                                  Queueing Networks with Exponential
                                  Servers  . . . . . . . . . . . . . . . . 527--531
               S. Ganapathy and   
                   V. Rajaraman   Information Theory Applied to the
                                  Conversion of Decision Tables to
                                  Computer Programs  . . . . . . . . . . . 532--539
            Alfonso F. Cardenas   Evaluation and Selection of File
                                  Organization --- A Model and a System    540--548
                    R. G. Casey   Design of Tree Structures for Efficient
                                  Querying . . . . . . . . . . . . . . . . 549--556
          Juan Rodriguez-Rosell   Empirical Working Set Behavior . . . . . 556--560
          Geoffrey W. Gates and   
             David A. Poplawski   A simple technique for structured
                                  variable lookup  . . . . . . . . . . . . 561--565
                M. V. Zelkowitz   Reversible Execution . . . . . . . . . . 566--566
         Robert E. Barnhill and   
               David T. Pilcher   Sard kernels for certain bivariate
                                  cubatures  . . . . . . . . . . . . . . . 567--571 (or 567--570??)
               D. B. Hunter and   
                 J. M. Williams   ACM Algorithm 455: Analysis of Skew
                                  Representations of the Symmetric Group   571--572
                 Zden\vek Fencl   ACM Algorithm 456: Routing Problem . . . 572--574
                  Coen Bron and   
                  Joep Kerbosch   ACM Algorithm 457: Finding All Cliques
                                  of an Undirected Graph . . . . . . . . . 575--577
                      M. K. Roy   Remark on ``Algorithm 323 [G6]:
                                  Generation of Permutations in
                                  Lexicographic Order''  . . . . . . . . . 577--578
                Mohit Kumar Roy   Remark on ``Algorithm 323 [G6]:
                                  Generation of Permutations in
                                  Lexicographic Order''  . . . . . . . . . 577--578
                 E. E. Lawrence   A sparse matrix package. I . . . . . . . 578--578
                  H. Williamson   Hidden-line plotting program . . . . . . 578--579
             H. B. Driessen and   
                E. W. LeM. Hunt   Localization of the roots of a
                                  polynomial . . . . . . . . . . . . . . . 579--579

Communications of the ACM
Volume 16,  Number 10, October, 1973

              John S. McGeachie   Multiple Terminals Under User Program
                                  Control in a Time-Sharing Environment    587--590
           Daniel G. Bobrow and   
                   Ben Wegbreit   A Model and Stack Implementation of
                                  Multiple Environments  . . . . . . . . . 591--603
                 Vincent Y. Lum   General Performance Analysis of
                                  Key-to-Address Transformation Methods
                                  Using an Abstract File Concept . . . . . 603--612
              Butler W. Lampson   A Note on the Confinement Problem  . . . 613--615
           Daniel S. Hirschberg   A Class of Dynamic Memory Allocation
                                  Algorithms . . . . . . . . . . . . . . . 615--618
               Barton G. Prieve   Using Page Residency to Select the
                                  Working Set Parameter  . . . . . . . . . 619--620
            Robert E. Millstein   Control Structures in Illiac IV Fortran  621--627
               P. D. Robers and   
                   S. S. Robers   ACM Algorithm 458: Discrete Linear
                                  ${L}_1$ Approximation by Interval Linear
                                  Programming  . . . . . . . . . . . . . . 629--631
                    M. M. Syslo   ACM Algorithm 459: The Elementary
                                  Circuits of a Graph  . . . . . . . . . . 632--633
             Paul E. Saylor and   
             James D. Sebastian   ACM Algorithm 460: Calculation of
                                  Optimum Parameters for Alternating
                                  Direction Implicit Procedures  . . . . . 633--635
            F. J. Burkowski and   
                  W. D. Hoskins   ACM Algorithm 461: Cubic Spline
                                  Solutions to a Class of Functional
                                  Differential Equations . . . . . . . . . 635--637
                 T. G. Donnelly   ACM Algorithm 462: Bivariate Normal
                                  Distribution . . . . . . . . . . . . . . 638--638
                   C. R. Lewart   ACM Algorithm 463: Algorithms SCALE1,
                                  SCALE2, and SCALE3 for Determination of
                                  Scales on Computer Generated Plots . . . 639--640

Communications of the ACM
Volume 16,  Number 11, November, 1973

             Charles W. Bachman   The Programmer as Navigator  . . . . . . 653--658
                    R. S. Fabry   Dynamic Verification of Operating System
                                  Decisions  . . . . . . . . . . . . . . . 659--668
             M. D. Mickunas and   
                V. B. Schneider   Parser-Generating System for
                                  Constructing Compressed Compilers  . . . 669--676
          B. W. Jordan, Jr. and   
                  R. C. Barrett   Scan Conversion Algorithm with Reduced
                                  Storage Requirements . . . . . . . . . . 676--682
            James R. Slagle and   
                Lewis M. Norton   Experiments with an Automatic
                                  Theorem-Prover Having Partial Ordering
                                  Inference Rules  . . . . . . . . . . . . 682--688
                  C. H. Reinsch   ACM Algorithm 464: Eigenvalues of a Real
                                  Symmetric Tridiagonal Matrix . . . . . . 689--689
                     G. W. Hill   ACM Algorithm 465: Student's $t$
                                  Frequency  . . . . . . . . . . . . . . . 690--690
                     G. Ehrlich   ACM Algorithm 466: Four Combinatorial
                                  Algorithms . . . . . . . . . . . . . . . 690--691
                     N. Brenner   ACM Algorithm 467: Matrix Transposition
                                  in Place . . . . . . . . . . . . . . . . 692--694
             T. N. L. Patterson   ACM Algorithm 468: Algorithm for
                                  Automatic Numerical Integration Over a
                                  Finite Interval  . . . . . . . . . . . . 694--699
                     C. Lam and   
                       J. McKay   ACM Algorithm 469: Arithmetic Over a
                                  Finite Field . . . . . . . . . . . . . . 699--699
           Peter J. Denning and   
                G. Scott Graham   A Note on Subexpression Ordering in the
                                  Execution of Arithmetic Expressions  . . 700--702
          Jerome A. Feldman and   
               James R. Low and   
                    R. P. Brent   Comment on Brent's scatter storage
                                  algorithm (and author's reply) . . . . . 703--703
                      E. Wegner   Tree-structured programs . . . . . . . . 704--705
              Herbert E. Salzer   A recurrence scheme for converting from
                                  one orthogonal expansion into another    705--707
                     F. Stenger   An algorithm for the approximate
                                  solution of Wiener-Hopf integral
                                  equations  . . . . . . . . . . . . . . . 708--710
                  L. W. Ehrlich   Solving the Biharmonic Equation in a
                                  Square: a Direct Versus a Semidirect
                                  Method . . . . . . . . . . . . . . . . . 711--714

Communications of the ACM
Volume 16,  Number 12, December, 1973

               J. Daniel Couger   Curriculum Recommendations for
                                  Undergraduate Programs in Information
                                  Systems  . . . . . . . . . . . . . . . . 727--749
            Edgar H. Sibley and   
               Robert W. Taylor   A Data Definition and Mapping Language   750--759
                     M. Kubicek   ACM Algorithm 470: Linear Systems with
                                  Almost Tridiagonal Matrix  . . . . . . . 760--761
                    W. Gautschi   ACM Algorithm 471: Exponential Integrals 761--763
              J. G. Herriot and   
                  C. H. Reinsch   ACM Algorithm 472: Procedures for
                                  Natural Spline Interpolation . . . . . . 763--768

Communications of the ACM
Volume 17,  Number 1, January, 1974

                        G. Lyon   Syntax-directed least-errors analysis
                                  for context-free languages: a practical
                                  approach . . . . . . . . . . . . . . . . 3--14
         Michael A. Malcolm and   
                    John Palmer   A Fast Method For Solving a Class of
                                  Tridiagonal Systems of Linear Equations  14--17
                       H. Akima   A method of bivariate interpolation and
                                  smooth surface fitting based on local
                                  procedures . . . . . . . . . . . . . . . 18--20
            Norman E. Gibbs and   
          William G. Poole, Jr.   Tridiagonalization by Permutations . . . 20--24
                    R. Piessens   ACM Algorithm 473: Computation of
                                  Legendre Series Coefficients . . . . . . 25--25
                       H. Akima   ACM Algorithm 474: Bivariate
                                  Interpolation and Smooth Surface Fitting
                                  Based on Local Procedures  . . . . . . . 26--31
         Ivan E. Sutherland and   
                Gary W. Hodgman   Reentrant Polygon Clipping . . . . . . . 32--42
              P. J. H. King and   
                  R. G. Johnson   Comments on the algorithms of Verhelst
                                  for the conversion of limited-entry
                                  decision tables to flowcharts (and
                                  author's reply)  . . . . . . . . . . . . 43--45
                  Gary D. Knott   A Numbering System for Combinations  . . 45--46
               H. C. Lucas, Jr.   A CRT report generating system . . . . . 47--48

Communications of the ACM
Volume 17,  Number 2, February, 1974

      James B. Rothnie, Jr. and   
                   Tomas Lozano   Attribute Based File Organization in a
                                  Paged Memory Environment . . . . . . . . 63--69
          B. W. Jordan, Jr. and   
                  R. C. Barrett   A cell organized raster display for line
                                  drawings . . . . . . . . . . . . . . . . 70--77
            John S. Ramberg and   
             Bruce W. Schmeiser   An Approximate Method for Generating
                                  Asymmetric Random Variables  . . . . . . 78--82
                 Leslie Lamport   The Parallel Execution of DO Loops . . . 83--93
               Henry F. Ledgard   Production Systems: or can we do better
                                  than BNF?  . . . . . . . . . . . . . . . 94--102
                   Ben Wegbreit   The Synthesis of Loop Predicates . . . . 102--112

Communications of the ACM
Volume 17,  Number 3, March, 1974

             K. Sreenivasan and   
                 A. J. Kleinman   On the Construction of a Representative
                                  Synthetic Workload . . . . . . . . . . . 127--133
               E. Balkovich and   
                    W. Chiu and   
                 L. Presser and   
                        R. Wood   Dynamic Memory Repacking . . . . . . . . 133--138
              Howard Lee Morgan   Optimal Space Allocation on Disk Storage
                                  Devices  . . . . . . . . . . . . . . . . 139--142
                  Rudolf Loeser   Some Performance Tests of ``Quicksort''
                                  and Descendants  . . . . . . . . . . . . 143--152
                      T. Wright   Visible surface plotting program . . . . 152--157 (or 152--155??)
               N. E. Bosten and   
                 E. L. Battiste   Incomplete beta ratio  . . . . . . . . . 156--157
              R. C. Barrett and   
              B. W. Jordan, Jr.   Scan Conversion Algorithms for a Cell
                                  Organized Raster Display . . . . . . . . 157--163
              A. Frank Ackerman   Quadratic Search for Hash Tables of Size
                                  $p^n$  . . . . . . . . . . . . . . . . . 164--164
                Harold S. Stone   A note on a combinatorial problem of
                                  Burnett and Coffman  . . . . . . . . . . 165--166
                  Fred T. Krogh   Efficient Implementation of a Variable
                                  Projection Algorithm for Nonlinear Least
                                  Squares Problems . . . . . . . . . . . . 167--169

Communications of the ACM
Volume 17,  Number 4, April, 1974

              Jerome H. Saltzer   A Simple Linear Model of Demand Paging
                                  Performance  . . . . . . . . . . . . . . 181--186
             M. A. Franklin and   
                    R. K. Gupta   Computation of Page Fault Probability
                                  from Program Transition Diagram  . . . . 186--191
                  John W. Boyse   Execution Characteristics of Programs in
                                  a Page-On-Demand System  . . . . . . . . 192--196
               Graham Smith and   
                  Ian M. Sefton   On Lions' Counter Example for Gotlieb's
                                  Method for the Construction of School
                                  Timetables . . . . . . . . . . . . . . . 196--197
                 Gary Lindstrom   Copying List Structures Using Bounded
                                  Workspace  . . . . . . . . . . . . . . . 198--202
                    Shimon Even   Parallelism in Tape-Sorting  . . . . . . 202--204
           H. C. Lucas, Jr. and   
           D. B. Montgomery and   
                 J. C. Larreche   A study of computer use in a graduate
                                  school of business . . . . . . . . . . . 205--206
              Peter Freeman and   
         Michael A. Malcolm and   
               William H. Payne   Graduate Education: The Ph.D. Glut:
                                  Response and Rebuttal  . . . . . . . . . 206--207
             T. D. Sterling and   
                  S. V. Pollack   Ideal teaching machines --- a solution
                                  to the pedagogic language problem  . . . 207--208
                 P. W. Abrahams   Some remarks on lookup of structured
                                  variables  . . . . . . . . . . . . . . . 209--210
                     A. Balfour   An alternative approach to mutual
                                  recursion in Algol 60 using restricted
                                  compilers  . . . . . . . . . . . . . . . 210--210
               R. C. T. Lee and   
                C. L. Chang and   
                R. J. Waldinger   An Improved Program-Synthesizing
                                  Algorithm and its Correctness  . . . . . 211--217
                    A. K. Cline   Scalar- and planar-valued curve fitting
                                  using splines under tension. I . . . . . 218--220
                    A. K. Cline   ACM Algorithm 476: Six Subprograms for
                                  Curve Fitting Using Splines Under
                                  Tension  . . . . . . . . . . . . . . . . 220--223 (or 220--221??)
                     G. Ehrlich   ACM Algorithm 477: Generator of
                                  Set-Partitions to Exactly ${R}$ Subsets  224--225
                   B. Einarsson   Solution of the transcendental equation
                                  we/sup w/=x  . . . . . . . . . . . . . . 225--225

