%%% -*-BibTeX-*-
%%% ====================================================================
%%%  Bibtex-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "2.34",
%%%     date            = "13 January 2011",
%%%     time            = "17:34:09 MDT",
%%%     filename        = "cacm1980.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     checksum        = "08930 25403 100332 1026059",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography, CACM, Communications of the
%%%                        ACM",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a preliminary bibliography of
%%%                        Communications of the ACM (CODEN CACMA2, ISSN
%%%                        0001-0782), covering (incompletely) 1980 --
%%%                        1984, and completely 1985--1989 (see below).
%%%
%%%                        At version 2.34, the year coverage looked
%%%                        like this:
%%%
%%%                             1960 (   2)    1971 (   3)    1982 (  89)
%%%                             1961 (   1)    1972 (   2)    1983 ( 125)
%%%                             1962 (   0)    1973 (   1)    1984 ( 141)
%%%                             1963 (   1)    1974 (   1)    1985 ( 100)
%%%                             1964 (   1)    1975 (   1)    1986 (  99)
%%%                             1965 (   1)    1976 (   3)    1987 (  90)
%%%                             1966 (   2)    1977 (   1)    1988 ( 112)
%%%                             1967 (   1)    1978 (   3)    1989 ( 118)
%%%                             1968 (   5)    1979 (   2)    1990 (   2)
%%%                             1969 (   1)    1980 (  71)    1991 (   0)
%%%                             1970 (   6)    1981 (  86)    1992 (   1)
%%%
%%%                             Article:       1067
%%%                             Book:             2
%%%                             InProceedings:    2
%%%                             TechReport:       1
%%%
%%%                             Total entries: 1072
%%%
%%%                        The size of the original cacm.bib file
%%%                        covering 1958--1996 became too large (about
%%%                        4000 entries) for BibTeX and TeX to handle,
%%%                        so at version 1.44, it was split into
%%%                        cacm1950.bib, cacm1960.bib, cacm1970.bib,
%%%                        cacm1980.bib, and cacm1990.bib, each covering
%%%                        the decade starting with the year embedded in
%%%                        the filename.  Version numbers for these
%%%                        files begin at 2.00.
%%%
%%%                        Volumes from the 1990s average more than 200
%%%                        articles yearly, so a complete bibliography
%%%                        for this journal could contain more than 6000
%%%                        entries from 1958 to 2000.
%%%
%%%                        These bibliographies also include ACM
%%%                        Algorithms 1--492.  For Algorithms 493--686,
%%%                        including Algorithm 568, published in ACM
%%%                        Transactions on Programming Languages and
%%%                        Systems (TOPLAS), see the companion
%%%                        bibliographies, toms.bib and toplas.bib.
%%%
%%%                        All published Remarks and Corrigenda are
%%%                        cross-referenced in both directions, so
%%%                        that citing a paper will automatically
%%%                        generate citations for those Remarks and
%%%                        Corrigenda.  Cross-referenced entries are
%%%                        duplicated in cacm19*.bib and toms.bib, so
%%%                        that each is completely self-contained.
%%%
%%%                        Source code for ACM Algorithms from 380
%%%                        onwards, with some omissions, is available
%%%                        via the Netlib service at
%%%                        http://netlib.ornl.gov/, and
%%%                        ftp://netlib.bell-labs.com/netlib/toms.
%%%
%%%                        There is a World Wide Web search facility
%%%                        for articles published in this journal from
%%%                        1959 to 1979 at
%%%                        http://ciir.cs.umass.edu/cgi-bin/web_query_form/public/cacm2.1.
%%%
%%%                        The ACM maintains Web pages with journal
%%%                        tables of contents for 1985--1995 at
%%%                        http://www.acm.org/pubs/toc.  That data has
%%%                        been automatically converted to BibTeX
%%%                        form, corrected for spelling and page
%%%                        number errors, and merged into this file.
%%%                        Thus, the journal coverage from 1985 on
%%%                        should be complete.
%%%
%%%                        The initial draft of entries for 1981 -- 1990
%%%                        was extracted from the ACM Computing Archive
%%%                        CD ROM for the 1980s, with manual corrections
%%%                        and additions.  Additions were then made from
%%%                        all of the bibliographies in the TeX User
%%%                        Group collection, from bibliographies in the
%%%                        author's personal files, from tables of
%%%                        contents information at
%%%                        http://www.acm.org/pubs/cacm/, from
%%%                        Zentralblatt fur Mathematik Mathematics
%%%                        Abstracts at
%%%                        http://www.emis.de/cgi-bin/MATH/, from
%%%                        bibliographies at Internet host
%%%                        netlib.bell-labs.com, and from the computer science
%%%                        bibliography collection on ftp.ira.uka.de in
%%%                        /pub/bibliography to which many people of
%%%                        have contributed.  The snapshot of this
%%%                        collection was taken on 5-May-1994, and it
%%%                        consists of 441 BibTeX files, 2,672,675
%%%                        lines, 205,289 entries, and 6,375
%%%                        <at>String{} abbreviations, occupying 94.8MB
%%%                        of disk space.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.   Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order within each journal,
%%%                        using bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================

@Preamble{
  "\input bibnames.sty " #
  "\input path.sty " #
  "\def \TM {${}^{\sc TM}$} " #
  "\hyphenation{
                al-pha-mer-ic
                Balz-er
                Blom-quist
                Bo-ta-fo-go
                Bran-din
                Brans-comb
                Bu-tera
                Chris-tina
                Christ-o-fi-des
                Col-lins
                Cor-dell
                data-base
                econ-omies
                Fletch-er
                flow-chart
                flow-charts
                Fry-styk
                ge-dank-en
                Gar-fink-el
                Ge-ha-ni
                Glush-ko
                Goud-reau
                Gua-dan-go
                Gui-ma-raes
                Har-i-di
                Haw-thorn
                Hem-men-ding-er
                Hor-o-witz
                Hour-vitz
                Hirsch-berg
                Ike-da
                Ka-chi-tvi-chyan-u-kul
                Kat-ze-nel-son
                Kitz-miller
                Ko-ba-yashi
                Le-Me-tay-er
                Ken-ne-dy
                Law-rence
                Mac-kay
                Mai-net-ti
                Mar-sa-glia
                Max-well
                Mer-ner
                Mo-ran-di
                Na-ray-an
                New-ell
                Nich-ols
                para-digm
                pat-ent-ed
                Phi-lo-kyp-rou
                Prep-a-ra-ta
                pseu-do-chain-ing
                QUIK-SCRIPT
                Rad-e-mach-er
                re-eval-u-a-tion
                re-wind
                Ros-witha
                Schwach-heim
                Schob-bens
                Schon-berg
                Sho-sha-ni
                Si-tha-ra-ma
                Skwa-rec-ki
                Ste-phens
                Streck-er
                Strin-gi-ni
                Tes-ler
                Te-zu-ka
                Teu-ho-la
                Till-quist
                Town-send
                Tsi-chri-tzis
                Tur-ski
                Vuille-min
                We-nig
                Za-bo-row-ski
                Za-mora
  }"}

