default search action
Communications of the ACM (CACM), Volume 33, 1990
Volume 33, Number 1, January 1990
- Forouzan Golshani, Thaddeus Regulinski:
On the Synergism of Computers and Communication (Introduction to the Special Section). Commun. ACM 33(1): 6-10 (1990) - Michael W. Marcellin, Thomas R. Fischer:
Generalized Predictive TCQ of Speech. 11-19 - S. S. Gaitonde, Doug Jacobson, Arthur V. Pohm:
Bounding Delay on a Multifarious Token Ring Network. 20-28 - Philip K. McKinley, Jane W.-S. Liu:
Multicast Tree Construction in Bus-Based Networks. 29-42 - Krishnan Padmanabhan:
Cube Structures for Multiprocessors. 43-52 - Bjørn N. Freeman-Benson, John Maloney, Alan Borning:
An Incremental Constraint Solver. 54-63
- Chin-Wan Chung:
DATAPLEX: An Access to Heterogeneous Distributed Databases. 70-80 - Jason Gait:
Phoenix: A Safe In-Memory File System. 81-86 - David G. Carta:
Two Fast Implementations of the "Minimal Standard" Random Number Generator. 87-88
Volume 33, Number 2, February 1990
- Pamela Samuelson:
Interface Specifications, Compatibility, and Intellectual Property Law. Commun. ACM 33(2): 111-114 (1990)
- Larry Press:
Wings for the Mind: The 1989 SIGCHI National Conference. Commun. ACM 33(2): 115-119 (1990)
- Ellen D. Hoadley:
Investigating the Effects of Color. 120-125 - Dinesh Batra, Jeffrey A. Hoffer, Robert P. Bostrom:
Comparing Representations with Relational and EER Models. 126-139 - David K. Gifford:
Polychannel Systems for Mass Digital Communications. 141-151 - Anders Kierulf, Ken Chen, Jürg Nievergelt:
Smart Game Board and Go Explorer: A Study in Software and Knowledge Engineering. 152-166 - Rick Joyce, Gopal Gupta:
Identity Authentication Based on Keystroke Latencies. 168-176 - Bezalel Gavish, Olivia R. Liu Sheng:
Dynamic File Migration in Distributed Computer Systems. 177-189
- John Rosenberg, Akkihebbal L. Ananda, B. Srinivasan:
Self-Assessment Procedure XX: Operating Systems. 190-201
- Kuldeep Kumar:
Post Implementation Evaluation of Computer-Based Information Systems: Current Practices. 203-212 - Matthew A. Tillman, David Chi-Chung Yen:
SNA and OSI: Three Strategies for Interconnection. 214-224 - Johnny Martin, Wei-Tek Tsai:
N-Fold Inspection: A Requirements Analysis Technique. 225-232
Volume 33, Number 3, March 1990
- Larry Press:
SIGGRAPH '89 - Tomorrows's PC Today. Commun. ACM 33(3): 274-279 (1990)
- Scaling Up: A Research Agenda for Software Engineering. 281-293
- Jakob Nielsen:
The Art of Navigating through Hypertext. 296-310 - David A. Carlson, Sudha Ram:
HyperIntelligence: The Next Frontier. 311-321 - Vasant Dhar, Nicky Ranganathan:
Integer Programming vs. Expert Systems: An Experimental Comparison. 323-336
- Rolf Molich, Jakob Nielsen:
Improving a Human-Computer Dialogue. 338-348 - Farahangiz Arefi, Charles E. Hughes, David A. Workman:
Automatically Generating Visual Syntax-Directed Editors. 349-360
- Christopher J. Van Wyk:
Literate Programming: An Assessment. 361
Volume 33, Number 4, April 1990
- Maurice V. Wilkes:
Computer Security in the Business World. 399-401
- Karen A. Frenkel:
The European Community and Information Technology. 404-410 - Gerrit Jeelof:
Europe 1992: Fraternity or Fortress? 412-416 - Roger A. Chiarodo, Judee M. Mussehl:
The Semiconductor Market in the European Community. 417-423 - Eiichi Ono:
Japan's View of EC '92. 424-425 - EC Commission Communication on Establishing an Information Services Market. 426-432
- Council Decision of July 26, 1988. 434-438
- Kurt Geihs, Ulf Hollberg:
Retrospective on DACNOS. 439-448 - Daniel S. Hirschberg, Debra A. Lelewer:
Efficient Decoding of Prefix Codes. 449-459
Volume 33, Number 5, May 1990
- Pamela Samuelson, Robert J. Glushko:
Survey on the Look and Feel Lawsuits. Commun. ACM 33(5): 483-487 (1990)
- Edgar H. Sibley:
Alphabets & Languages (Introduction to the Special Section). 488-490 - Jinan Qiao, Yizheng Qiao, Sanzheng Qiao:
Six-Digit Coding Method. 491-494 - Murat Tayli, Abdulah I. Al-Salamah:
Building Bilingual Microcomputer Systems. 495-504 - Paul W. Oman, Curtis R. Cook:
Typographic Style is More than Cosmetic. 506-520 - Subramanian Raman, Narayanan Alwar:
An AI-Based Approach to Machine Translation in Indian Languages. 521-527
- Kuldeep Kumar, Niels Bjørn-Andersen:
A Cross-Cultural Comparison of IS Designer Values. 528-538 - Alan H. Karp, Horace P. Flatt:
Measuring Parallel Processor Performance. 539-543
- Jason L. Frand, Julia A. Britt:
Sixth Annual UCLA Survey of Business School Computer Usage. 544-562 - Brian A. Rudolph:
Self-Assessment Procedure XXI: A Self-Assessment Procedure on Concurrency. 563-576
Volume 33, Number 6, June 1990
- Maurice V. Wilkes:
Networks, Email, and FAX. Commun. ACM 33(6): 631-633 (1990)
- David Lorge Parnas, A. John van Schouwen, Shu Po Kwan:
Evaluation of Safety-Critical Software. 636-648 - Renate Rohde, Jim Haskett:
Disaster Recovery Planning For Academic Computing Centers. 652-657 - E. Burton Swanson, Cynthia Mathis Beath:
Departmentalization in Software Development and Maintenance. 658-667 - William W. Pugh:
Skip Lists: A Probabilistic Alternative to Balanced Trees. 668-676
- Peter K. Pearson:
Fast Hashing of Variable-Length Text Strings. 677-680 - Vijay Kumar:
Concurrent Operations on Extendible Hashing and its Performance. 681-694
Volume 33, Number 7, July 1990
- Larry Press:
Simple Complexity and COMDEX. 21-26
- Diane Crawford:
Budget FY 1991 - The Numbers Tell the Story. 27-29
- Thomas E. Linehan:
Digital Image - Digital Cinema. 30-37 - Karen A. Frenkel:
The Politics of Standards and the EC. 41-51 - Jacques Cohen:
Constraint Logic Programming Languages. 52-68 - Alain Colmerauer:
An Introduction to Prolog III. 69-90 - Monty Newborn:
The 20th Annual ACM North American Computer Chess Championship. 93-104
- S. Jerrold Kaplan, Mitchell Kapor, Edward J. Belove, Richard A. Landsman, Todd D. Drake:
Agenda: A Personal Information Manager. 105-116 - David Chenho Kung:
Object Subclass Hierarchy in SQL: A Simple Approach. 117-127
- Peter G. Neumann:
Some Reflections on a Telephone Switching Problem. 154
Volume 33, Number 8, August 1990
- Maurice V. Wilkes:
The Bandwidth Famine. 19-21
- Pamela Samuelson:
Should Program Algorithms be Patented? 23-27
- Douglas B. Lenat, Ramanathan V. Guha, Karen Pittman, Dexter Pratt, Mary Shepherd:
CYC: Toward Programs With Common Sense. 30-49 - Jim Barnett, Kevin Knight, Inderjeet Mani, Elaine Rich:
Knowledge and Natural Language Processing. 50-71 - George M. White:
Natural Language Understanding and Speech Recognition. 72-82
- Karen A. Frenkel:
Highlights from The Second Annual Computer Bowl. 84-95 - Mark D. Hill, James R. Larus:
Cache Considerations for Multiprocessor Programmers. 97-102 - Leslie G. Valiant:
A Bridging Model for Parallel Computation. 103-111 - Theodor D. Sterling, James J. Weinkam:
Sharing Scientific Data. 112-119
- Mark Lee Gillenson:
Physical Design Equivalencies in Database Conversion. 120-131 - Daniel Sunday:
A Very Fast Substring Search Algorithm. 132-142
- Peter G. Neumann:
Insecurity about Security? 170
Volume 33, Number 9, September 1990
- Diane Crawford:
EC Directives Aim for Market Harmony. 21-24
- Larry Press:
Compuvision or Teleputer? 29-36
- John D. McGregor, Timothy D. Korson:
Object-Oriented Design (Introduction to the Special Issue). Commun. ACM 33(9): 38-39 (1990) - John D. McGregor, Timothy D. Korson:
Understanding Object-Oriented: A Unifying Paradigm. 40-60 - David Jordan:
Implementation Benefits of C++ Language Mechanisms. 61-64 - Michael F. Kilian:
Trellis: Turning Designs into Programs. 65-67 - Bertrand Meyer:
Lessons from the Design of the Eiffel Libraries. 68-88 - Simon J. Gibbs, Dennis Tsichritzis, Eduardo Casais, Oscar Nierstrasz, Xavier Pintado:
Class Management for Software Communities. 90-103 - Rebecca Wirfs-Brock, Ralph E. Johnson:
Surveying Current Research in Object-Oriented Design. 104-124 - Gul Agha:
Concurrent Object-Oriented Programming. 125-141 - Brian Henderson-Sellers, Julian M. Edwards:
The Object-Oriented Systems Life Cycle. 142-159
- David Gries, Dorothy Marsh:
The 1988-89 Taulbee Survey Report. 160-169
- Peter G. Neumann:
A Few Old Coincidences. 202
Volume 33, Number 10, October 1990
- Maurice V. Wilkes:
It's All Software Now. 19-21
- Marc Rettig:
Software Teams. 23-27
- Philip Heidelberger:
Discrete Event Simulation (Introduction to the Special Section). 28-29 - Richard Fujimoto:
Parallel Discrete Event Simulation. 30-53 - Sanjay Jain, Karon Barber, David Osterfeld:
Expert Simulation for On-Line Scheduling. 54-60 - Alexander Dupuy, Jed Schwartz, Yechiam Yemini, David F. Bacon:
NEST: A Network Simulation and Prototyping Testbed. 63-74 - Peter W. Glynn:
Likelihood Ratio Gradient Estimation for Stochastic Systems. 75-84 - Pierre L'Ecuyer:
Random Numbers for Simulation. 85-97 - David J. Miller:
Simulation of a Semiconductor Manufacturing Line. 98-108
- Jakob Nielsen:
Traditional Dialogue Design Applied to Modern User Interfaces. 109-118 - Brian D. Lynch, H. Raghav Rao, Winston T. Lin:
Economic Analysis of Microcomputer Hardware. 119-129
- Peter G. Neumann:
Ghosts, Mysteries and Uncertainty. 170
Volume 33, Number 11, November 1990
- Larry Press:
Windows, DOS and the Mac. 19-26
- Pamela Samuelson:
How to Interpret the Lotus Decision (And How Not To). 27-33
- Karen A. Frenkel:
Women and Computing. 34-46 - Amy Pearl, Martha E. Pollack, Eve A. Riskin, Becky Thomas, Elizabeth Wolf, Alice Wu:
Becoming A Computer Scientist. 47-57 - Kevin Knight:
Connectionist Ideas and Algorithms. 58-74 - Philip A. Bernstein:
Transaction Processing Monitors. 75-86
- Paul S. Jacobs, Lisa F. Rau:
SCISOR: Extracting Information from On-Line News. 88-97 - William J. Premerlani, James E. Rumbaugh, Michael R. Blaha, Thomas A. Varwig:
An Object-Oriented Relational Database. 99-109
- Eric A. Weiss:
The XXII Self-Assessment: The Ethics of Computing. 110-132
- Peter G. Neumann:
Risks in Computerized Elections. 170
Volume 33, Number 12, December 1990
- Maurice V. Wilkes:
The Rise of the VLSI Processor. 16-17
- John F. Muratore, Troy A. Heindel, Terri B. Murphy, Arthur N. Rasmussen, Robert Z. McFarland:
Real-Time Data Acquisition at Mission Control. 18-31 - Barton P. Miller, Lars Fredriksen, Bryan So:
An Empirical Study of the Reliability of UNIX Utilities. 32-44 - Andrew S. Tanenbaum, Robbert van Renesse, Hans van Staveren, Gregory J. Sharp, Sape J. Mullender:
Experiences with the Amoeba Distributed Operating System. 46-63
- Vijay Gurbaxani:
Diffusion in Computing Networks: The Case of BITNET. 65-75
- Jonathan Jacky:
Inside Risks: Risks in Medical Electronics. 138
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.