Communications of the ACM
Volume 17,  Number 5, May, 1974

                      Mary Shaw   Reduction of Compilation Costs Through
                                  Language Contraction . . . . . . . . . . 245--250
                   Ben Wegbreit   The treatment of data types in EL1 . . . 251--264
               Robert A. Wagner   Order-$n$ Correction for Regular
                                  Languages  . . . . . . . . . . . . . . . 265--268
                  Nai Kuan Tsao   On the Distributions of Significant
                                  Digits and Roundoff Errors . . . . . . . 269--271
           M. C. Wunderlich and   
                J. L. Selfridge   Design for a Number Theory Package with
                                  an Optimized Trial Division Routine  . . 272--276
            W. M. Gentleman and   
                 S. B. Marovich   More on Algorithms that Reveal
                                  Properties of Floating Point Arithmetic
                                  Units  . . . . . . . . . . . . . . . . . 276--277
                 D. E. Gold and   
                     D. J. Kuck   A Model for Masking Rotational Latency
                                  by Dynamic Disk Allocation . . . . . . . 278--288

Communications of the ACM
Volume 17,  Number 6, June, 1974

              Jacques Cohen and   
                 Carl Zuckerman   Two Languages for Estimating Program
                                  Efficiency . . . . . . . . . . . . . . . 301--308
                L. Henschen and   
           Ross A. Overbeek and   
                         L. Wos   A Theorem-Proving Language for
                                  Experimentation  . . . . . . . . . . . . 308--314
                James F. Gimpel   The minimization of
                                  spatially-multiplexed character sets . . 315--318
               I. Barrodale and   
               F. D. K. Roberts   ACM Algorithm 478: Solution of an
                                  Overdetermined System of Equations in
                                  the ${L_1}$ Norm . . . . . . . . . . . . 319--320
                     R. L. Page   ACM Algorithm 479: A Minimal Spanning
                                  Tree Clustering Method . . . . . . . . . 321--323
                     B. Gaither   Hidden-line plotting program . . . . . . 324--324
                    R. Piessens   Calculation of Fourier integrals . . . . 324--324
                    R. Piessens   Modified Havie integration . . . . . . . 324--324
                 T. M. R. Ellis   Hidden-line plotting program . . . . . . 324--325
                     R. L. Page   Generation of random correlated normal
                                  variables  . . . . . . . . . . . . . . . 325--325
                  D. M. Boulton   Exact probabilities for R*C contingency
                                  tables . . . . . . . . . . . . . . . . . 326--326
                    W. D. Slysz   An evaluation of software in the social
                                  sciences . . . . . . . . . . . . . . . . 326--332
                 John Adams and   
                      John Gary   Compact Representation of Contour Plots
                                  for Phone Line Transmission  . . . . . . 333--336
                    W. Wulf and   
                   E. Cohen and   
                  W. Corwin and   
                   A. Jones and   
                   R. Levin and   
                 C. Pierson and   
                     F. Pollack   HYDRA: The Kernel of a Multiprocessor
                                  Operating System . . . . . . . . . . . . 337--345
              Ian J. Barton and   
           Susan E. Creasey and   
           Michael F. Lynch and   
               Michael J. Snell   An Information-Theoretic Approach to
                                  Text Searching in Direct Access Systems  345--350
                 Edward Minieka   On Computing Sets of Shortest Paths in a
                                  Graph  . . . . . . . . . . . . . . . . . 351--353

Communications of the ACM
Volume 17,  Number 7, July, 1974

          Dennis M. Ritchie and   
                   Ken Thompson   The UNIX Time-Sharing System . . . . . . 365--375
               Samuel H. Fuller   Minimal-Total-Processing Time Drum and
                                  Disk Scheduling Disciplines  . . . . . . 376--381
                   J. Bruno and   
         E. G. Coffman, Jr. and   
                       R. Sethi   Scheduling Independent Tasks To Reduce
                                  Mean Finishing Time  . . . . . . . . . . 382--387
              Jerome H. Saltzer   Protection and the Control of
                                  Information Sharing in Multics . . . . . 388--402
                    R. S. Fabry   Capability-Based Addressing  . . . . . . 403--412
            Gerald J. Popek and   
             Robert P. Goldberg   Formal Requirements for Virtualizable
                                  Third Generation Architectures . . . . . 412--421

Communications of the ACM
Volume 17,  Number 8, August, 1974

                     Bruce Hahn   A New Technique for Compression and
                                  Storage of Data  . . . . . . . . . . . . 434--436
          Arthur Evans, Jr. and   
         William Kantrowitz and   
                    Edwin Weiss   A User Authentication Scheme Not
                                  Requiring Secrecy in the Computer  . . . 437--442
                George B. Purdy   A High Security Log-in Procedure . . . . 442--445
       Theodore D. Friedman and   
               Lance J. Hoffman   Execution Time Requirements for
                                  Encipherment Programs  . . . . . . . . . 445--449
              G. A. Neufeld and   
                      J. Tartar   Graph Coloring Conditions for the
                                  Existence of Solutions to the Timetable
                                  Problem  . . . . . . . . . . . . . . . . 450--453
                 Leslie Lamport   A New Solution of Dijkstra's Concurrent
                                  Programming Problem  . . . . . . . . . . 453--455
               John C. Cavouras   On the Conversion of Programs to
                                  Decision Tables: Method and Objectives   456--462
                   T. Lyche and   
                L. L. Schumaker   ACM Algorithm 480: Procedures for
                                  Computing Smoothing and Interpolating
                                  Natural Splines  . . . . . . . . . . . . 463--467
                 K. C. Crandall   ACM Algorithm 481: Arrow to Precedence
                                  Network Transformation . . . . . . . . . 467--469
                 John McKay and   
                     E. Regener   ACM Algorithm 482: Transitivity Sets
                                  [G7] . . . . . . . . . . . . . . . . . . 470--470
                   A. H. Stroud   Gauss Harmonic Interpolation Formulas    471--475
           Rolf O. E. Lagerloef   Interpolation with Rounded Ramp
                                  Functions  . . . . . . . . . . . . . . . 476--479
                Forman S. Acton   Recurrence Relations for the Fresnel
                                  Integral
                                  $\int_0^\infty[\exp(-ct)dt/(t)^{1/2}(1+t^2)]$ and Similar Integrals  480--481

Communications of the ACM
Volume 17,  Number 9, September, 1974

                  I. M. Willers   A New Integration Algorithm for Ordinary
                                  Differential Equations Based on
                                  Continued Fraction Approximations  . . . 504--508
                  Oliver Aberth   A Precise Numerical Analysis Program . . 509--513
                 To-yat. Cheung   Interactive Graphic Display for Region
                                  Partitioning by Linear Programming . . . 513--516
               Mario Schkolnick   The Equivalence of Reducing Transition
                                  Languages and Deterministic Languages    517--519
                  S. L. Watkins   ACM Algorithm 483: Masked
                                  Three-Dimensional Plot Program with
                                  Rotations  . . . . . . . . . . . . . . . 520--523
                  K. H. Burrell   ACM Algorithm 484: Evaluation of the
                                  Modified Bessel Functions ${K}_0(z)$ and
                                  ${K}_1(z)$ for Complex Arguments . . . . 524--526
               H. D. Eidson and   
                L. L. Schumaker   ACM Algorithm 485: Computation of
                                  $g$-Splines via a Factorization Method   526--530
                  John W. Young   A First Order Approximation to the
                                  Optimum Checkpoint Interval  . . . . . . 530--531
                 Keith Shwayder   Extending the Information Theory
                                  Approach to Converting Limited-Entry
                                  Decision Tables to Computer Programs . . 532--537

Communications of the ACM
Volume 17,  Number 10, October, 1974

                 C. A. R. Hoare   Monitors: An Operating System
                                  Structuring Concept  . . . . . . . . . . 549--557
            Kenneth K. Shen and   
              James L. Peterson   A Weighted Buddy Method for Dynamic
                                  Storage Allocation . . . . . . . . . . . 558--568 (or 558--562??)
                D. R. Slutz and   
                  I. L. Traiger   A note on the calculation of average
                                  working set size . . . . . . . . . . . . 563--565
            Ben Shneiderman and   
              Peter Scheuermann   Structured Data Structures . . . . . . . 566--574
              R. H. Canaday and   
             R. D. Harrison and   
                 E. L. Ivie and   
                J. L. Ryder and   
                     L. A. Wehr   A Back-end Computer for Data Base
                                  Management . . . . . . . . . . . . . . . 575--583 (or 575--582??)
                 A. Charnes and   
                W. M. Raike and   
                J. D. Stutz and   
                  A. S. Walters   On Generation of Test Problems for
                                  Linear Programming Codes . . . . . . . . 583--587 (or 583--586??)
                     F. Veillon   ACM Algorithm 486: Numerical Inversion
                                  of Laplace Transform . . . . . . . . . . 587--589 (or 587--588??)
                   H. Koppelaar   Certification and remark on algorithm
                                  191  . . . . . . . . . . . . . . . . . . 589--590
                    L. G. Proll   A computer routine for quadratic and
                                  linear programming problems  . . . . . . 590--590
                  J. Klemes and   
                      J. Klemsa   Rosenbrock function minimization . . . . 590--591
                  Fred T. Krogh   Errata: ``Efficient Implementation of a
                                  Variable Projection Algorithm for
                                  Nonlinear Least Squares''  . . . . . . . 591--591
            Bruce Gilchrist and   
               Richard E. Weber   Enumerating Full-Time Programmers  . . . 592--593

Communications of the ACM
Volume 17,  Number 11, November, 1974

            Theodor D. Sterling   Guidelines for Humanizing Computerized
                                  Information Systems, A Report from
                                  Stanley House  . . . . . . . . . . . . . 609--613
               Domenico Ferrari   Improving Locality by Critical Working
                                  Sets . . . . . . . . . . . . . . . . . . 614--620
            Perry Lowell Miller   A locally-organized parser for spoken
                                  input  . . . . . . . . . . . . . . . . . 621--630
                  Gary M. Rader   Method for Composing Simple Traditional
                                  Music by Computer  . . . . . . . . . . . 631--638
            R. A. Freiburghouse   Register Allocation via Usage Counts . . 638--642
                 E. W. Dijkstra   Self-stabilizing Systems in Spite of
                                  Distributed Control  . . . . . . . . . . 643--644
                J. A. Brown and   
                      B. Werner   An on-site data management system
                                  application in field archaeology . . . . 644--646
                   D. R. Hanson   A simple technique for representing
                                  strings in Fortran IV  . . . . . . . . . 646--647
           C. J. Van Rijsbergen   The best-match problem in document
                                  retrieval  . . . . . . . . . . . . . . . 648--649
                    R. V. Evans   Multiple exits from a loop using neither
                                  GO TO nor labels . . . . . . . . . . . . 650--650

Communications of the ACM
Volume 17,  Number 12, December, 1974

                Donald E. Knuth   Computer Programming as an Art . . . . . 667--673
              Laurance I. Press   Arguments for a Moratorium on the
                                  Construction of a Community Information
                                  Utility  . . . . . . . . . . . . . . . . 674--678
                  J. C. Strauss   An analytic model of the Hasp execution
                                  task monitor . . . . . . . . . . . . . . 679--685
             Thomas L. Adam and   
               K. M. Chandy and   
                  J. R. Dickson   A Comparison of List Schedules for
                                  Parallel Processing Systems  . . . . . . 685--690
                  N. D. Wallace   Computer Generation of Gamma Random
                                  Variates with Non-Integral Shape
                                  Parameters . . . . . . . . . . . . . . . 691--695
                 A. Salazar and   
                  R. V. Oakford   A Graph Formulation of a School
                                  Scheduling Algorithm . . . . . . . . . . 696--698
            Sherwood C. Chu and   
                   Mones Berman   An Exponential Method for the Solution
                                  of Systems of Ordinary Differential
                                  Equations  . . . . . . . . . . . . . . . 699--702
                    J. Pomeranz   ACM Algorithm 487: Exact Cumulative
                                  Distribution of the Kolmogorov-Smirnov
                                  Statistic for Small Samples  . . . . . . 703--704
                    R. P. Brent   ACM Algorithm 488: A Gaussian
                                  pseudo-random number generator [G5]  . . 704--706 (or 704--705??)
             C. William Skinner   Heuristic Approach to Inductive
                                  Inference in Fact Retrieval Systems  . . 707--712

Communications of the ACM
Volume 21,  Number 1, January, 1974

                       D. Mitra   Some Aspects of Hierarchical Memory
                                  Systems  . . . . . . . . . . . . . . . . 54--65

Communications of the ACM
Volume 6,  Number 10, October, 1975

                R. E. Millstein   Control Structures in Illiac IV Fortran  157--164
                T. Sterling and   
                     V. Lum and   
                     N. Shu and   
                      B. Housel   CONVERT: A High Level Translation
                                  Definition Language for Data Conversion  557--567