%%% ====================================================================
%%% Acknowledgement abbreviations:

@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:

@String{j-CACM                  = "Communications of the ACM"}

@String{j-MANAGEMENT-SCIENCE    = "Management Science"}

@String{j-SPE                   = "Software ---  Practice and Experience"}

@String{j-TOMS                  = "ACM Transactions on Mathematical Software"}

%%% ====================================================================
%%% Publisher abbreviations:

@String{pub-ACM                 = "ACM Press"}

@String{pub-ACM:adr             = "New York, NY 10036, USA"}

@String{pub-MORGAN-KAUFMANN     = "Morgan Kaufmann Publishers"}

@String{pub-MORGAN-KAUFMANN:adr = "Los Altos, CA 94022, USA"}

@String{pub-SUCSLI              = "Stanford University Center for the Study of
                                  Language and Information"}

@String{pub-SUCSLI:adr          = "Stanford, CA, USA"}

@String{pub-SV                  = "Spring{\-}er-Ver{\-}lag"}

@String{pub-SV:adr              = "Berlin, Germany~/ Heidelberg,
                                  Germany~/ London, UK~/ etc."}

@String{pub-WILEY               = "Wiley"}

@String{pub-WILEY:adr           = "New York, NY, USA"}

%%% ====================================================================
%%% Bibliography entries (cross-references in notes necessitate
%%% inclusion of a few additional entries published elsewhere):

@Article{Samelson:1960:SFT,
  author =       "K. Samelson and Friedrich L. Bauer",
  title =        "Sequential Formula Translation",
  journal =      j-CACM,
  volume =       "3",
  number =       "2",
  pages =        "76--83",
  month =        feb,
  year =         "1960",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68.00",
  MRnumber =     "23\#B548",
  bibdate =      "Mon Jan 22 07:18:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm3.html#SamelsonB60",
  note =         "Addendum, 351.",
  acknowledgement = ack-nhfb,
  oldlabel =     "SamelsonB60",
  reviewer =     "B. A. Galler",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SamelsonB60",
}

@Article{Ellenberger:1960:NSP,
  author =       "K. W. Ellenberger",
  title =        "{ACM Algorithm 30}: Numerical Solution of the
                 Polynomial Equation",
  journal =      j-CACM,
  volume =       "3",
  number =       "12",
  pages =        "643",
  month =        dec,
  year =         "1960",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Sep 08 09:47:45 1994",
  note =         "See also \cite{Novotny:1985:RNS}.",
  acknowledgement = ack-nhfb,
}

@Article{Irons:1961:SDC,
  author =       "Edgar T. Irons",
  title =        "A Syntax Directed Compiler for {ALGOL 60}",
  journal =      j-CACM,
  volume =       "4",
  number =       "1",
  pages =        "51--55",
  month =        jan,
  year =         "1961",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:51:53 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/AG.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm4.html#Irons61",
  acknowledgement = ack-nhfb,
  keywords =     "applic.MC",
  oldlabel =     "Irons61",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Irons61",
}

@Article{Sussenguth:1963:UTS,
  author =       "Edward H. {Sussenguth, Jr.}",
  title =        "Use of Tree Structures for Processing Files",
  journal =      j-CACM,
  volume =       "6",
  number =       "5",
  pages =        "272--279",
  month =        may,
  year =         "1963",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:25:05 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm6.html#Sussenguth63",
  acknowledgement = ack-nhfb,
  oldlabel =     "Sussenguth63",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Sussenguth63",
}

@Article{Boothroyd:1964:G,
  author =       "J. Boothroyd",
  title =        "{ACM Algorithm 246}: Graycode",
  journal =      j-CACM,
  volume =       "7",
  number =       "12",
  pages =        "701",
  month =        dec,
  year =         "1964",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Sep 08 09:47:54 1994",
  note =         "See also \cite{Misra:1975:RG,Er:1985:RG}.",
  acknowledgement = ack-nhfb,
}

@Article{Dijkstra:1965:SPC,
  author =       "Edsger W. Dijkstra",
  title =        "Solution of a Problem in Concurrent Programming
                 Control",
  journal =      j-CACM,
  volume =       "8",
  number =       "9",
  pages =        "569--??",
  month =        sep,
  year =         "1965",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:36:04 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/bevan.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm8.html#Dijkstra65",
  abstract =     "A number of mainly independent sequential-cyclic
                 processes with restricted means of communication with
                 each other can be made in such a way that at any moment
                 one and only one if them is engaged in the ``critical
                 section'' of its cycle.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Dijkstra65",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Dijkstra65",
  xxtitle =      "Solutions of a Problem in Concurrent Programming
                 Control",
}

@Article{Weizenbaum:1966:ECP,
  author =       "J. Weizenbaum",
  title =        "{ELIZA} --- {A} Computer Program for the Study of
                 Natural Language Communication between Man and
                 Machine",
  journal =      j-CACM,
  volume =       "9",
  number =       "1",
  pages =        "36--44",
  month =        jan,
  year =         "1966",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Feb 01 07:09:04 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  abstract =     "ELIZA is a program operating within the MAC
                 time-sharing system at MIT which makes certain kinds of
                 natural language conversation between man and computer
                 possible. Input sentences are analyzed on the basis of
                 decomposition rules which are triggered by key words
                 appearing in the input text. Responses are generated by
                 reassembly rules associated with selected decomposition
                 rules. the fundamental technical problems with which
                 ELIZA is concerned are: (1)the identification of key
                 words, (2) the discovery of minimal context, (3) the
                 choice of appropriate transformations, (4) generation
                 of responses in the absence of key words, and (5) the
                 provision of an editing capability for ELIZA
                 ``scripts''. A discussion of some psychological issues
                 relevant to the ELIZA approach as well as of future
                 developments concludes the paper.",
  acknowledgement = ack-nhfb,
  annote =       "Early approach, using simple algorithms to mimic
                 intelligence.",
}

@Article{Dennis:1966:PSM,
  author =       "J. B. Dennis and E. C. van Horn",
  title =        "Programming Semantics for Multiprogrammed
                 Computations",
  journal =      j-CACM,
  volume =       "9",
  number =       "3",
  pages =        "143--155",
  month =        mar,
  year =         "1966",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jul 26 18:50:48 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib
                 and ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib",
  acknowledgement = ack-nhfb,
  annote =       "The first introduction of protection and
                 capabilities.",
  keywords =     "parallel processing operating debugging sharing
                 segments CACM",
}

@Article{Hill:1967:CSI,
  author =       "I. D. Hill and M. C. Pike",
  title =        "{ACM Algorithm 299}: Chi-Squared Integral",
  journal =      j-CACM,
  volume =       "10",
  number =       "4",
  pages =        "243--244",
  month =        apr,
  year =         "1967",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Sep 08 09:47:54 1994",
  note =         "See also \cite{Lozy:1976:RCS,Hill:1985:RCS}.",
  acknowledgement = ack-nhfb,
}

@Article{Maurer:1968:IHS,
  author =       "Ward Douglas Maurer",
  title =        "An Improved Hashcode for Scatter Storage",
  journal =      j-CACM,
  volume =       "11",
  number =       "1",
  pages =        "35--37",
  month =        jan,
  year =         "1968",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Jul 19 23:00:01 1994",
  acknowledgement = ack-nhfb,
}

@Article{Morris:1968:SST,
  author =       "Robert Morris",
  title =        "Scatter Storage Techniques",
  journal =      j-CACM,
  volume =       "11",
  number =       "1",
  pages =        "38--44",
  month =        jan,
  year =         "1968",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:06:01 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm11.html#Morris68",
  note =         "Influential survey of the subject of hashing, and
                 first introduction of random probing with secondary
                 clustering. Appears to be the first publication where
                 the word `hashing' appeared, although it was in common
                 use at the time. Knuth \cite[p.~542]{Knuth:1973:ACP}
                 found only one earlier printed use of the word, in a
                 1961 unpublished memorandum by W. W. Peterson.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Morris68",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Morris68",
}

@Article{Denning:1968:WSM,
  author =       "Peter J. Denning",
  title =        "The Working Set Model for Program Behaviour",
  journal =      j-CACM,
  volume =       "11",
  number =       "5",
  pages =        "323--333",
  month =        may,
  year =         "1968",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:04 MST 2001",
  bibsource =    "and
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/Dist.Sys.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/cache.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/distmem.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm11.html#Denning68",
  abstract =     "Probably the most basic reason behind the absence of
                 resource allocation in modern computer systems is an
                 adequate model of program behaviour. In this paper a
                 new model, the ``working set model,'' is developed. The
                 working set of pages associated with a process, defined
                 to be the collection os its most recently used pages,
                 provides knowledge vital to the dynamic management of
                 paged memories. ``Process'' and ``working set'' are
                 shown to be manifestations of the same ongoing
                 computational activity; then ``processor demand'' and
                 ``memory demand'' are defined; and resource allocation
                 is formulated as the problem of balancing demands
                 against the available equipment.",
  acknowledgement = ack-nhfb,
  memo =         "``Advice'' on program resource requirements cannot be
                 successfully taken from the user because the user may
                 not know them (due to lack of understanding or the fact
                 that the program makes use of external library
                 procedures whose resource demands aren't known), the
                 type of advice required is not well defined and the
                 user is only concerned with efficient execution of his
                 code, not the system as a whole. ``Advice'' on program
                 resource requirements cannot be successfully taken from
                 the compiler because modular programs will use modules
                 which are not necessarily available at compile time and
                 the extra instrumentation required in a compiler could
                 possibly severely restrict its performance and thus the
                 efficiency of the whole machine (as (at the time
                 anyway) compilers were one of the most used programs on
                 most systems).",
  oldlabel =     "Denning68",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Denning68",
  xxtitle =      "The Working Set Model for Program Behavior",
}

@Article{Dijkstra:1968:SMS,
  author =       "Edsger W. Dijkstra",
  title =        "The Structure of {``THE''}-Multiprogramming System",
  journal =      j-CACM,
  volume =       "11",
  number =       "5",
  pages =        "341--346",
  year =         "1968",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:36:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm11.html#Dijkstra68",
  acknowledgement = ack-nhfb,
  oldlabel =     "Dijkstra68",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Dijkstra68",
}

@Article{Bell:1968:NRD,
  author =       "J. R. Bell",
  title =        "{ACM Algorithm 334}: Normal Random Deviates [{G5}]",
  journal =      j-CACM,
  volume =       "11",
  number =       "7",
  pages =        "498",
  month =        jul,
  year =         "1968",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Sep 19 23:32:16 1994",
  note =         "See also \cite{Tracht:1982:RNR}.",
  acknowledgement = ack-nhfb,
}

@Article{Hoare:1969:ABC,
  author =       "C. A. R. Hoare",
  title =        "An Axiomatic Basis for Computer Programming",
  journal =      j-CACM,
  volume =       "12",
  number =       "10",
  pages =        "576--580, 583",
  month =        oct,
  year =         "1969",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:50:21 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/reynolds.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm12.html#Hoare69",
  acknowledgement = ack-nhfb,
  checked =      "24 August 1990",
  classcodes =   "C4290 (Other computer theory)",
  corpsource =   "The Queen's Univ., Belfast, UK",
  keywords =     "computer metatheory; programming",
  oldlabel =     "Hoare69",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Hoare69",
}

@Article{Earley:1970:ECF,
  author =       "Jay Earley",
  title =        "An Efficient Context-Free Parsing Algorithm",
  journal =      j-CACM,
  volume =       "13",
  number =       "2",
  pages =        "94--102",
  month =        feb,
  year =         "1970",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:37:10 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm13.html#Earley70",
  abstract =     "A parsing algorithm which seems to be the most
                 efficient general context-free algorithm known is
                 described. It is similar to both Knuth's LR(k)
                 algorithm and the familiar top-down algorithm. It has a
                 time bound proportional to $n^3$ (where $n$ is the
                 length of the string being parsed) in general; it has a
                 $n^2$ bound for unambiguous grammars; and it runs in
                 linear time on a large class of grammars, which seems
                 to include most practical context-free programming
                 language grammars. In an empirical comparison it
                 appears to be superior to the top-down and bottom-up
                 algorithms studied by Griffiths and Petrick.",
  acknowledgement = ack-nhfb,
  classcodes =   "C4210 (Formal logic); C6150C (Compilers, interpreters
                 and other processors)",
  corpsource =   "Univ. California, Berkeley, CA, USA",
  keywords =     "compilers; computational complexity; computational
                 linguistics; context-free grammar; parsing; program
                 compilers; syntax analysis",
  oldlabel =     "Earley70",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Earley70",
}

@Article{Bell:1970:QQM,
  author =       "James R. Bell",
  title =        "The Quadratic Quotient Method: {A} Hash Code
                 Eliminating Secondary Clustering",
  journal =      j-CACM,
  volume =       "13",
  number =       "2",
  pages =        "107--109",
  month =        feb,
  year =         "1970",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:21 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm13.html#Bell70",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "Digital Equipment Corp., Maynard, MA, USA",
  keywords =     "table lookup",
  oldlabel =     "Bell70",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bell70",
}