Communications of the ACM
Volume 18,  Number 1, January, 1975

                 Aaron Finerman   Professionalism in the Computing Field   4--9
                    F. L. Bauer   Positivity and Norms . . . . . . . . . . 9--13
                      John Todd   The Lemniscate Constants . . . . . . . . 14--19
                  G. Peters and   
                J. H. Wilkinson   On the Stability of Gauss-Jordan
                                  Elimination with Pivoting  . . . . . . . 20--24
               Garrett Birkhoff   Two Hadamard Numbers for Matrices  . . . 25--29
               A. van der Sluis   Perturbations of Eigenvalues of
                                  Non-Normal Matrices  . . . . . . . . . . 30--36
              Marvin Marcus and   
               Herbert Robinson   Elementary Divisors of Tensor Products   36--39
             Magnus R. Hestenes   Pseudoinverses and Conjugate Gradients   40--43
                Harlan D. Mills   The New Math of Computer Programming . . 43--48
              Tien Chi Chen and   
                   Irving T. Ho   Storage-Efficient Representation of
                                  Decimal Data . . . . . . . . . . . . . . 49--52
                 Werner Liniger   Connections Between Accuracy and
                                  Stability Properties of Linear Multistep
                                  Formulas . . . . . . . . . . . . . . . . 53--56
              Richard J. Hanson   Stably Updating Mean and Standard
                                  Deviation of Data  . . . . . . . . . . . 57--58

Communications of the ACM
Volume 18,  Number 2, February, 1975

                  John McCarthy   Proposed Criterion for a Cipher to be
                                  Probable-Word Proof  . . . . . . . . . .   ??
              G. J. Burnett and   
             E. G. Coffman, Jr.   Analysis of Interleaved Memory Systems
                                  Using Blockage Buffers . . . . . . . . . 91--95
                Neil M. Goldman   Sentence Paraphrasing from a Conceptual
                                  Base . . . . . . . . . . . . . . . . . . 96--106
       Gordon J. VanderBrug and   
                    Jack Minker   State-Space, Problem-Reduction, and
                                  Theorem Proving --- Some Relationships   107--115
              Carolyn Kimme and   
               Dana Ballard and   
                  Jack Sklansky   Finding Circles by an Array of
                                  Accumulators . . . . . . . . . . . . . . 120--122

Communications of the ACM
Volume 18,  Number 3, March, 1975

             H. C. Johnston and   
                 C. A. R. Hoare   Matrix Reduction --- an Efficient Method
                                  (school timetables)  . . . . . . . . . . 141--150
         Brian W. Kernighan and   
              Lorinda L. Cherry   A System for Typesetting Mathematics . . 151--157
               D. H. Lawrie and   
                  T. Layman and   
                    D. Baer and   
                   J. M. Randal   GLYPNIR --- A programming language for
                                  Illiac IV  . . . . . . . . . . . . . . . 157--164
            Robert W. Floyd and   
               Ronald L. Rivest   Expected Time Bounds for Selection . . . 165--172
                R. W. Floyd and   
                   R. L. Rivest   ACM Algorithm 489: The Algorithm SELECT
                                  -- for Finding the $i$th Smallest of $n$
                                  Elements . . . . . . . . . . . . . . . . 173--173
              A. M. Erisman and   
                   W. F. Tinney   On Computing Certain Elements of the
                                  Inverse of a Sparse Matrix . . . . . . . 177--179
                 L. F. Shampine   Discrete Least Squares Polynomial Fits   179--180
               A. van der Sluis   Corrigendum: ``Perturbations of
                                  eigenvalues of non-normal matrices'' . .  180
                   D. L. Parnas   On a Solution to the Cigarette Smoker's
                                  Problem (Without Conditional Statements) 181--183

Communications of the ACM
Volume 18,  Number 4, April, 1975

           Jack A. Chambers and   
                   Ray V. Poore   Computer Networks in Higher Education:
                                  Socio-Economic-Political Factors . . . . 193--199
             E. S. Ginsberg and   
                  D. Zaborowski   ACM Algorithm 490: The Dilogarithm
                                  Function of a Real Argument  . . . . . . 200--202
                 K. K. Shen and   
                 J. L. Peterson   Corrigendum: ``A Weighted Buddy Method
                                  for Dynamic Storage Allocation'' . . . . 202--202
                   Graham Smith   On Maintenance of the Opportunity List
                                  for Class-Teacher Timetable Problems . . 203--208
                    I. C. Braid   The Synthesis of Solids Bounded by Many
                                  Faces  . . . . . . . . . . . . . . . . . 209--216
              Vladimir Batagelj   Quadratic Hash Method When the Table
                                  Size is not a Prime Number . . . . . . . 216--217
           Henry S. Warren, Jr.   A Modification of Warshall's Algorithm
                                  for the Transitive Closure of Binary
                                  Relations  . . . . . . . . . . . . . . . 218--220
                 James A. Hinds   Algorithm for Locating Adjacent Storage
                                  Blocks in the Buddy System . . . . . . . 221--222
            Jean G. Vaucher and   
                   Pierre Duval   A Comparison of Simulation Event List
                                  Algorithms . . . . . . . . . . . . . . . 223--230
         Robert R. Korfhage and   
                David W. Matula   On Salazar and Oakford . . . . . . . . . 240--240
           Michael R. Garey and   
               David S. Johnson   On Salazar and Oakford . . . . . . . . . 240--241

Communications of the ACM
Volume 18,  Number 5, May, 1975

                David A. Fisher   Copying Cyclic List Structures in Linear
                                  Time Using Bounded Workspace . . . . . . 251--252
            Alfonso F. Cardenas   Analysis and Performance of Inverted
                                  Data Base Structures . . . . . . . . . . 253--263
                   Yorick Wilks   An intelligent analyzer and understander
                                  of English . . . . . . . . . . . . . . . 264--274
                    N. E. Gibbs   ACM Algorithm 491: Basic Cycle
                                  Generation . . . . . . . . . . . . . . . 275--276 (or 275--275??)
                D. J. Evans and   
                 M. Hatzopoulos   A note on the LU factorization of a
                                  symmetric matrix . . . . . . . . . . . . 278--279
                      B. L. Fox   More on $k$th Shortest Paths . . . . . . 279--279
                A. I. Wasserman   A problem-list of public policy issues
                                  concerning computers and health care . . 279--280
                Harlan D. Mills   Corrigendum: ``The New Math of Computer
                                  Programming''  . . . . . . . . . . . . . 280--280
             Steven L. Horowitz   Syntactic Algorithm for Peak Detection
                                  in Waveforms with Applications to
                                  Cardiography . . . . . . . . . . . . . . 281--285
         Charles E. Pfefferkorn   Heuristic Problem Solving Design System
                                  for Equipment or Furniture Layouts . . . 286--297
         Robert R. Korfhage and   
                David W. Matula   More on the Salazar and Oakford Paper    303--303

Communications of the ACM
Volume 18,  Number 6, June, 1975

                    N. E. Gibbs   ACM Algorithm 492: Generation of All the
                                  Cycles of a Graph from a Set of Basic
                                  Cycles . . . . . . . . . . . . . . . . . 310--310
                Bui Tuong Phong   Illumination for Computer Generated
                                  Pictures . . . . . . . . . . . . . . . . 311--317
                  V. Y. Lum and   
                M. E. Senko and   
                 C. P. Wang and   
                        H. Ling   A Cost Oriented Algorithm for Data Set
                                  Allocation in Storage Hierarchies  . . . 318--322
             Alan F. Babich and   
                John Grason and   
                David L. Parnas   Significant Event Simulation . . . . . . 323--329
             Robert B. K. Dewar   Indirect Threaded Code . . . . . . . . . 330--331
               Ben Cranston and   
                    Rick Thomas   Simplified Recombination Scheme for the
                                  Fibonacci Buddy System . . . . . . . . . 331--332
              Alfred V. Aho and   
           Margaret J. Corasick   Efficient String Matching: an Aid to
                                  Bibliographic Search . . . . . . . . . . 333--340
               D. S. Hirschberg   A Linear Space Algorithm for Computing
                                  Maximal Common Subsequences  . . . . . . 341--343
                  Stephen Soule   Addition in an Arbitrary Base Without
                                  Radix Conversion . . . . . . . . . . . . 344--346
               L. H. Harper and   
                T. H. Payne and   
               J. E. Savage and   
                      E. Straus   Sorting $X + Y$  . . . . . . . . . . . . 347--350 (or 347--349??)
                  F. Paul Wyman   Improved Event-Scanning Mechanisms for
                                  Discrete Event Simulation  . . . . . . . 350--353
            Donald E. Knuth and   
           Charles T. Zahn, Jr.   Ill-Chosen Use of ``Event''  . . . . . . 360--360

Communications of the ACM
Volume 18,  Number 7, July, 1975

                 P. J. Courtois   Decomposability, Instabilities, and
                                  Saturation in Multiprogramming Systems   371--377
                  Soren Lauesen   A large semaphore based operating system 377--389
                Naomi Sager and   
                 Ralph Grishman   Restriction Language for Computer
                                  Grammars of Natural Language . . . . . . 390--400
               D. L. Parnas and   
                D. P. Siewiorek   Use of the Concept of Transparency in
                                  the Design of Hierarchically Structured
                                  Systems  . . . . . . . . . . . . . . . . 401--408
                 H. Freeman and   
                     R. Shapira   Determining the Minimum-Area Encasing
                                  Rectangle for an Arbitrary Closed Curve  409--413
               Daniel G. Bobrow   A Note on Hash Linking . . . . . . . . . 413--415
                R. E. Weber and   
                   B. Gilchrist   Discrimination in the employment of
                                  women in the computer industry . . . . . 416--418

Communications of the ACM
Volume 18,  Number 8, August, 1975

                  John E. Shore   On the External Storage Fragmentation
                                  Produced by First-Fit and Best-Fit
                                  Allocation Strategies  . . . . . . . . . 433--440
                  A. V. Aho and   
              S. C. Johnson and   
                   J. D. Ullman   Deterministic Parsing of Ambiguous
                                  Grammars . . . . . . . . . . . . . . . . 441--452
             Edsger W. Dijkstra   Guarded Commands, Nondeterminacy and
                                  Formal Derivation of Programs  . . . . . 453--457
                   L. W. Cotton   Remark on stably updating mean and
                                  standard deviation of data . . . . . . . 458--458
          Stuart C. Shapiro and   
              Stanley C. Kwasny   Interactive Consulting via Natural
                                  Language . . . . . . . . . . . . . . . . 459--462
                      John Todd   Corrigendum: ``The Lemniscate
                                  Constants''  . . . . . . . . . . . . . . 462--462
              J. G. Vaucher and   
                       P. Duval   Corrigendum: ``A comparison of
                                  simulation event list algorithms'' . . . 462--462
                    A. J. Smith   Comments on a paper by T. C. Chen and I.
                                  T. Ho  . . . . . . . . . . . . . . . . . 463--463
                 Sakti P. Ghosh   Consecutive Storage of Relevant Records
                                  with Redundancy  . . . . . . . . . . . . 464--471
                 Leslie Lamport   Multiple Byte Processing with Full-Word
                                  Instructions . . . . . . . . . . . . . . 471--475
                 Keith Shwayder   Combining Decision Rules in a Decision
                                  Table  . . . . . . . . . . . . . . . . . 476--480

Communications of the ACM
Volume 18,  Number 9, September, 1975

             Guy L. Steele, Jr.   Multiprocessing Compactifying Garbage
                                  Collection . . . . . . . . . . . . . . . 495--508
              Jon Louis Bentley   Multidimensional Binary Search Trees
                                  Used for Associative Searching . . . . . 509--517
               R. Mark Claudson   Digital Simulation of River Plankton
                                  Population Dynamics  . . . . . . . . . . 517--523
           William F. Piepmeier   Optimal Balancing of I/O Requests to
                                  Disks  . . . . . . . . . . . . . . . . . 524--527
                   Ben Wegbreit   Mechanical Program Analysis  . . . . . . 528--539

Communications of the ACM
Volume 18,  Number 10, October, 1975

                  Rob Gerritsen   A Preliminary System for the Design of
                                  DBTG Data Structures . . . . . . . . . . 551--557
                 Nan C. Shu and   
           Barron C. Housel and   
                 Vincent Y. Lum   CONVERT: A High Level Translation
                                  Definition Language for Data Conversion  557--567
           John Miles Smith and   
          Philip Yen-Tang Chang   Optimizing the Performance of a
                                  Relational Algebra Data Base Interface   568--579
             M. M. Astrahan and   
               D. D. Chamberlin   Implementation of a Structured English
                                  Query Language . . . . . . . . . . . . . 580--588
                  Fanica Gavril   Merging with Parallel Processors . . . . 588--591
                  M. Reiser and   
                   H. Kobayashi   Horner's Rule for the Evaluation of
                                  General Closed Queueing Networks . . . . 592--593

Communications of the ACM
Volume 18,  Number 11, November, 1975

                  G. Salton and   
                    A. Wong and   
                     C. S. Yang   A Vector Space Model for Automatic
                                  Indexing . . . . . . . . . . . . . . . . 613--620
           Raymond F. Boyce and   
       Donald D. Chamberlin and   
         W. Frank King, III and   
              Michael M. Hammer   Specifying Queries as Relational
                                  Expressions: The Square Data Sublanguage 621--628
           Henry F. Ledgard and   
               Michael Marcotty   A genealogy of control structures  . . . 629--639
            Susan L. Graham and   
               Steven P. Rhodes   Practical Syntactic Error Recovery . . . 639--650 (or 639--649??)
            James R. Bitner and   
             Edward M. Reingold   Backtrack Programming Techniques . . . . 651--656
            Lawrence T. Kou and   
                     C. K. Wong   A Note on the Set Basis Problem Related
                                  to the Compaction of Character Sets  . . 656--657

Communications of the ACM
Volume 18,  Number 12, December, 1975

                     Peter Naur   Programming Languages, Natural
                                  Languages, and Mathematics . . . . . . . 676--683
             John B. Goodenough   Exception Handling: Issues and a
                                  Proposed Notation  . . . . . . . . . . . 683--696
             Mehdi Jazayeri and   
           William F. Ogden and   
              William C. Rounds   The Intrinsically Exponential Complexity
                                  of the Circularity Problem for Attribute
                                  Grammars . . . . . . . . . . . . . . . . 697--706
         Harry B. Hunt, III and   
        Thomas G. Szymanski and   
              Jeffrey D. Ullman   On the Complexity of LR(k) Testing . . . 707--716
            Susan L. Graham and   
                    Mark Wegman   A fast and usually linear algorithm for
                                  global flow analysis . . . . . . . . . . 716--716
              Richard J. Lipton   Reduction: A Method of Proving
                                  Properties of Parallel Programs  . . . . 717--721
                 J. T. Schwartz   Automatic Data Structure Choice in a
                                  Language of Very High Level  . . . . . . 722--728

Communications of the ACM
Volume 19,  Number 1, January, 1976

          Leonard Kleinrock and   
          William E. Naylor and   
               Holger Opderbeck   A Study of Line Overhead in the ARPANET  3--13
                Neil C. Wilhelm   An Anomaly in Disk Scheduling: A
                                  Comparison of FCFS and SSTF Seek
                                  Scheduling Using an Empirical Model for
                                  Disk Accesses  . . . . . . . . . . . . . 13--18 (or 13--17??)
                Carson E. Agnew   On Quadratic Adaptive Routing Algorithms 18--22
              P. L. Karlton and   
               S. H. Fuller and   
              R. E. Scroggs and   
                  E. B. Kaehler   Performance of Height-Balanced Trees . . 23--28
                J. J. Florentin   Information Reference Coding . . . . . . 29--33
         Charles R. Litecky and   
                Gordon B. Davis   Study of Errors, Error-Proneness, and
                                  Error Diagnosis in Cobol . . . . . . . . 33--37

Communications of the ACM
Volume 19,  Number 2, February, 1976

                Donald E. Knuth   Errata: ``Ancient Babylonian
                                  algorithms''
             Gregor V. Bochmann   Semantic Evaluation from Left to Right   55--62
               Ronald L. Rivest   On Self-Organizing Sequential Search
                                  Heuristics . . . . . . . . . . . . . . . 63--67
                     F. M. Ives   Permutation Enumeration: Four New
                                  Permutation Algorithms . . . . . . . . . 68--72
               Alberto Martelli   Application of Heuristic Search Methods
                                  to Edge and Contour Detection  . . . . . 73--83
               Kenneth F. Siler   A Stochastic Evaluation Model for
                                  Database Organizations in Data Retrieval
                                  Systems  . . . . . . . . . . . . . . . . 84--95
                   Ronald Fagin   A Counterintuitive Example of Computer
                                  Paging . . . . . . . . . . . . . . . . . 96--97
                 Ehud Artzy and   
             James A. Hinds and   
                  Harry J. Saal   A Fast Division Technique for Constant
                                  Divisors . . . . . . . . . . . . . . . . 98--101

Communications of the ACM
Volume 19,  Number 3, March, 1976

               Allen Newell and   
               Herbert A. Simon   Computer Science as Empirical Inquiry:
                                  Symbols and Search . . . . . . . . . . . 113--126
              Jair M. Babad and   
               Mario M. Modiano   Joining Policies in a Multipriority
                                  Multiclass Batch Computer System . . . . 127--136
                F. E. Allen and   
                       J. Cocke   A Program Data Flow Analysis Procedure   137--147 (or 137--146??)
                 Naftaly Minski   Intentional Resolution of Privacy
                                  Protection in Database Systems . . . . . 148--159
                     M. Naftaly   Intentional resolution of privacy
                                  protection in database systems . . . . . 148--159

Communications of the ACM
Volume 19,  Number 4, April, 1976

                    O. R. Smoot   Development of an international system
                                  for legal protection of computer
                                  programs . . . . . . . . . . . . . . . . 171--174
               Bennet P. Lientz   A comparative evaluation of versions of
                                  BASIC  . . . . . . . . . . . . . . . . . 175--181
                     J. Raymond   LG: A language for analytic geometry . . 182--187
                   Ronald Fagin   Corrigendum: ``A Counterintuitive
                                  Example of Computer Paging'' . . . . . .  187
                Shmuel Katz and   
                    Zohar Manna   Logical Analysis of Programs . . . . . . 188--206

Communications of the ACM
Volume 19,  Number 5, May, 1976

             Dorothy E. Denning   A Lattice Model of Secure Information
                                  Flow . . . . . . . . . . . . . . . . . . 236--243
             Jonathan K. Millen   Security Kernel Validation in Practice   243--250
          Butler W. Lampson and   
              Howard E. Sturgis   Reflections on an Operating System
                                  Design . . . . . . . . . . . . . . . . . 251--265
            A. N. Habermann and   
              Lawrence Flon and   
                  Lee Cooprider   Modularization and Hierarchy in a Family
                                  of Operating Systems . . . . . . . . . . 266--272
                 John H. Howard   Proving Monitors . . . . . . . . . . . . 273--279 (or 273--278??)
               Susan Owicki and   
                    David Gries   Verifying Properties of Parallel
                                  Programs: An Axiomatic Approach  . . . . 279--285
           A. Wayne Madison and   
                 Alan P. Batson   Characteristics of Program Localities    285--294
           Barton G. Prieve and   
                    R. S. Fabry   VMIN --- an Optimal Variable-Space Page
                                  Replacement Algorithm  . . . . . . . . . 295--297
              Wesley W. Chu and   
               Holger Opderbeck   Analysis of the PFF Replacement
                                  Algorithm via a Semi-Markov Model  . . . 298--304

Communications of the ACM
Volume 19,  Number 6, June, 1976

              O. E. Taulbee and   
                    S. D. Conte   Production and employment of Ph.D.'s in
                                  computer science . . . . . . . . . . . . 311--313
        Dennis G. Severance and   
               Ricardo A. Duhne   A Practitioner's Guide to Addressing
                                  Algorithms . . . . . . . . . . . . . . . 314--326
             Forest Baskett and   
                 Alan Jay Smith   Interference in Multiprocessor Computer
                                  Systems with Interleaved Memory  . . . . 327--334
             Gideon Frieder and   
                  Harry J. Saal   Process for the Determination of
                                  Addresses in Variable Length Addressing  335--338
                  David S. Wise   Referencing Lists by an Edge . . . . . . 338--342
          Helmut Schumacher and   
              Kenneth C. Sevcik   The synthetic approach to decision table
                                  conversion . . . . . . . . . . . . . . . 343--351
               Douglas W. Clark   An Efficient List Moving Algorithm Using
                                  constant Workspace . . . . . . . . . . . 352--354 (or 353--354??)
             Guy L. Steele, Jr.   Corrigendum: ``Multiprocessing
                                  Compactifying Garbage Collection'' . . . 354--354
                  Gary D. Knott   A Numbering System for Permutations of
                                  Combinations . . . . . . . . . . . . . . 355--356

Communications of the ACM
Volume 19,  Number 7, July, 1976

                S. D. Conte and   
                 M. H. Halstead   Technology of Computer Center
                                  Management: a Proposed Course for
                                  Graduate Professional Programs in
                                  Computer Science or in Information
                                  Systems  . . . . . . . . . . . . . . . . 369--370
               Robert M. Keller   Formal Verification of Parallel Programs 371--384
                  James C. King   Symbolic Execution and Program Testing   385--394
         Robert M. Metcalfe and   
                 David R. Boggs   Ethernet: Distributed Packet Switching
                                  for Local Computer Networks  . . . . . . 395--404
            Cheng-Wen Cheng and   
                    Jonas Rabin   Synthesis of Decision Rules  . . . . . . 404--406
              George S. Fishman   Sampling from the Gamma-distribution on
                                  a computer . . . . . . . . . . . . . . . 407--409
                      Kurt Maly   Compressed Tries . . . . . . . . . . . . 409--415
                  Warren Burton   A buddy system variation for disk
                                  storage allocation . . . . . . . . . . . 416--417
                   G. H. Gonnet   Heaps applied to event driven mechanisms 417--418

Communications of the ACM
Volume 19,  Number 8, August, 1976

                John J. Donovan   Tools and Philosophy for Software
                                  Education  . . . . . . . . . . . . . . . 430--436
                  R. D. Tennent   The Denotational Semantics of
                                  Programming Languages  . . . . . . . . . 437--453
                 James H. Clark   Designing Surfaces in 3-D  . . . . . . . 454--460
        Michael A. Harrison and   
            Walter L. Ruzzo and   
              Jeffrey D. Ullman   Protection in Operating Systems  . . . . 461--471
               D. S. Hirschberg   An Insertion Technique for One-Sided
                                  Height-Balanced Trees  . . . . . . . . . 471--473

Communications of the ACM
Volume 19,  Number 9, September, 1976

              Wesley W. Chu and   
               Holger Opderbeck   Corrigendum: ``Analysis of the PFF
                                  replacement algorithm via a semi-Markov
                                  model''
                   Ben Wegbreit   Corrigendum: ``Faster Retrieval from
                                  Context Trees''  . . . . . . . . . . . .   ??
               Philip L. Wadler   Analysis of an Algorithm for Real Time
                                  Garbage Collection . . . . . . . . . . . 491--500
                    Chee K. Yap   New Upper Bounds for Selection . . . . . 501--508
                Michael C. Loui   Weighted Derivation Trees  . . . . . . . 509--513
              Kenneth G. Walter   Recursion Analysis for Compiler
                                  Optimization . . . . . . . . . . . . . . 514--516
            James R. Bitner and   
             Gideon Ehrlich and   
             Edward M. Reingold   Efficient Generation of the Binary
                                  Reflected Gray Code and Its Applications 517--521
           L. Peter Deutsch and   
               Daniel G. Bobrow   An Efficient, Incremental, Automatic
                                  Garbage Collector  . . . . . . . . . . . 522--526
                   Ben Wegbreit   Faster Retrieval from Context Trees  . . 526--529

Communications of the ACM
Volume 19,  Number 10, October, 1976

             James F. Blinn and   
               Martin E. Newell   Texture and Reflection in Computer
                                  Generated Images . . . . . . . . . . . . 542--547
                 James H. Clark   Hierarchical Geometric Models for
                                  Visible Surface Algorithms . . . . . . . 547--554
                Joshua Z. Levin   A Parametric Algorithm for Drawing
                                  Pictures of Solid Objects Composed of
                                  Quadric Surfaces . . . . . . . . . . . . 555--563
                 N. Burtnyk and   
                        M. Wein   Interactive Skeleton Techniques for
                                  Enhancing Motion Dynamics in Key Frame
                                  Animation  . . . . . . . . . . . . . . . 564--569
                 James W. Frane   The BMD and BMDP Series of Statistical
                                  Computer Programs  . . . . . . . . . . . 570--576
              C. Duong-Kien and   
             H.-J. Hoffmann and   
                        D. Muth   An improvement to Martin's algorithm for
                                  computation of linear precedence
                                  functions  . . . . . . . . . . . . . . . 576--577
 Richard G. Montanelli, Jr. and   
               Sandra A. Mamrak   Status of Women and Minorities in
                                  Academic Computer Science  . . . . . . . 578--581

Communications of the ACM
Volume 19,  Number 11, November, 1976

                     D. T. Ross   Homilies for humble standards (computer
                                  applications)  . . . . . . . . . . . . . 595--600
           Henry F. Ledgard and   
                William C. Cave   Cobol Under Control  . . . . . . . . . . 601--608
           Thomas R. Wilcox and   
              Alan M. Davis and   
             Michael H. Tindall   Design and Implementation of a Table
                                  Driven, Interactive Diagnostic
                                  Programming System . . . . . . . . . . . 609--616
                    Frank Rubin   Experiments in Text File Compression . . 617--623 (or 617--622??)
              K. P. Eswaran and   
                 J. N. Gray and   
                R. A. Lorie and   
                  I. L. Traiger   The notions of consistency and predicate
                                  locks in a database system . . . . . . . 624--633
                K. Maruyama and   
                    S. E. Smith   Optimal Reorganization of Distributed
                                  Space Disk Files . . . . . . . . . . . . 634--642
              Richard G. Hamlet   High-Level Binding with Low-Level
                                  Linkers  . . . . . . . . . . . . . . . . 642--644

Communications of the ACM
Volume 19,  Number 12, December, 1976

                 Jean E. Sammet   Roster of Programming Languages for
                                  1974--75 . . . . . . . . . . . . . . . . 655--669
                 Bruce W. Arden   The Computer Science and Engineering
                                  Research Study (COSERS)  . . . . . . . . 670--673
       J. F. Nunamaker, Jr. and   
     Benn R. Konsynski, Jr. and   
                  Thomas Ho and   
                    Carl Singer   Computer-Aided Analysis and Design of
                                  Information Systems  . . . . . . . . . . 674--687
            George Stockman and   
               Laveen Kanal and   
                     M. C. Kyle   Structural Pattern Recognition of
                                  Carotid Pulse Waves Using a General
                                  Waveform Parsing System  . . . . . . . . 688--695