@Article{Codd:1970:RMD,
  author =       "E. F. Codd",
  title =        "A Relational Model of Data for Large Shared Data
                 Banks",
  journal =      j-CACM,
  volume =       "13",
  number =       "6",
  pages =        "377--387",
  month =        jun,
  year =         "1970",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/362384.362685",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:31:56 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm13.html#Codd70",
  note =         "Reprinted in \cite[pp.~5--15]{Stonebraker:1988:RDS}.",
  URL =          "http://dblp.uni-trier.de/db/journals/cacm/Codd70.html",
  abstract =     "Future users of large data banks must be protected
                 from having to know how the data is organized in the
                 machine (the internal representation). A prompting
                 service which supplies such information is not a
                 satisfactory solution. Activities of users at terminals
                 and most application programs would remain unaffected
                 when the internal representation of data is changed and
                 even when some aspects of the external representation
                 are changed. Changes in data representation will often
                 be needed as a result of changes in query, update, and
                 report traffic and natural growth in the types of
                 stored information. Existing noninferential, formatted
                 data systems provide users with tree-structured files
                 or slightly more general network models of the data. In
                 Section 1, inadequacies of these models are discussed.
                 A model based on $n$-ary relations, a normal form for
                 data base relations, and the concept of a universal
                 data sublanguage are introduced. In Section 2, certain
                 operations on relations (other than logical inference)
                 are discussed and applied to the problems of redundancy
                 and consistency in the user's model.",
  acknowledgement = ack-nhfb,
  annote =       "Shows problems of hierarchical data organization,
                 presents a non-hierarchical `normal' structure, and
                 discusses languages for describing relations of such
                 normal structures.",
  cdrom =        "CACMs1/CACM13/P377.pdf",
  classcodes =   "C6120 (File organisation); C7250 (Information storage
                 and retrieval)",
  corpsource =   "IBM, San Jose, CA, USA",
  journalabr =   "Commun ACM",
  keywords =     "composition; computers, data storage; consistency;
                 data bank; data banks; data base; data integrity; data
                 organization; data structure; data structures;
                 derivability; file organisation; hierarchies of data;
                 information retrieval; information storage and retrie;
                 join; networks of data; NOI; predicate calculus;
                 redundancy; relations; retrieval language; security;
                 systems",
  oldlabel =     "Codd70",
  review =       "ACM CR 8905-0329",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Codd70",
}

@Article{Hill:1970:SD,
  author =       "G. W. Hill",
  title =        "{ACM Algorithm 395}: {Student}'s $t$-Distribution",
  journal =      j-CACM,
  volume =       "13",
  number =       "10",
  pages =        "617--619",
  month =        oct,
  year =         "1970",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Sep 08 09:47:54 1994",
  note =         "See also \cite{Lozy:1979:RSD,Hill:1981:RSD}.",
  acknowledgement = ack-nhfb,
}

@Article{Hill:1970:SQ,
  author =       "G. W. Hill",
  title =        "{ACM Algorithm 396}: {Student}'s $t$-Quantiles",
  journal =      j-CACM,
  volume =       "13",
  number =       "10",
  pages =        "619--620",
  month =        oct,
  year =         "1970",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Apr 29 17:35:09 1999",
  note =         "See also
                 \cite{Hill:1981:RSD,Hill:1981:RSQ,Lozy:1979:RSD}.",
  acknowledgement = ack-nhfb,
}

@Article{Wirth:1971:PDS,
  author =       "Niklaus Wirth",
  title =        "Program Development by Stepwise Refinement",
  journal =      j-CACM,
  volume =       "14",
  number =       "4",
  pages =        "221--227",
  month =        apr,
  year =         "1971",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:30:25 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/conc.scientific.computing.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm14.html#Wirth71",
  acknowledgement = ack-nhfb,
  classcodes =   "C6110 (Systems analysis and programming)",
  corpsource =   "Eidgenossische Tech. Hochschule, Zurich, Switzerland",
  keywords =     "development; education; programming; programming
                 techniques; refinement; stepwise",
  oldlabel =     "Wirth71",
  treatment =    "P Practical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Wirth71",
}

@Article{McNamee:1971:SMP,
  author =       "J. M. McNamee",
  title =        "{ACM Algorithm 408}: {A} Sparse Matrix Package (Part
                 {I})",
  journal =      j-CACM,
  volume =       "14",
  number =       "4",
  pages =        "265--273",
  month =        apr,
  year =         "1971",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:33:53 1996",
  note =         "See also
                 \cite{Sipala:1977:RSM,Gustavson:1978:RSM,Harms:1980:RSM}.",
  acknowledgement = ack-nhfb,
}

@Article{Harrison:1971:IST,
  author =       "M. C. Harrison",
  title =        "Implementation of the Substring Test by Hashing",
  journal =      j-CACM,
  volume =       "14",
  number =       "12",
  pages =        "777--779",
  month =        dec,
  year =         "1971",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Sep 20 19:47:21 1994",
  note =         "See also \cite{Tharp:1982:PTS}.",
  acknowledgement = ack-nhfb,
}

@Article{Parnas:1972:TSM,
  author =       "David Lorge Parnas",
  title =        "A technique for software module specification with
                 examples",
  journal =      j-CACM,
  volume =       "15",
  number =       "5",
  pages =        "330--336",
  month =        may,
  year =         "1972",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:11:20 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm15.html#Parnas72",
  acknowledgement = ack-nhfb,
  classcodes =   "C6110 (Systems analysis and programming)",
  corpsource =   "Carnegie-Mellon Univ., Pittsburgh, PA, USA",
  keywords =     "programming; software design; software module
                 specification; technique",
  oldlabel =     "Parnas72",
  treatment =    "P Practical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Parnas72",
}