Communications of the ACM
Volume 20,  Number 1, January, 1977

               Allen van Gelder   Structured programming in COBOL: an
                                  approach for application programmers . . 2--12
         Richard H. Austing and   
            Bruce H. Barnes and   
                Gerald L. Engel   A Survey of the Literature in Computer
                                  Science Education Since Curriculum '68   13--21
                  Jair M. Babad   A Record and File Partitioning Model . . 22--31 (or 22--30??)
          Albert L. Zobrist and   
      Frederick R. Carlson, Jr.   Detection of Combined Occurrences  . . . 31--36 (or 31--35??)
               A. P. Batson and   
                 R. E. Brundage   Segment Sizes and Lifetimes in Algol 60
                                  Programs . . . . . . . . . . . . . . . . 36--44
                    David Gries   On Believing Programs to be Correct  . . 49--50

Communications of the ACM
Volume 20,  Number 2, February, 1977

               Mervin E. Muller   An Approach to Multidimensional Data
                                  Array Processing by Computer . . . . . . 63--77
           Douglas W. Clark and   
               C. Cordell Green   An Empirical Study of List Structure in
                                  LISP . . . . . . . . . . . . . . . . . . 78--87
            F. P. Preparata and   
                     S. J. Hong   Convex Hulls of Finite Sets of Points in
                                  Two and Three Dimensions . . . . . . . . 87--93
               M. C. Easton and   
                  B. T. Bennett   Transient-Free Working-Set Statistics    93--99
                 Jack Bresenham   A Linear Algorithm for Incremental
                                  Digital Display of Circular Arcs . . . . 100--106
        Thoddi C. T. Kotiah and   
             David I. Steinberg   Occurrences of Cycling and Other
                                  Phenomena Arising in a Class of Linear
                                  Programming Models . . . . . . . . . . . 107--112
                  Gary D. Knott   A Numbering System for Binary Trees  . . 113--115

Communications of the ACM
Volume 20,  Number 3, March, 1977

                 Philip Clapson   Improving the Access Time for Random
                                  Access Files . . . . . . . . . . . . . . 127--135
                   C. T. Yu and   
                      G. Salton   Effective Information Retrieval Using
                                  Term Accuracy  . . . . . . . . . . . . . 135--142
                    Amund Lunde   Empirical Evaluation of Some Features of
                                  Instruction Set Processor Architectures  143--153
                R. M. Brown and   
               J. C. Browne and   
                   K. M. Chandy   Memory Management and Response Time  . . 153--165
                  Warren Burton   Representation of Many-Sided Polygons
                                  and Polygonal Lines for Rapid Processing 166--171
            H. B. Hunt, III and   
            T. G. Szymanski and   
                   J. D. Ullman   Operations on Sparse Relations . . . . . 171--176
               Richard L. Nolan   Effects of Chargeout on User/Manager
                                  Attitudes  . . . . . . . . . . . . . . . 177--185
            Israel Borovits and   
                 Philip Ein-Dor   Cost/utilization: A measure of system
                                  performance  . . . . . . . . . . . . . . 185--191
                        C. Bays   A comparison of next-fit, first-fit, and
                                  best-fit . . . . . . . . . . . . . . . . 191--192
               Eberhard Bertsch   The storage requirement in precedence
                                  parsing  . . . . . . . . . . . . . . . . 192--196 (or 192--194??)

Communications of the ACM
Volume 20,  Number 4, April, 1977

       James H. Morris, Jr. and   
                   Ben Wegbreit   Subgoal Induction  . . . . . . . . . . . 209--222
         Steven L. Tanimoto and   
            Theodosios Pavlidis   Editing of Picture Segmentations Using
                                  Local Analysis of Graphs . . . . . . . . 223--229
            Nicholas V. Findler   Studies in Machine Cognition Using the
                                  Game of Poker  . . . . . . . . . . . . . 230--245
                K. Maruyama and   
                    S. E. Smith   Analysis of Design Alternatives for
                                  Virtual Memory Indexes . . . . . . . . . 245--254
        Henry C. Lucas, Jr. and   
                Jimmy A. Sutton   Stage Hypothesis and the S-Curve: Some
                                  Contradictory Evidence . . . . . . . . . 254--259
                      S. B. Yao   Approximating block accesses in database
                                  organizations  . . . . . . . . . . . . . 260--261
                C. R. Hollander   Remark on uniform insertion on
                                  structured data structures . . . . . . . 261--262
            S. K. Bandyopadhyay   Comment on weighted increment linear
                                  search for scatter tables  . . . . . . . 262--263
             C. D. Thompson and   
                     H. T. Kung   Sorting on a Mesh-Connected Parallel
                                  Computer . . . . . . . . . . . . . . . . 263--271
          Lawrence Robinson and   
                 Karl N. Levitt   Proof Techniques for Hierarchically
                                  Structured Programs  . . . . . . . . . . 271--283

Communications of the ACM
Volume 20,  Number 5, May, 1977

                 R. C. Holt and   
              D. B. Wortman and   
              D. T. Barnard and   
                    J. R. Cordy   SP/k: A System for Teaching Computer
                                  Programming  . . . . . . . . . . . . . . 301--309
              George S. Fishman   Achieving Specific Accuracy in
                                  Simulation Output Analysis . . . . . . . 310--315
           Howard L. Morgan and   
                   K. Dan Levin   Optimal Program and Data Locations in
                                  Computer Networks  . . . . . . . . . . . 315--322
                 J.-L. Baer and   
                      B. Schwab   A Comparison of Tree-Balancing
                                  Algorithms . . . . . . . . . . . . . . . 322--330
           Neil J. Stillman and   
                 P. Bruce Berra   A Comparison of Hardware and Software
                                  Associative Memories in the Context of
                                  Computer Graphics  . . . . . . . . . . . 331--339
                 Marvin Shapiro   Choice of Reference Points in Best-Match
                                  File Searching . . . . . . . . . . . . . 339--343
              Michael Z. Hanani   An Optimal Evaluation of Boolean
                                  Expressions in an Online Query System    344--347
                      Y. Milman   An Approach to Optimal Design of Storage
                                  Parameters in Databases  . . . . . . . . 347--350
              James W. Hunt and   
            Thomas G. Szymanski   A Fast Algorithm for Computing Longest
                                  Common Subsequences  . . . . . . . . . . 350--353

Communications of the ACM
Volume 20,  Number 6, June, 1977

           Orrin E. Taulbee and   
                    S. D. Conte   Production and Employment of Ph.D.'s in
                                  Computer Science --- 1976  . . . . . . . 370--372
            Ben Shneiderman and   
              Richard Mayer and   
                  Don McKay and   
                   Peter Heller   Experimental Investigations of the
                                  Utility of Detailed Flowcharts in
                                  Programming  . . . . . . . . . . . . . . 373--381
              H. F. Ledgard and   
                   R. W. Taylor   Two Views of Data Abstraction  . . . . . 382--384
             Moshe M. Zloof and   
               S. Peter de Jong   The System for Business Automation
                                  (SBA): Programming Language  . . . . . . 385--396
                 John V. Guttag   Abstract Data Types and the Development
                                  of Data Structures . . . . . . . . . . . 396--404
           John Miles Smith and   
              Diane C. P. Smith   Database Abstractions: Aggregation . . . 405--413
                David Gries and   
                  Narain Gehani   Some Ideas on Data Types in High-Level
                                  Languages  . . . . . . . . . . . . . . . 414--420
          James L. Peterson and   
             Theodore A. Norman   Buddy Systems  . . . . . . . . . . . . . 421--431
                   J. M. Robson   A Bounded Storage Algorithm for Copying
                                  Cyclic Structures  . . . . . . . . . . . 431--433
                     R. S. Bird   Notes on Recursion Elimination . . . . . 434--439
           Henry S. Warren, Jr.   Functions Realizable with Word-Parallel
                                  Logical and Two's-Complement Addition
                                  Instructions . . . . . . . . . . . . . . 439--441

Communications of the ACM
Volume 20,  Number 7, July, 1977

               Sandra A. Mamrak   Dynamic Response Time Prediction for
                                  Computer Networks  . . . . . . . . . . . 461--468
         Manfred Ruschitzka and   
                    R. S. Fabry   A Unifying Approach to Scheduling  . . . 469--477
          William D. Tajibnapis   A Correctness Proof of a Topology
                                  Information Maintenance Protocol for a
                                  Distributed Computer Network . . . . . . 477--485
             Paul G. Heckel and   
              Butler W. Lampson   A terminal-oriented communication system 486--494
    Ben Ross Schneider, Jr. and   
                  Reid M. Watts   SITAR: an Interactive Text Processing
                                  System for Small Computers . . . . . . . 495--499
               J. L. W. Kessels   Alternative to Event Queues for
                                  Synchronization in Monitors  . . . . . . 500--503
         Dorothy E. Denning and   
               Peter J. Denning   Certification of Programs for Secure
                                  Information Flow . . . . . . . . . . . . 504--513
               Jeffrey M. Barth   Shifting Garbage Collection Overhead to
                                  Compile Time . . . . . . . . . . . . . . 513--518
             E. A. Ashcroft and   
                    W. W. Wadge   Lucid, a Nonprocedural Language with
                                  Iteration  . . . . . . . . . . . . . . . 519--526
              J. Nevil Brownlee   An Algol-based implementation of SNOBOL
                                  4 patterns . . . . . . . . . . . . . . . 527--529

Communications of the ACM
Volume 20,  Number 8, August, 1977

         Charles M. Geschke and   
       James H. Morris, Jr. and   
         Edwin H. Satterthwaite   Early Experience with Mesa . . . . . . . 540--553
                  Mary Shaw and   
            William A. Wulf and   
                Ralph L. London   Abstraction and Verification in Alphard:
                                  Defining and Specifying Iteration and
                                  Generators . . . . . . . . . . . . . . . 553--564
             Barbara Liskov and   
                Alan Snyder and   
           Russell Atkinson and   
                Craig Schaffert   Abstraction Mechanisms in CLU  . . . . . 564--576
                  Niklaus Wirth   Toward a Discipline of Real-Time
                                  Programming  . . . . . . . . . . . . . . 577--583
                   J. D. Gannon   An experimental evaluation of data type
                                  conventions  . . . . . . . . . . . . . . 584--595
               W. R. Franta and   
                      Kurt Maly   An Efficient Data Structure for the
                                  Simulation Event Set . . . . . . . . . . 596--602
               Eugene L. Lawler   Comment on computing the $k$ shortest
                                  paths in a graph . . . . . . . . . . . . 603--604
                     N. Francez   Another advantage of keyword notation
                                  for parameter communication with
                                  subprograms  . . . . . . . . . . . . . . 604--605

Communications of the ACM
Volume 20,  Number 9, September, 1977

               Michael O. Rabin   Complexity of Computations . . . . . . . 625--633
                  Dana S. Scott   Logic and Programming Languages  . . . . 634--641
             Richard H. Austing   The GRE Advanced Test in Computer
                                  Science  . . . . . . . . . . . . . . . . 642--645
            Robert W. Scheifler   An Analysis of Inline Substitution for a
                                  Structured Programming Language  . . . . 647--654
               David K. Gifford   Hardware Estimation of a Process'
                                  Primary Memory Requirements  . . . . . . 655--663
               Harry G. Mairson   Some New Upper Bounds on the Generation
                                  of Prime Numbers . . . . . . . . . . . . 664--669
            Edward M. McCreight   Pagination of B*-Trees with
                                  Variable-Length Records  . . . . . . . . 670--674

Communications of the ACM
Volume 20,  Number 10, October, 1977

                   H. Fuchs and   
                Z. M. Kedem and   
                  S. P. Uselton   Optimal Surface Reconstruction from
                                  Planar Contours  . . . . . . . . . . . . 693--702
          Sheng-Chuan C. Wu and   
               John F. Abel and   
            Donald P. Greenberg   An Interactive Computer Graphics
                                  Approach to Surface Representation . . . 703--712
                 Barry K. Rosen   High-Level Data Flow Analysis  . . . . . 712--724
              C. Montangero and   
                  G. Pacini and   
                      F. Turini   Two-Level Control Structure for
                                  Nondeterministic Programming . . . . . . 725--730
                Wilf R. LaLonde   Regular Right Part Grammars and Their
                                  Parsers  . . . . . . . . . . . . . . . . 731--741
                   R. Devillers   Game Interpretation of the Deadlock
                                  Avoidance Problem  . . . . . . . . . . . 741--745
                   Evan L. Ivie   Programmer's Workbench --- a Machine for
                                  Software Development . . . . . . . . . . 746--753
                 Alan Jay Smith   Multiprocessor Memory Organization and
                                  Memory Interference  . . . . . . . . . . 754--761
            Robert S. Boyer and   
              J. Strother Moore   A Fast String Searching Algorithm  . . . 762--772