@Article{Kuki:1973:SSA,
  author =       "H. Kuki and W. J. Cody",
  title =        "A Statistical Study of the Accuracy of Floating Point
                 Number Systems",
  journal =      j-CACM,
  volume =       "16",
  number =       "4",
  pages =        "223--230",
  month =        apr,
  year =         "1973",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68A20 (65G05)",
  MRnumber =     "51 2344",
  MRreviewer =   "I. Kaufmann",
  bibdate =      "Mon Jan 22 06:56:31 MST 2001",
  bibsource =    "Compendex database;
                 ftp://garbo.uwasa.fi/pc/doc-soft/fpbibl18.zip;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm16.html#KukiC73",
  abstract =     "This paper presents the statistical results of tests
                 of the accuracy of certain arithmetic systems in
                 evaluating sums, products and inner products, and
                 analytic error estimates for some of the computations.
                 The arithmetic systems studied are 6-digit hexadecimal
                 and 22-digit binary floating point number
                 representations combined with the usual chop and round
                 modes of arithmetic with various numbers of guard
                 digits, and with a modified round mode with guard
                 digits. In a certain sense, arithmetic systems
                 differing only in their use of binary or hexadecimal
                 number representations are shown to be approximately
                 statistically equivalent in accuracy. Further, the
                 usual round mode with guard digits is shown to be
                 statistically superior in accuracy to the usual chop
                 mode in all cases save one. The modified round mode is
                 found to be superior to the chop mode in all cases.",
  acknowledgement = ack-nhfb # " and " # ack-nj,
  classcodes =   "C5230 (Digital arithmetic methods)",
  classification = "723",
  corpsource =   "Univ. Chicago, IL, USA",
  journalabr =   "Commun ACM",
  keywords =     "accuracy; arithmetic; computer programming; digital
                 arithmetic; error analysis; floating point arithmetic;
                 floating point number systems; guard digits; number
                 representation; rounding; statistical study",
  oldlabel =     "KukiC73",
  treatment =    "T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/KukiC73",
}

@Article{Ritchie:1974:UTS,
  author =       "Dennis M. Ritchie and Ken Thompson",
  title =        "The {UNIX} Time-Sharing System",
  journal =      j-CACM,
  volume =       "17",
  number =       "7",
  pages =        "365--375",
  month =        jul,
  year =         "1974",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:16:12 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm17.html#RitchieT74",
  abstract =     "This paper discusses the nature and implementation of
                 the file system and of the user command interface. UNIX
                 is a general-purpose, multi-user, interactive operating
                 system for the Digital Equipment Corporation
                 PDP-11\slash 40 and 11\slash 45 computers. It offers a
                 number of features seldom found even in larger
                 operating systems, including: (1) a hierarchical file
                 system incorporating demountable volumes; (2)
                 compatible file, device, and inter-process I/O; (3) the
                 ability to initiate asynchronous processes; (4) system
                 command language selectable on a per-user basis; and
                 (5) over 100 subsystems including a dozen languages.",
  acknowledgement = ack-nhfb,
  annote =       "Interactive operating system for PDP-11, VAX with a
                 hierarchical file system incorporating demountable
                 volumes.",
  classcodes =   "C6120 (File organisation); C6150J (Operating
                 systems)",
  classification = "723",
  corpsource =   "Bell Labs., Murray Hill, NJ, USA",
  journalabr =   "Commun ACM",
  keywords =     "asynchronous; command language; compatible file;
                 computer systems programming; demountable volumes; file
                 organisation; file system; hierarchical file system;
                 operating; operating systems (computers); processes;
                 sharing systems; system; system command language; time
                 sharing; time-; UNIX interactive operating system",
  oldlabel =     "RitchieT74",
  treatment =    "A Application; P Practical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/RitchieT74",
}

@Article{Denning:1976:LMS,
  author =       "Dorothy E. Denning",
  title =        "A Lattice Model of Secure Information Flow",
  journal =      j-CACM,
  volume =       "19",
  number =       "5",
  pages =        "236--243",
  month =        may,
  year =         "1976",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:31:20 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib",
  abstract =     "This paper investigates mechanisms that guarantee
                 secure information flow in a computer system. These
                 mechanisms are examined within a mathematical framework
                 suitable for formulating the requirements of secure
                 information flow among security classes. The central
                 component of the model is a lattice structure derived
                 from the security classes and justified by the
                 semantics of information flow. The lattice properties
                 permit concise formulations of the security
                 requirements of different existing systems and
                 facilitate the construction of mechanisms that enforce
                 security. \par

                 The model provides a unifying view of all systems that
                 restrict information flow, enables a classification of
                 them according to security objectives, and suggests
                 some new approaches. It also leads to the construction
                 of automatic program certification mechanisms for
                 verifying the secure flow of information through a
                 program.",
  acknowledgement = ack-nhfb,
  keywords =     "information flow; lattice; program certification;
                 protection; security; security class",
}

@Article{Metcalfe:1976:EDP,
  author =       "Robert M. Metcalfe and David R. Boggs",
  title =        "{Ethernet}: Distributed Packet Switching for Local
                 Computer Networks",
  journal =      j-CACM,
  volume =       "19",
  number =       "7",
  pages =        "395--404",
  month =        jul,
  year =         "1976",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:04:09 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/Ai.misc.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm19.html#MetcalfeB76",
  abstract =     "Ethernet is a branching broadcast communication system
                 for carrying digital data packets among locally
                 distributed computing stations. The packet transport
                 mechanism provided by Ethernet has been used to build
                 systems which can be viewed as either local computer
                 networks or loosely coupled multiprocessors. \par

                 An Ethernet's shared communication facility, its Ether,
                 is a passive broadcast medium with no central control.
                 Coordination of access to the Ether for packet
                 broadcasts is distributed among the contending
                 transmitting stations using controlled statistical
                 arbitration. \par

                 Switching of packets to their destinations on the Ether
                 is distributed among the receiving stations using
                 packet address recognition. Design principles and
                 implementation are described, based on experience with
                 an operating Ethernet of 100 nodes along a kilometer of
                 coaxial cable. A model for estimating performance under
                 heavy loads and a packet protocol for error controlled
                 communication are included for completeness.",
  acknowledgement = ack-nhfb,
  classcodes =   "B6210L (Computer communications); C5620 (Computer
                 networks and techniques)",
  classification = "718; 722; 723",
  corpsource =   "Xerox Palo Alto Res. Center, Palo Alto, CA, USA",
  journalabr =   "Commun ACM",
  keywords =     "broadcast; broadcast communication; communication;
                 computer networks; computer systems, digital --- Real
                 Time Operation; computers --- Data Communication
                 Systems; data transmission; digital communication
                 systems; distributed communication; distributed
                 computing; distributed control; Ethernet; LANs;
                 multiprocessing; multiprocessors; networks; operating;
                 packet switching; statistical arbitration; switching
                 systems",
  oldlabel =     "MetcalfeB76",
  treatment =    "A Application; P Practical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/MetcalfeB76",
}

@Article{Rivest:1978:MOD,
  author =       "Ronald L. Rivest and Adi Shamir and Leonard M.
                 Adleman",
  title =        "A Method for Obtaining Digital Signatures and
                 Public-Key Cryptosystems",
  journal =      j-CACM,
  volume =       "21",
  number =       "2",
  pages =        "120--126",
  month =        feb,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "94A05",
  MRnumber =     "83m:94003",
  MRreviewer =   "J. L. Selfridge",
  bibdate =      "Mon Jan 22 07:16:20 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm21.html#RivestSA78",
  note =         "The basics of trap-door functions and the famous RSA
                 public key cryptosystem are presented in this paper.",
  abstract =     "An encryption method is presented with the novel
                 property that publicly revealing an encryption key does
                 not thereby reveal the corresponding decryption key.
                 This has two important consequences: (1) Couriers or
                 other secure means are not needed to transmit keys,
                 since a message can be enciphered using an encryption
                 key publicly revealed by the intended recipient. (2) A
                 message can be ``signed'' using a privately held
                 decryption key. Anyone can verify this signature using
                 the corresponding publicly revealed encryption key.
                 Signatures cannot be forged, and a signer cannot later
                 deny the validity of his signature.",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  classification = "723",
  corpsource =   "Dept. of Math., MIT, Cambridge, MA, USA",
  journalabr =   "Commun ACM",
  keywords =     "computer programming; cryptography; cryptosystems;
                 data handling; data processing --- Security of Data;
                 decryption key; digital signatures; encryption key;
                 number theory; operating protection; RSA; security;
                 security of data",
  oldlabel =     "RivestSA78",
  treatment =    "T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/RivestSA78",
}

@Article{Hoare:1978:CSP,
  author =       "C. A. R. Hoare",
  title =        "Communicating Sequential Processes",
  journal =      j-CACM,
  volume =       "21",
  number =       "8",
  pages =        "666--677",
  month =        aug,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:50:24 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm21.html#Hoare78",
  note =         "See corrigendum \cite{Hoare:1978:CCS}.",
  abstract =     "This paper suggests that input and output are basic
                 primitives of programming and that parallel composition
                 of communicating sequential processes is a fundamental
                 program structuring method. When combined with a
                 development of Dijkstra's guarded command, these
                 concepts are surprisingly versatile. \par

                 Their use is illustrated by sample solutions of a
                 variety of familiar programming exercises.",
  acknowledgement = ack-nhfb,
  annote =       "This paper is now expanded into an excellent book
                 detailed by Hoare and published by Prentice-Hall. This
                 paper is reproduced in Kuhn and Padua's (1981, IEEE)
                 survey ``Tutorial on Parallel Processing.'' Reproduced
                 in ``Distributed Computing: Concepts and
                 Implementations'' edited by McEntire, O'Reilly and
                 Larson, IEEE, 1984. Somewhat dated.",
  classcodes =   "C6110 (Systems analysis and programming)",
  classification = "723",
  corpsource =   "Queen's Univ., Belfast, UK",
  journalabr =   "Commun ACM",
  keywords =     "4.22; 4.32 maeder biblio: synchronisation and
                 concurrency in processes; ak; bhibbard grecommended91;
                 classes; computer programming; concurrency; conditional
                 critical regions; coroutines; CR categories: 4.20; CSP;
                 data representations; Dijkstra's guarded command;
                 guarded commands; hcc; input; iterative arrays;
                 k-concurrency; k-csp; k-guarded-commands; monitors;
                 multiple entries; multiple exits; nondeterminacy;
                 output; parallel composition; parallel programming;
                 primitives; procedures; program; program structures;
                 programming; Programming; programming languages;
                 programming primitives; recursion; sequential
                 processes; structured programming; structuring method",
  oldlabel =     "Hoare78",
  treatment =    "T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Hoare78",
}

@Article{Brelaz:1979:NMC,
  author =       "Daniel Br{\'e}laz",
  title =        "New Methods to Color Vertices of a Graph",
  journal =      j-CACM,
  volume =       "22",
  number =       "4",
  pages =        "251--256",
  month =        apr,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "90B35",
  MRnumber =     "80c:90080",
  MRreviewer =   "G. Berman",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/clique.color.bib",
  note =         "See \cite{Peemoller:1983:CBM,Kubale:1985:GIE}.",
  acknowledgement = ack-nhfb,
  annote =       "Successive augmentation approach to graph coloring.
                 DSATUR chooses the vertex adjacent to the largest
                 number of distinctly colored vertices. Paper also
                 discusses an implicit enumeration scheme for finding an
                 optimal coloring using some of the principles of DSATUR
                 to guide the search.",
}

@Article{ONeill:1980:PST,
  author =       "P. O'Neill and A. O'Neill",
  title =        "Performance Statistics of a Time Sharing Network at a
                 Small University",
  journal =      j-CACM,
  volume =       "23",
  number =       "1",
  pages =        "10--13",
  month =        jan,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:39:32 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib",
  acknowledgement = ack-nhfb,
  annote =       "(VBI-001200)",
  country =      "USA",
  descriptors =  "Computer network; traffic measurement",
  enum =         "10738",
  references =   "0",
}

@Article{Mazlack:1980:IPA,
  author =       "Lawrence J. Mazlack",
  title =        "Identifying Potential to Acquire Programming Skill",
  journal =      j-CACM,
  volume =       "23",
  number =       "1",
  pages =        "14--17",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:02:22 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#Mazlack80",
  acknowledgement = ack-nhfb,
  oldlabel =     "Mazlack80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Mazlack80",
}

@Article{Cichelli:1980:MPH,
  author =       "R. J. Cichelli",
  title =        "Minimal Perfect Hash Functions Made Simple",
  journal =      j-CACM,
  volume =       "23",
  number =       "1",
  pages =        "17--19",
  month =        jan,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Apr 29 17:34:47 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib",
  note =         "See remarks in \cite{Jaeschke:1980:CMP}, and the
                 author's response in \cite{Cichelli:1980:CMP}, and also
                 later extension \cite{Sager:1985:PTG}.",
  acknowledgement = ack-nhfb,
  annote =       "A heuristic for computing a simple, fast, and
                 machine-independent hash function is presented. Because
                 of these properties, several attempts have been made to
                 extend this paper since its publication.",
}

@Article{Abelson:1980:ITA,
  author =       "Harold Abelson and Peter Andreae",
  title =        "Information Transfer and Area-Time Tradeoffs for
                 {VLSI} Multiplication",
  journal =      j-CACM,
  volume =       "23",
  number =       "1",
  pages =        "20--23",
  month =        jan,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "94C30 (68C25)",
  MRnumber =     "80m:94112",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Lane:1980:SLM,
  author =       "Jeffrey M. Lane and Loren C. Carpenter and J. Turner
                 Whitted and James F. Blinn",
  title =        "Scan Line Methods for Displaying Parametrically
                 Defined Surfaces",
  journal =      j-CACM,
  volume =       "23",
  number =       "1",
  pages =        "23--34",
  month =        jan,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 22:56:05 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.80.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Algorithmic Aspects scanning; CACM; Mathematical
                 Aspects surface generation; Methodologies; Modeling
                 geometric design/modeling; surface display; surface
                 splines; Techniques; visible patch",
}