Communications of the ACM
Volume 20,  Number 11, November, 1977

                   J. A. N. Lee   Considerations for future programming
                                  language standards activities  . . . . . 788--794
             Rollins Turner and   
                  Bill Strecker   Use of the LRU Stack Depth Distribution
                                  for Simulation of Paging Behavior  . . . 795--798
               Franklin C. Crow   The Aliasing Problem in
                                  Computer-Generated Shaded Images . . . . 799--805
                 Leslie Lamport   Concurrent Reading and Writing . . . . . 806--811
                  John E. Shore   Anomalous Behavior of the Fifty-Percent
                                  Rule in Dynamic Memory Allocation  . . . 812--820
             G. C. Stockman and   
                 A. K. Agrawala   Equivalence of Hough curve detection to
                                  template matching  . . . . . . . . . . . 820--822
                       N. Wirth   What can we do about the unnecessary
                                  diversity of notation for syntactic
                                  definitions? . . . . . . . . . . . . . . 822--823
                      M. K. Roy   A note on reflection-free permutation
                                  enumeration  . . . . . . . . . . . . . . 823--823
                Zohar Manna and   
                     Adi Shamir   The Optimal Approach to Recursive
                                  Programs . . . . . . . . . . . . . . . . 824--831
             Michael Hammer and   
              W. Gerry Howe and   
         Vincent J. Kruskal and   
               Irving Wladawsky   Very High Level Programming Language for
                                  Data Processing Applications . . . . . . 832--840
                Renzo Sprugnoli   Perfect Hashing Functions: A Single
                                  Probe Retrieving Method for Static Sets  841--850
                 John Cocke and   
                    Ken Kennedy   An Algorithm for Reduction of Operator
                                  Strength . . . . . . . . . . . . . . . . 850--856
                     R. S. Bird   Improving Programs by the Introduction
                                  of Recursion . . . . . . . . . . . . . . 856--863
              Norman R. Nielsen   Dynamic Memory Allocation in Computer
                                  Simulation . . . . . . . . . . . . . . . 864--873
         Michael W. Blasgen and   
           Richard G. Casey and   
              Kapali P. Eswaran   An Encoding Method for Multifield
                                  Sorting and Indexing . . . . . . . . . . 874--878
              Enrique Grapa and   
              Geneva G. Belford   Some Theorems to Aid in Solving the File
                                  Allocation Problem . . . . . . . . . . . 878--882

Communications of the ACM
Volume 20,  Number 12, December, 1977

                A. A. Lopez and   
                 R. Raymond and   
                     R. Tardiff   A survey of computer science offerings
                                  in small liberal arts colleges . . . . . 902--906
               J. L. W. Kessels   A Conceptual Framework for a
                                  Nonprocedural Programming Language . . . 906--913
             J. Lawrence Carter   A Case Study of a New Code Generation
                                  Technique for Compilers  . . . . . . . . 914--920
                    David Gries   An Exercise in Proving Parallel Programs
                                  Correct  . . . . . . . . . . . . . . . . 921--930
                    Irene Grief   A language for formal problem
                                  specification  . . . . . . . . . . . . . 931--935
         Marshall D. Abrams and   
                 Siegfried Treu   A Methodology for Interactive Computer
                                  Service Measurement  . . . . . . . . . . 936--944
             J. N. Danziger and   
                   W. H. Dutton   Computers as an innovation in American
                                  local governments  . . . . . . . . . . . 945--956

Communications of the ACM
Volume 24,  Number 1, January, 1977

                  P. D. Summers   A Methodology for LISP Program
                                  Construction from Examples . . . . . . . 161--175
                S. H. Lavington   The Manchester Mark I and Atlas: a
                                  historical perspective . . . . . . . . . 4--12
               R. N. Ibbett and   
                    P. C. Capon   The development of the MU5 computer
                                  system . . . . . . . . . . . . . . . . . 13--24
            B. R. Borgerson and   
               M. L. Hanson and   
                  P. A. Hartley   Evolution of the Sperry Univac 1100
                                  Series: a History, Analysis, and
                                  Projection . . . . . . . . . . . . . . . 25--43
                 C. G. Bell and   
                   A. Kotok and   
             T. N. Hastings and   
                        R. Hill   The Evolution of the DECsystem 10  . . . 44--63
             Richard M. Russell   The CRAY-1 Computer System . . . . . . . 63--72
            Richard P. Case and   
                  Andris Padegs   Architecture of the IBM System/370 . . . 73--96

Communications of the ACM
Volume 21,  Number 2, February, 1978

               S. A. Mamrak and   
          R. G. Montanelli, Jr.   Computer science faculties: the current
                                  status of minorities and women . . . . . 115--119
               R. L. Rivest and   
                  A. Shamir and   
                     L. Adelman   A Method for Obtaining Digital
                                  Signatures and Public-Key Cryptosystems  120--126
            M. A. Auslander and   
                   H. R. Strong   Systematic Recursion Removal . . . . . . 127--134
                  L. T. Kou and   
           L. J. Stockmeyer and   
                     C. K. Wong   Covering Edges by Cliques with Regard to
                                  Keyword Conflicts and Intersection
                                  Graphs . . . . . . . . . . . . . . . . . 135--139
                Gerald Held and   
            Michael Stonebraker   B-Trees Re-Examined  . . . . . . . . . . 139--143
             William J. Stewart   A Comparison of Numerical Techniques in
                                  Markov Modeling  . . . . . . . . . . . . 144--152
            Gabor T. Herman and   
                Arnold Lent and   
                  Peter H. Lutz   Relaxation Methods for Image
                                  Reconstruction . . . . . . . . . . . . . 152--158
                Zohar Manna and   
              Richard Waldinger   Is `Sometime' Sometimes Better Than
                                  `Always'? (Intermittent Assertions in
                                  Proving Program Correctness) . . . . . . 159--172
         Bruce J. Schachter and   
               Azriel Rosenfeld   Some New Methods of Detecting Step Edges
                                  in Digital Pictures  . . . . . . . . . . 172--176

Communications of the ACM
Volume 21,  Number 3, March, 1978

               Michael O. Rabin   Corrigendum: ``Complexity of
                                  computations''
            Henry C. Lucas, Jr.   Use of an Interactive Information
                                  Storage and Retrieval System in Medical
                                  Research . . . . . . . . . . . . . . . . 197--205
          William H. Dutton and   
             Kenneth L. Kraemer   Management Utilization of Computers in
                                  American Local Governments . . . . . . . 206--218
                 R. E. Anderson   Value orientation of computer science
                                  students . . . . . . . . . . . . . . . . 219--225
                S. Rao Kosaraju   Insertions and Deletions in One-Sided
                                  Height-Balanced Trees  . . . . . . . . . 226--227
         Richard A. DeMillo and   
       Stanley C. Eisenstat and   
              Richard J. Lipton   Preserving Average Proximity in Arrays   228--231
             M. A. Franklin and   
            G. Scott Graham and   
                    R. K. Gupta   Anomalies with Variable Partition Paging
                                  Algorithms . . . . . . . . . . . . . . . 232--236
            Andrew S. Tanenbaum   Implications of Structured Programming
                                  for Machine Architecture . . . . . . . . 237--246

Communications of the ACM
Volume 21,  Number 4, April, 1978

                W. H. Payne and   
                 K. L. McMillen   Orderly Enumeration of Nonsingular
                                  Binary Matrices Applied to Text
                                  Encryption . . . . . . . . . . . . . . . 259--263
                    Paul Heckel   A Technique for Isolating Differences
                                  Between Files  . . . . . . . . . . . . . 264--268
                        Art Lew   Optimal Conversion of Extended-Entry
                                  Decision Tables with General Cost
                                  Criteria . . . . . . . . . . . . . . . . 269--279
            Henry G. Baker, Jr.   List Processing in Real Time on a Serial
                                  Computer . . . . . . . . . . . . . . . . 280--294
                Ralph C. Merkle   Secure Communications Over Insecure
                                  Channels . . . . . . . . . . . . . . . . 294--299
            Thomas G. Szymanski   Assembling Code for machines with
                                  Span-Dependent Instructions  . . . . . . 300--308
                 Jean Vuillemin   A Data Structure for Manipulating
                                  Priority Queues  . . . . . . . . . . . . 309--315
                    S. Even and   
                       M. Rodeh   Economical Encoding of Commas Between
                                  Strings  . . . . . . . . . . . . . . . . 315--317
                 R. C. H. Cheng   Generating beta variates with
                                  nonintegral shape parameters . . . . . . 317--322

Communications of the ACM
Volume 21,  Number 5, May, 1978

               Douglas W. Clark   A Fast Algorithm for Copying List
                                  Structures . . . . . . . . . . . . . . . 351--357
             Anita K. Jones and   
              Barbara H. Liskov   A Language Extension for Expressing
                                  Constraints on Data Access . . . . . . . 358--367
                 Matthew Geller   Test Data as an Aid in Proving Program
                                  Correctness  . . . . . . . . . . . . . . 368--375
                   James R. Low   Automatic Data Structure Selection: an
                                  Example and Overview . . . . . . . . . . 376--385
               Michael Karr and   
           David B. Loveman III   Incorporation of Units into Programming
                                  Languages  . . . . . . . . . . . . . . . 385--391
            David R. Hanson and   
              Ralph E. Griswold   The SL5 procedure mechanism  . . . . . . 392--400
       Frederick Hayes-Roth and   
                 John McDermott   An Interference Matching Technique for
                                  Inducing Abstractions  . . . . . . . . . 401--411
             J. M. Fleisher and   
                    R. R. Meyer   New Sufficient Optimality Conditions for
                                  Integer Programming and Their
                                  Application  . . . . . . . . . . . . . . 411--418
           Pandu R. Tadikamalla   Computer Generation of Gamma Random
                                  Variables  . . . . . . . . . . . . . . . 419--422
               Richard L. Sites   Optimal Shift Strategy for a
                                  Block-Transfer CCD Memory  . . . . . . . 423--425

Communications of the ACM
Volume 21,  Number 6, June, 1978

               S. H. Zweben and   
                 M. A. McDonald   An Optimal Method for Deletion in
                                  One-Sided Height-Balanced Trees  . . . . 441--445
          James R. Driscoll and   
                 Y. Edmund Lien   A Selective Traversal Algorithm for
                                  Binary Search Trees  . . . . . . . . . . 445--447
              Jacques Cohen and   
                 Martin S. Roth   Analyses of Deterministic Parsing
                                  Algorithms . . . . . . . . . . . . . . . 448--458
         M. Dennis Mickunas and   
                  John A. Modry   Automatic Error Recovery for LR Parsers  459--465
               B. P. Lientz and   
              E. B. Swanson and   
                 G. E. Tompkins   Characteristics of Application Software
                                  Maintenance  . . . . . . . . . . . . . . 466--471
                  Earl Chrysler   Some Basic Determinants of Computer
                                  Programming Productivity . . . . . . . . 472--483
                      Rob Kling   Automated Welfare Client-Tracking and
                                  Service Integration: the Political
                                  Economy of Computing . . . . . . . . . . 484--493
                 E. Gelenbe and   
                  D. Derochette   Performance of Rollback Recovery Systems
                                  Under Intermittent Failures  . . . . . . 493--499
                 Toby J. Teorey   General Equations for Idealized CPU-I/O
                                  Overlap Configurations . . . . . . . . . 500--507

Communications of the ACM
Volume 21,  Number 7, July, 1978

                 David L. Waltz   An English Language Query Answering
                                  System for a Large Relational Data Base  526--539
         Michael L. Fredman and   
                    Bruce Weide   On the complexity of computing the
                                  measure of $\bigcup[a_i,b_i]$  . . . . . 540--544
                Francis Y. Chin   An ${O}(n)$ Algorithm for Determining a
                                  Near-Optimal Computation Order of Matrix
                                  Chain Products . . . . . . . . . . . . . 544--549
              Yehoshua Perl and   
                  Alon Itai and   
                      Haim Avni   Interpolation Search --- A Log Log N
                                  Search . . . . . . . . . . . . . . . . . 550--553
       Constantine Halatsis and   
             George Philokyprou   Pseudochaining in Hash Tables  . . . . . 554--557
                 Leslie Lamport   Time, Clocks, and the Ordering of Events
                                  in a Distributed System  . . . . . . . . 558--565
        Henry Givens Baker, Jr.   Shallow Binding in Lisp 1.5  . . . . . . 565--569
                    Hanan Samet   Proving the Correctness of Heuristically
                                  Optimized Code . . . . . . . . . . . . . 570--582
              Robert E. Shostak   An Algorithm for Reasoning About
                                  Equality . . . . . . . . . . . . . . . . 583--585
            Rahul Chattergy and   
                   Udo W. Pooch   Analysis of the Availability of Computer
                                  Systems Using Computer-Aided Algebra . . 586--591
                Lawrence Snyder   B-Trees Re-examined  . . . . . . . . . . 594--594

Communications of the ACM
Volume 21,  Number 8, August, 1978

                    John Backus   Can Programming Be Liberated From the
                                  von Neumann Style? A Functional Style
                                  and its Algebra of Programs  . . . . . . 613--641
                       R. Kling   Value conflicts and social choice in
                                  electronic funds transfer system
                                  developments . . . . . . . . . . . . . . 642--657
               D. S. Hirschberg   Fast Parallel Sorting Algorithms . . . . 657--661
             F. Lockwood Morris   A Time- and Space-Efficient Garbage
                                  Compaction Algorithm . . . . . . . . . . 662--665
                 C. A. R. Hoare   Communicating Sequential Processes . . . 666--677
           Richard S. Brice and   
                   J. C. Browne   Feedback Coupled Resource Allocation
                                  Policies in the
                                  Multiprogramming-Multiprocessor Computer
                                  System . . . . . . . . . . . . . . . . . 678--686
          Peter Scheuermann and   
              C. Robert Carlson   Self-Assessment Procedure V: a
                                  self-assessment procedure dealing with
                                  database systems . . . . . . . . . . . . 687--693