@Article{Kent:1980:TCS,
  author =       "Stephen T. Kent",
  title =        "Technical Correspondence: On Secure Personal
                 Computing",
  journal =      j-CACM,
  volume =       "23",
  number =       "1",
  pages =        "35--36",
  month =        jan,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 29 06:49:39 2001",
  acknowledgement = ack-nhfb,
}

@Article{Denning:1980:TCS,
  author =       "Dorothy E. Denning",
  title =        "Technical Correspondence: On Secure Personal
                 Computing",
  journal =      j-CACM,
  volume =       "23",
  number =       "1",
  pages =        "36--39",
  month =        jan,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 29 06:49:39 2001",
  acknowledgement = ack-nhfb,
}

@Article{Bates:1980:TCS,
  author =       "Doug Bates and Ronald S. Lemos",
  title =        "Technical Correspondence: On Statistical Analysis",
  journal =      j-CACM,
  volume =       "23",
  number =       "1",
  pages =        "39--40",
  month =        jan,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 29 06:49:39 2001",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1980:CLC,
  author =       "Anonymous",
  title =        "Correction: List of Contributors to the {CS Report
                 [Comm. ACM, March 1979]}",
  journal =      j-CACM,
  volume =       "23",
  number =       "1",
  pages =        "40--40",
  month =        jan,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 29 06:49:39 2001",
  acknowledgement = ack-nhfb,
}

@Article{Ralston:1980:CCS,
  author =       "Anthony Ralston and Mary Shaw",
  title =        "{Curriculum '78} --- Is Computer Science Really that
                 Unmathematical",
  journal =      j-CACM,
  volume =       "23",
  number =       "2",
  pages =        "67--70",
  month =        feb,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:14:49 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#RalstonS80",
  acknowledgement = ack-nhfb,
  annote =       "This decade has seen major advances in the theory of
                 computation and in the utility of theoretical results
                 in practical settings. The rapid growth of the field of
                 computational complexity has greatly increased our
                 ability to analyze algorithms. And perhaps most
                 significantly, we have finally started to make real
                 progress in developing principles and theories for the
                 design and verification of algorithms and programs. Are
                 these changes evident in Curriculum '78? Sadly No. That
                 curriculum only lends support to the equation Computer
                 Science equals Programming that is mistakenly believed
                 by so many outside the discipline.",
  oldlabel =     "RalstonS80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/RalstonS80",
}

@Article{Canon:1980:VME,
  author =       "M. D. Canon and D. H. Fritz and John H. Howard and T.
                 D. Howell and Michael F. Mitoma and Juan
                 Rodriguez-Rossel",
  title =        "A Virtual Machine Emulator for Performance
                 Evaluation",
  journal =      j-CACM,
  volume =       "23",
  number =       "2",
  pages =        "71--80",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:29:30 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#CanonFHHMR80",
  acknowledgement = ack-nhfb,
  oldlabel =     "CanonFHHMR80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/CanonFHHMR80",
}

@Article{Redell:1980:POS,
  author =       "David Redell and Yogen Dalal and Thomas Horsley and
                 Hugh Lauer and William Lynch and Paul McJones and Hal
                 Murray and Stephen Purcell",
  title =        "{Pilot}: An Operating System for a Personal Computer",
  journal =      j-CACM,
  volume =       "23",
  number =       "2",
  pages =        "81--92",
  month =        feb,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  abstract =     "The Pilot operating system provides a single-user,
                 single-language environment for higher level software
                 on a powerful personal computer. Its features include
                 virtual memory, a large ``flat'' file system, streams,
                 network communication facilities, and concurrent
                 programming support. Pilot thus provides rather more
                 powerful facilities than are normally associated with
                 personal computers. The exact facilities provided
                 display interesting similarities to and differences
                 from corresponding facilities provided in large
                 multi-user systems. Pilot is implemented entirely in
                 Mesa, a high-level system programming language. The
                 modularization of the implementation displays some
                 interesting aspects in terms of both the static
                 structure and dynamic interactions of the various
                 components.",
  acknowledgement = ack-nhfb,
  keywords =     "Mesa; Virtual Memory",
}

@Article{Ousterhout:1980:MED,
  author =       "J. K. Ousterhout and D. A. Scelza and P. S. Sindhu",
  title =        "{Medusa}: an experiment in distributed operating
                 system structure",
  journal =      j-CACM,
  volume =       "23",
  number =       "2",
  pages =        "92--105",
  month =        feb,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:36:07 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib
                 and ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib",
  abstract =     "The design of Medusa, a distributed operating system
                 for the Cm* multimicroprocessor, is discussed. The Cm*
                 architecture combines distribution and sharing in a way
                 that strongly impacts the organization of operating
                 systems. Medusa is an attempt to capitalize on the
                 architectural features to produce a system that is
                 modular, robust, and efficient. To provide modularity
                 and to make effective use of the distributed hardware,
                 the operating system is partitioned into several
                 disjoint utilities that communicate with each other via
                 messages. To take advantage of the parallelism present
                 in Cm* and to provide robustness, all programs,
                 including the utilities, are task forces containing
                 many concurrent, cooperating activities.",
  acknowledgement = ack-nhfb,
}

@Article{Lampson:1980:EPM,
  author =       "Butler W. Lampson and David D. Redell",
  title =        "Experience with Processes and Monitors in {Mesa}",
  journal =      j-CACM,
  volume =       "23",
  number =       "2",
  pages =        "105--117",
  month =        feb,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 22:55:32 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.synch.bib",
  abstract =     "The use of monitors for describing concurrency has
                 been much discussed in the literature. When monitors
                 are used in real systems of any size, however, a number
                 of problems arise which have not been adequately dealt
                 with: the semantics of nested monitor calls; the
                 various ways of defining the meaning of WAIT; priority
                 scheduling; handling of timeouts; aborts and other
                 exceptional conditions; interactions with process
                 creation and destruction; monitoring large numbers of
                 small objects. These problems are addressed by the
                 facilities described here for concurrent programming in
                 Mesa. Experience with several substantial applications
                 gives us some confidence in the validity of our
                 solutions.",
  acknowledgement = ack-nhfb,
  keywords =     "k-mesa; k-monitors; k-nested-monitor-calls; Mesa
                 Monitors",
}