Communications of the ACM
Volume 21,  Number 9, September, 1978

               R. A. Harris and   
                     J. D. Zund   An algorithm using symbolic techniques
                                  for the Bel-Petrov classification of
                                  gravitational fields . . . . . . . . . . 715--717
                H. D. Schwetman   Hybrid Simulation Models of Computer
                                  Systems  . . . . . . . . . . . . . . . . 718--723
               Jeffrey M. Barth   A Practical Interprocedural Data Flow
                                  Analysis Algorithm . . . . . . . . . . . 724--736
            Gerald J. Popek and   
                David A. Farber   Model for Verification of Data Security
                                  in Operating Systems . . . . . . . . . . 737--749
           Peter J. Denning and   
                Donald R. Slutz   Generalized Working Sets for Segment
                                  Reference Strings  . . . . . . . . . . . 750--759
              Glenford J. Myers   Controlled Experiment in Program Testing
                                  and Code Walkthroughs/Inspections  . . . 760--768
                Th. Ottmann and   
                  H. W. Six and   
                        D. Wood   Right Brother Trees  . . . . . . . . . . 769--776
                Ernst G. Ulrich   Event Manipulation for Discrete
                                  Simulations Requiring Large Numbers of
                                  Events . . . . . . . . . . . . . . . . . 777--785
                        K. Maly   A note on virtual memory indexes . . . . 786--787
                Stephen A. Ward   Real Time Plotting of Approximate
                                  Contour Maps . . . . . . . . . . . . . . 788--790
                   A. Tenenbaum   Simulations of dynamic sequential search
                                  algorithms . . . . . . . . . . . . . . . 790--791

Communications of the ACM
Volume 21,  Number 10, October, 1978

                  Walt Brainerd   Fortran 77 . . . . . . . . . . . . . . . 806--820
                 D. Towsley and   
               K. M. Chandy and   
                   J. C. Browne   Models for Parallel Processing Within
                                  Programs: Application to CPU:I/O and
                                  I/O:I/O Overlap  . . . . . . . . . . . . 821--831
                Ben Shneiderman   Jump Searching: A Fast Sequential Search
                                  Technique  . . . . . . . . . . . . . . . 831--834
              Shi-Kuo Chang and   
                   Yin-Wah Wong   Optimal Histogram Matching by Monotone
                                  Gray Level Transformation  . . . . . . . 835--840
                  Robert Morris   Counting Large Numbers of Events in
                                  Small Registers  . . . . . . . . . . . . 840--842
              Colin L. McMaster   An Analysis of Algorithms for the Dutch
                                  National Flag Problem  . . . . . . . . . 842--846
               Robert Sedgewick   Implementing Quicksort Programs  . . . . 847--857
                    Gordon Lyon   Packed Scatter Tables  . . . . . . . . . 857--865
          Malcolm C. Easton and   
                   Ronald Fagin   Cold-Start Vs. Warm-Start Miss Ratios    866--872
               W. R. Franta and   
                      Kurt Maly   A comparison of heaps and the TL
                                  structure for the simulation event set   873--875

Communications of the ACM
Volume 21,  Number 11, November, 1978

                Norman R. Lyons   Systems Design Education: a Gaming
                                  Approach . . . . . . . . . . . . . . . . 889--895
                  J. W. Wendorf   A Simply Extended and Modified Batch
                                  Environment Graphical System (Sembegs)   897--904
                   B. Kumar and   
                 E. S. Davidson   Performance Evaluation of Highly
                                  Concurrent Computers by Deterministic
                                  Simulation . . . . . . . . . . . . . . . 904--913
        Berthold K. P. Horn and   
               Brett L. Bachman   Using Synthetic Images to Register Real
                                  Images with Surface Models . . . . . . . 914--924
              P. R. Tadikamalla   Computer Generation of Gamma Random
                                  Variables --- II . . . . . . . . . . . . 925--928
                G. David Ripley   Simple Recovery-Only Procedure for
                                  Simple Precedence Parsers  . . . . . . . 928--930
             D. P. Friedman and   
                     D. S. Wise   A Note on Conditional Expressions  . . . 931--933
              Per Brinch Hansen   Distributed Processes: A Concurrent
                                  Programming Concept  . . . . . . . . . . 934--941
            Fabrizio Luccio and   
                    Linda Pagli   Power Trees  . . . . . . . . . . . . . . 941--947
                    B. A. Sheil   Median Split Trees: A Fast Lookup
                                  Technique for Frequently Occurring Keys  947--958
                 C. A. R. Hoare   Corrigendum: ``Communicating Sequential
                                  Processes''  . . . . . . . . . . . . . . 958--958
              Eugene C. Freuder   Synthesizing Constraint Expressions  . . 958--966
         Edsger W. Dijkstra and   
             Leslie Lamport and   
               A. J. Martin and   
             C. S. Scholten and   
              E. F. M. Steffens   On-the-Fly Garbage Collection: An
                                  Exercise in Cooperation  . . . . . . . . 966--975

Communications of the ACM
Volume 21,  Number 12, December, 1978

                    David Gries   Corrigendum: ``An exercise in proving
                                  parallel programs correct''
           Roger M. Needham and   
           Michael D. Schroeder   Using Encryption for Authentication in
                                  Large Networks of Computers  . . . . . . 993--999
                David Gries and   
                  Jayadev Misra   A Linear Sieve Algorithm for Finding
                                  Prime Numbers  . . . . . . . . . . . . . 999--1003
          James L. Peterson and   
            James R. Bitner and   
                 John H. Howard   The Selection of Optimal Tab Settings    1004--1007
          James C. Wetherbe and   
                 V. Thomas Dock   Strategic Planning Methodology for the
                                  Computing Effort in Higher Education: an
                                  Empirical Evaluation . . . . . . . . . . 1008--1015
                M. Ibramsha and   
                   V. Rajaraman   Detection of Logical Errors in Decision
                                  Table Programs . . . . . . . . . . . . . 1016--1025
           Alberto Martelli and   
                  Ugo Montanari   Optimizing Decision Trees Through
                                  Heuristically Guided Search  . . . . . . 1025--1039
             Yogen K. Dalal and   
             Robert M. Metcalfe   Reverse Path Forwarding of Broadcast
                                  Packets  . . . . . . . . . . . . . . . . 1040--1048
             John V. Guttag and   
             Ellis Horowitz and   
                David R. Musser   Abstract Data Types and Software
                                  Validation . . . . . . . . . . . . . . . 1048--1064
             Jay M. Spitzen and   
             Karl N. Levitt and   
              Lawrence Robinson   An Example of Hierarchical Design and
                                  Proof  . . . . . . . . . . . . . . . . . 1064--1075

Communications of the ACM
Volume 23,  Number 4, May, 1978

                  J. L. Bentley   Multidimensional Divide-and-Conquer  . . 214--228

Communications of the ACM
Volume 22,  Number 1, January, 1979

                  John W. Boyse   Interference Detection Among Solids and
                                  Surfaces . . . . . . . . . . . . . . . . 3--9
                 Kent W. Colton   The impact and use of computer
                                  technology by the police . . . . . . . . 10--20
     Gian Carlo Bongiovanni and   
                Fabrizio Luccio   Permutation of Data Blocks in a Bubble
                                  Memory . . . . . . . . . . . . . . . . . 21--25
           Charles H. Sauer and   
                 K. Mani Chandy   The Impact of Distributions and
                                  Disciplines on Multiple Processor
                                  Systems  . . . . . . . . . . . . . . . . 25--34
              J. P. Banatre and   
              J. P. Routeau and   
                    L. Trilling   An event-driven compiling technique  . . 34--42
               Jacques J. Arsac   Syntactic Source to Source Transforms
                                  and Program Manipulation . . . . . . . . 43--54

Communications of the ACM
Volume 22,  Number 2, February, 1979

              O. E. Taulbee and   
                    S. D. Conte   Production and employment of Ph.D.s in
                                  computer science --- 1977 and 1978 . . . 75--76
                  R. E. Fairley   Employment characteristics of doctoral
                                  level computer scientists  . . . . . . . 77--78
                 W. E. Gull and   
                  M. A. Jenkins   Recursive data structures in APL.  . . . 79--96
                   E. Morel and   
                    C. Renvoise   Global Optimization by Suppression of
                                  Partial Redundancies . . . . . . . . . . 96--103
             M. R. Anderson and   
                 M. G. Anderson   Comments on Perfect Hashing Functions: A
                                  Single Probe Retrieving Method for
                                  Static Sets  . . . . . . . . . . . . . . 104--105
          David R. Cheriton and   
         Michael A. Malcolm and   
          Lawrence S. Melen and   
                  Gary R. Sager   Thoth, a Portable Real-Time Operating
                                  System . . . . . . . . . . . . . . . . . 105--115
              David P. Reed and   
            Rajendra K. Kanodia   Synchronization with Eventcounts and
                                  Sequencers . . . . . . . . . . . . . . . 115--123
             Haim Mendelson and   
          Joseph S. Pliskin and   
                   Uri Yechiali   Optimal Storage Allocation for Serial
                                  Files  . . . . . . . . . . . . . . . . . 124--130

Communications of the ACM
Volume 22,  Number 3, March, 1979

         Richard H. Austing and   
            Bruce H. Barnes and   
          Della T. Bonnette and   
            Gerald L. Engel and   
                  Gordon Stokes   Curriculum '78: Recommendations for the
                                  Undergraduate Program in Computer
                                  Science --- A Report of the ACM
                                  Curriculum Committee on Computer Science 147--166
            Albert D. Edgar and   
                  Samuel C. Lee   FOCUS microcomputer number system  . . . 166--177
                   James Slagle   Experiments with Some Algorithms that
                                  Find Central Solutions for Pattern
                                  Classification . . . . . . . . . . . . . 178--183
        Amaryllis Deliyanni and   
             Robert A. Kowalski   Logic and Semantic Networks  . . . . . . 184--192
                  Dalia Motzkin   Use of Normal Multiplication Tables for
                                  Information Storage and Retrieval  . . . 193--207
                 C. L. McMaster   Corrigendum: ``An Analysis of Algorithms
                                  for the Dutch National Flag Problem''    207--207

Communications of the ACM
Volume 22,  Number 4, April, 1979

                 Arthur M. Lesk   Detection of Three-Dimensional Patterns
                                  of Atoms in Chemical Structures  . . . . 219--224
                 E. G. Cale and   
           L. L. Gremillion and   
                 J. L. McKenney   Price/Performance Patterns of U.S.
                                  Computer Systems . . . . . . . . . . . . 225--233
              Giacomo Bucci and   
             Donald N. Streeter   Methodology for the Design of
                                  Distributed Information Systems  . . . . 233--245
          Richard J. Hanson and   
             John A. Wisniewski   A Mathematical Programming Updating
                                  Method Using Modified Givens
                                  Transformations and Applied to LP
                                  Problems . . . . . . . . . . . . . . . . 245--251
                  Daniel Brelaz   New Methods to Color the Vertices of a
                                  Graph  . . . . . . . . . . . . . . . . . 251--256

Communications of the ACM
Volume 22,  Number 5, May, 1979

        Richard A. De Millo and   
          Richard J. Lipton and   
                 Alan J. Perlis   Social Processes and Proofs of Theorems
                                  and Programs . . . . . . . . . . . . . . 271--280
               Ernest Chang and   
               Rosemary Roberts   An Improved Algorithm for Decentralized
                                  Extrema-Finding in Circular
                                  Configurations of Processors . . . . . . 281--283
                 T. D. Sterling   Consumer Difficulties with Computerized
                                  Transactions: an Empirical Investigation 283--289
               John C. Reynolds   Reasoning About Arrays . . . . . . . . . 290--299
             Michael J. Manthey   Model for and Discussion of
                                  Multi-Interpreter Systems  . . . . . . . 299--309

Communications of the ACM
Volume 22,  Number 6, June, 1979

                    R. S. Lemos   An implementation of structured
                                  walk-throughs in teaching COBAL
                                  programming  . . . . . . . . . . . . . . 335--340
            S. N. Busenberg and   
                      W. C. Tam   An academic program providing realistic
                                  training in software engineering . . . . 341--345
                   Steven Alter   Model for Automating File and Program
                                  Design in Business Application Systems   345--353
              Jerome A. Feldman   High Level Programming for Distributed
                                  Computing  . . . . . . . . . . . . . . . 353--368
               Robert Sedgewick   Corrigendum: ``Implementing Quicksort
                                  Programs'' . . . . . . . . . . . . . . . 368--368
                 R. Shapira and   
                     H. Freeman   The Cyclic Order Property of Vertices as
                                  an Aid in Scene Analysis . . . . . . . . 368--375

Communications of the ACM
Volume 22,  Number 7, July, 1979

                    T. Winograd   Beyond Programming Languages . . . . . . 391--401
                F. P. Preparata   An Optimal Real-Time Algorithm for
                                  Planar Convex Hulls  . . . . . . . . . . 402--405
         Patrick C. Fischer and   
              Robert L. Probert   Storage Reorganization Techniques for
                                  Matrix Computation in a Paging
                                  Environment  . . . . . . . . . . . . . . 405--415
                 J. H. Hine and   
                 I. Mitrani and   
                        S. Tsur   The Control of Response Times in
                                  Multi-Class Systems by Memory Allocation 415--424
             Robert A. Kowalski   Algorithm = Logic + Control  . . . . . . 424--436

Communications of the ACM
Volume 22,  Number 8, August, 1979

                 J. W. Wong and   
                G. Scott Graham   Self-Assessment Procedure VI: a
                                  self-assessment procedure dealing with
                                  queueing network models of computer
                                  systems  . . . . . . . . . . . . . . . . 449--454
                    R. W. Floyd   The paradigms of programming . . . . . . 455--460
           D. S. Hirschberg and   
              A. K. Chandra and   
                  D. V. Sarwate   Computing Connected Components on
                                  Parallel Computers . . . . . . . . . . . 461--464
          Nachum Dershowitz and   
                    Zohar Manna   Proving Termination with Multiset
                                  Orderings  . . . . . . . . . . . . . . . 465--476
             Dorothy E. Denning   Secure Personal Computing in an Insecure
                                  Network  . . . . . . . . . . . . . . . . 476--482
                   L. S. Nelson   Further remark on stably updating mean
                                  and standard deviation estimates . . . . 483--483

Communications of the ACM
Volume 22,  Number 9, September, 1979

          Jerome A. Feldman and   
          William R. Sutherland   Rejuvenating Experimental Computer
                                  Science --- A Report to the National
                                  Science Foundation and Others  . . . . . 497--502
   Daniel D. McCracken, CCP and   
           Peter J. Denning and   
               David H. Brandin   Addendum: An ACM Executive Committee
                                  Position on the Crisis in Experimental
                                  Computer Science . . . . . . . . . . . . 503--504
                      Zvi Galil   On Improving the Worse Case Running Time
                                  of the Boyer-Moore String Matching
                                  Algorithm  . . . . . . . . . . . . . . . 505--508
           Kari-Jouko Raiha and   
               Stuart H. Zweben   An Optimal Insertion Algorithm for
                                  One-Sided Height-Balanced Binary Search
                                  Trees  . . . . . . . . . . . . . . . . . 508--512
              Wilfred J. Hansen   Progressive acyclic digraphs --- a tool
                                  for database integrity . . . . . . . . . 513--518
                    G. Nagy and   
                    S. G. Wagle   Approximation of Polygonal Maps by
                                  Cellular Maps  . . . . . . . . . . . . . 518--525
                 T. F. Chan and   
                    J. G. Lewis   Computing standard deviations: accuracy  526--531
                  D. H. D. West   Updating mean and variance estimates: an
                                  improved method  . . . . . . . . . . . . 532--535

Communications of the ACM
Volume 22,  Number 10, October, 1979

                    P. D. Laird   Comment on: ``An optimal evaluation of
                                  Boolean expressions in an online query
                                  system'' [Comm. ACM, 20, 1977, no. 5,
                                  344--347, MR 55 #9627] by M. Z. Hanani   549--550
                 Ehud Gudes and   
                Anthony Hoffman   A note on: ``An optimal evaluation of
                                  Boolean expressions in an online query
                                  system'' [Comm. ACM, 20, 1977, no. 5,
                                  344--347, MR 55 #9627] by M. Z. Hanani   550--553
             M. R. Anderson and   
                 M. G. Anderson   Corrigendum: ``Comments on Perfect
                                  Hashing Functions: A Single Probe
                                  Retrieving Method for Static Sets''  . .  553
                 Leslie Lamport   On the Proof of Correctness of a
                                  Calendar Program . . . . . . . . . . . . 554--556
                     Paul Klint   Line Numbers Made Cheap  . . . . . . . . 557--559
         Tomas Lozano-Perez and   
              Michael A. Wesley   An Algorithm for Planning Collision-Free
                                  Paths Among Polyhedral Obstacles . . . . 560--570
                   F. L. Morris   On a Comparison of Garbage Collection
                                  Techniques . . . . . . . . . . . . . . .  571

Communications of the ACM
Volume 22,  Number 11, November, 1979

                    R. E. Mayer   A psychology of learning BASIC . . . . . 589--593
                  R. Morris and   
                    K. Thompson   Password Security --- A Case History . . 594--597
               Shmuel Peleg and   
               Azriel Rosenfeld   Breaking Substitution Ciphers Using a
                                  Relaxation Algorithm . . . . . . . . . . 598--605
        Robert Endre Tarjan and   
            Andrew Chi Chih Yao   Storing a Sparse Table . . . . . . . . . 606--611
                     Adi Shamir   How to Share a Secret  . . . . . . . . . 612--613

Communications of the ACM
Volume 22,  Number 12, December, 1979

                    A. H. Lipis   Costs of the current US payments system  644--647
                     R. H. Long   Public protection and education with EFT 648--654
                   D. B. Parker   Vulnerabilities of EFTs to intentionally
                                  caused losses  . . . . . . . . . . . . . 654--660
              K. L. Kraemer and   
                      K. Colton   Policy, values, and EFT research:
                                  anatomy of a research agenda . . . . . . 660--671
                J. F. Shoch and   
                     J. A. Hupp   Measured Performance of an ETHERNET
                                  Local Network  . . . . . . . . . . . . . 711--721

Communications of the ACM
Volume 26,  Number 9, September, 1979

                    Hanan Samet   A quadtree medial axis transform . . . . 680--693

Communications of the ACM
Volume 33,  Number 6, June, 1990

               Peter K. Pearson   Fast Hashing of Variable-Length Text
                                  Strings  . . . . . . . . . . . . . . . . 677--680

Communications of the ACM
Volume 33,  Number 8, August, 1990

               Daniel M. Sunday   A Very Fast Substring Search Algorithm   132--142

Communications of the ACM
Volume 34,  Number 11, November, 1991

                     I. Dittmer   Note on Fast Hashing of Variable Length
                                  Text Strings . . . . . . . . . . . . . .  118
                  Jacques Savoy   Note on Fast Hashing of Variable Length
                                  Text Strings . . . . . . . . . . . . . . 118--119
                  James Litsios   Note on Fast Hashing of Variable Length
                                  Text Strings . . . . . . . . . . . . . . 118--120
                  Peter Pearson   Note on Fast Hashing of Variable Length
                                  Text Strings . . . . . . . . . . . . . .  120

Computing Surveys
Volume 6,  Number 4, December, 1974

                Donald E. Knuth   Structured Programming with go to
                                  Statements . . . . . . . . . . . . . . . 261--301

Journal of the ACM
Volume 23,  Number 1, January, 1976

            Susan L. Graham and   
                    Mark Wegman   A Fast and Usually Linear Algorithm for
                                  Global Flow Analysis . . . . . . . . . . 172--202

Management Science
Volume 19,  Number , , 1972

                    R. J. Brown   Chromatic scheduling and the chromatic
                                  number problem . . . . . . . . . . . . . 451--463

SIAM Journal of Computing
Volume 6,  Number 2, June, 1977

            Donald E. Knuth and   
               J. H. Morris and   
                    V. R. Pratt   Fast pattern matching in strings . . . . 323--350

Software --- Practice and Experience
Volume 12,  Number 1, January, 1982

                A. L. Tharp and   
                      K.-C. Tai   The practicality of text signatures for
                                  accelerating string searching  . . . . . 35--44

ACM Transactions on Mathematical Software
Volume 1,  Number 3, September, 1975

                  Ove Skovgaard   Remark on ``Algorithm 236: Bessel
                                  Functions of the First Kind [S17]''  . . 282--284
                  Jayadev Misra   Remark on ``Algorithm 246: Graycode
                                  [Z]''  . . . . . . . . . . . . . . . . . 285--285

ACM Transactions on Mathematical Software
Volume 1,  Number 9, September, 1975

               Robert Feinstein   Remark on ``Algorithm 483: Masked
                                  Three-Dimensional Plot Program with
                                  Rotations [J6]'' . . . . . . . . . . . . 285--285

ACM Transactions on Mathematical Software
Volume 2,  Number 1, March, 1976

                  D. M. Boulton   Remark on ``Algorithm 434: Exact
                                  Probabilities for $R\times{C}$
                                  Contingency Tables [G2]''  . . . . . . . 108--108
                 Lucian D. Duta   Remark on ``Algorithm 475: Visible
                                  Surface Plotting Program [J6]''  . . . . 109--110
                G. M. White and   
                S. Goudreau and   
                   J. L. Legros   Remark on ``Algorithm 479: A Minimal
                                  Spanning Tree Clustering Method [Z]''    110--111
                    J. Pomeranz   Remark on ``Algorithm 487: Exact
                                  Cumulative Distribution of the
                                  Kolmogorov-Smirnov Statistic for Small
                                  Samples [S14]''  . . . . . . . . . . . . 111--111
                  Robert Morris   Remark on ``Algorithm 490: The
                                  Dilogarithm Function of a Real Argument
                                  [S22]''  . . . . . . . . . . . . . . . . 112--112

ACM Transactions on Mathematical Software
Volume 2,  Number 2, June, 1976

            Malcolm C. Pike and   
                  Jennie SooHoo   Remark on ``Algorithm 179: Incomplete
                                  Beta Ratio [S14]'' . . . . . . . . . . . 207--208
            Michael R. Anderson   Remark on ``Algorithm 433: Interpolation
                                  and Smooth Curve Fitting Based on Local
                                  Procedures [E2]''  . . . . . . . . . . . 208--208

ACM Transactions on Mathematical Software
Volume 2,  Number 3, September, 1976

                 Alan M. Davies   Remark on ``Algorithm 450: Rosenbrock
                                  Function Minimization [E4]'' . . . . . . 300--301
                 Theodore Brown   Remark on ``Algorithm 489: The Algorithm
                                  SELECT --- for Finding the $i$th
                                  Smallest of $n$ Elements [M1]''  . . . . 301--304

ACM Transactions on Mathematical Software
Volume 2,  Number 4, December, 1976

                      M. R. Ito   Remark on ``Algorithm 284: Interchange
                                  of Two Blocks of Data [K2]'' . . . . . . 392--393
                Mohamed el Lozy   Remark on ``Algorithm 299: Chi-Squared
                                  Integral [S15]'' . . . . . . . . . . . . 393--395
             Henk Koppelaar and   
                 Peter Molenaar   Remark on ``Algorithm 486: Numerical
                                  Inversion of Laplace Transform [D5]''    395--396

ACM Transactions on Mathematical Software
Volume 3,  Number 1, March, 1977

               Esko G. Cate and   
                 David W. Twigg   Algorithm 513: Analysis of In-Situ
                                  Transposition [F1] . . . . . . . . . . . 104--110
            Fran\ccoise Veillon   Remark on ``Algorithm 486: Numerical
                                  Inversion of Laplace Transform'' . . . . 111--111

ACM Transactions on Mathematical Software
Volume 3,  Number 2, June, 1977

                J. K. M. Jansen   Remark on ``Algorithm 259: Legendre
                                  Functions for Arguments Larger than
                                  One''  . . . . . . . . . . . . . . . . . 204--250

ACM Transactions on Mathematical Software
Volume 3,  Number 3, September, 1977

                   Paolo Sipala   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package (Part I) [F4]'' . . . . . 303--303
                  Dennis Tenney   Remark on ``Algorithm 219: Topological
                                  Ordering for PERT Networks'' . . . . . . 303--303

ACM Transactions on Mathematical Software
Volume 4,  Number 1, March, 1978

                  Ove Skovgaard   Remark on ``Algorithm 149: Complete
                                  Elliptic Integral [S21]''  . . . . . . . 95--95

ACM Transactions on Mathematical Software
Volume 4,  Number 3, September, 1978

                John P. Coleman   Remark on ``Algorithm 49: Spherical
                                  Neumann Function'' . . . . . . . . . . . 295--295
              Fred G. Gustavson   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package (Part I) [F4]'' . . . . . 295--295
              Andrew Y. Schoene   Remark on ``Algorithm 435: Modified
                                  Incomplete Gamma Function [S14]''  . . . 296--304

ACM Transactions on Mathematical Software
Volume 5,  Number 2, June, 1979

                Mohamed el Lozy   Remark on ``Algorithm 395: Student's
                                  $t$-Distribution'' and Remark on
                                  ``Algorithm 396: Student's Quantiles
                                  [S14]''  . . . . . . . . . . . . . . . . 238--239
                   K. O. Geddes   Remark on ``Algorithm 424:
                                  Clenshaw-Curtis Quadrature [O1]''  . . . 240--240
                 M. R. Anderson   Remark on ``Algorithm 474: Bivariate
                                  Interpolation and Smooth Surface Fitting
                                  Based on Local Procedures''  . . . . . . 241--241

ACM Transactions on Mathematical Software
Volume 5,  Number 4, December, 1979

             Burton L. Leathers   Remark on ``Algorithm 513: Analysis of
                                  In-Situ Transposition [F1]'' and Remark
                                  on ``Algorithm 467: Matrix Transposition
                                  in Place'' . . . . . . . . . . . . . . . 520--520
       A. C. M. van Swieten and   
            J. Th. M. de Hosson   Remark on ``Algorithm 475: Visible
                                  Surface Plotting Program'' . . . . . . . 521--523

ACM Transactions on Mathematical Software
Volume 6,  Number 3, September, 1980

                   U. Harms and   
             H. Kollakowski and   
                      G. Moller   Remark on ``Algorithm 408: A Sparse
                                  Matrix Package (Part 1) [F4]'' . . . . . 456--457

ACM Transactions on Mathematical Software
Volume 7,  Number 2, June, 1981

                     G. W. Hill   Remark on ``Algorithm 395: Student's
                                  $t$-Distribution'' . . . . . . . . . . . 247--249
                     G. W. Hill   Remark on ``Algorithm 396: Student's
                                  $t$-Quantiles''  . . . . . . . . . . . . 250--251
                 I. D. Hill and   
                     M. C. Pike   Remark on ``Algorithm 299: Chi-Squared
                                  Integral'' . . . . . . . . . . . . . . . 185--185

ACM Transactions on Mathematical Software
Volume 11,  Number 4, December, 1985

                       M. C. Er   Remark on ``Algorithm 246: Graycode
                                  [Z]''  . . . . . . . . . . . . . . . . . 441--443