@Article{Walker:1980:SVU,
  author =       "B. J. Walker and R. A. Kemmerer and G. J. Popek",
  title =        "Specification and Verification of the {UCLA Unix}
                 Security Kernel",
  journal =      j-CACM,
  volume =       "23",
  number =       "2",
  pages =        "118--131",
  month =        feb,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  abstract =     "Data Secure Unix, a kernel structured operating
                 system, was constructed as part of an ongoing effort at
                 UCLA to develop procedures by which operating systems
                 can be produced and shown secure. Program verification
                 methods were extensively applied as a constructive
                 means of demonstrating security enforcement. Here we
                 report the specification and verification experience in
                 producing a secure operating system. The work
                 represents a significant attempt to verify a
                 large-scale, production level software system,
                 including all aspects from initial specification to
                 verification of implemented code.",
  acknowledgement = ack-nhfb,
}

@Article{McCracken:1980:JWM,
  author =       "Daniel D. McCracken",
  title =        "{John W. Mauchly}: 1907--1980",
  journal =      j-CACM,
  volume =       "23",
  number =       "3",
  pages =        "143--143",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:02:42 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#McCracken80",
  acknowledgement = ack-nhfb,
  keywords =     "obituary",
  oldlabel =     "McCracken80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/McCracken80",
}

@Article{Auerbach:1980:TJW,
  author =       "Isaac L. Auerbach",
  title =        "A Tribute to {John William Mauchly}",
  journal =      j-CACM,
  volume =       "23",
  number =       "3",
  pages =        "144--??",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:22:16 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#Auerbach80",
  acknowledgement = ack-nhfb,
  oldlabel =     "Auerbach80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Auerbach80",
}

@Article{Eckert:1980:EDS,
  author =       "J. Presper Eckert",
  title =        "Eulogy: Delivered in {St. Anthony's Church, Ambler,
                 Pennsylvania}, at funeral services on {January 11,
                 1980}",
  journal =      j-CACM,
  volume =       "23",
  number =       "3",
  pages =        "145--146",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:37:22 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#Eckert80",
  acknowledgement = ack-nhfb,
  keywords =     "John William Mauchly",
  oldlabel =     "Eckert80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Eckert80",
}

@Article{Ling:1980:GCD,
  author =       "Robert F. Ling",
  title =        "General Considerations on the Design of an Interactive
                 System for Data Analysis",
  journal =      j-CACM,
  volume =       "23",
  number =       "3",
  pages =        "147--154",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:59:10 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#Ling80",
  acknowledgement = ack-nhfb,
  oldlabel =     "Ling80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Ling80",
}

@Article{Fraser:1980:GTE,
  author =       "C. W. Fraser",
  title =        "A Generalized Text Editor",
  journal =      j-CACM,
  volume =       "23",
  number =       "3",
  pages =        "154--158",
  month =        mar,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib",
  acknowledgement = ack-nhfb,
  keywords =     "uilit text",
}

@Article{Lee:1980:LAC,
  author =       "K. P. Lee",
  title =        "A Linear Algorithm for Copying Binary Trees Using
                 Bounded Workspace",
  journal =      j-CACM,
  volume =       "23",
  number =       "3",
  pages =        "159--162",
  month =        mar,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 22:56:16 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib",
  acknowledgement = ack-nhfb,
}

@Article{Samet:1980:RRQ,
  author =       "H. Samet",
  title =        "Region representation: Quadtrees from boundary codes",
  journal =      j-CACM,
  volume =       "23",
  number =       "3",
  pages =        "163--170",
  month =        mar,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:39:37 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.80.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Algorithmic Aspects region representation; graphical
                 data/base/structures; surface representation",
}

@Article{Dyer:1980:RRB,
  author =       "C. R. Dyer and A. Rosenfeld and H. Samet",
  title =        "Region representation: Boundary codes from quadtrees",
  journal =      j-CACM,
  volume =       "23",
  number =       "3",
  pages =        "171--179",
  month =        mar,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 22:52:38 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/raum.bib and
                 ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.80.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Algorithmic Aspects region representation; graphical
                 data/base/structures; surface representation",
  topics =       "K{\"u}nstliche Intelligenz / Raumbeschreibung /
                 Wissensrepr{\"a}sentation / Spatial Reasoning",
}

@Article{Gold:1980:SRE,
  author =       "Charles L. Gold and Seymour E. Goodman and Benjamin G.
                 Walker",
  title =        "Software: Recommendations for an Export Control
                 Policy",
  journal =      j-CACM,
  volume =       "23",
  number =       "4",
  pages =        "199--207",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:45:04 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#GoldGW80",
  acknowledgement = ack-nhfb,
  oldlabel =     "GoldGW80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/GoldGW80",
}

@Article{Brooks:1980:SPB,
  author =       "R. E. Brooks",
  title =        "{Studying programming behavior experimentally: The
                 problems of proper methodology}",
  journal =      j-CACM,
  volume =       "23",
  number =       "4",
  pages =        "207--213",
  month =        Apr,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/is.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bentley:1980:MDC,
  author =       "Jon Louis Bentley",
  title =        "Multidimensional Divide-and-Conquer",
  journal =      j-CACM,
  volume =       "23",
  number =       "4",
  pages =        "214--229",
  month =        apr,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68H05 (68C05)",
  MRnumber =     "81b:68116",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib",
  note =         "This paper contains an $n \log(n)$ deterministic
                 algorithm for finding nearest neighbors in
                 two-dimensional space.",
  acknowledgement = ack-nhfb,
}

@Article{Vuillemin:1980:ULD,
  author =       "Jean Vuillemin",
  title =        "A Unifying Look at Data Structures",
  journal =      j-CACM,
  volume =       "23",
  number =       "4",
  pages =        "229--239",
  month =        apr,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68B15",
  MRnumber =     "81b:68024",
  bibdate =      "Mon Jan 22 07:27:37 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/80.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#Vuillemin80",
  acknowledgement = ack-nhfb,
  oldlabel =     "Vuillemin80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Vuillemin80",
}

@Article{Glass:1980:RTL,
  author =       "Robert L. Glass",
  title =        "Real-Time: The ``Lost World'' of Software Debugging
                 and Testing",
  journal =      j-CACM,
  volume =       "23",
  number =       "5",
  pages =        "264--271",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:44:38 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#Glass80",
  acknowledgement = ack-nhfb,
  oldlabel =     "Glass80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Glass80",
}

@Article{Turner:1980:SMP,
  author =       "Joshua Turner",
  title =        "The Structure of Modular Programs",
  journal =      j-CACM,
  volume =       "23",
  number =       "5",
  pages =        "272--277",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:26:50 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#Turner80",
  acknowledgement = ack-nhfb,
  oldlabel =     "Turner80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Turner80",
}

@Article{Sethi:1980:CDT,
  author =       "Ishwar K. Sethi and B. Chatterjee",
  title =        "Conversion of Decision Tables to Efficient Sequential
                 Testing Procedures",
  journal =      j-CACM,
  volume =       "23",
  number =       "5",
  pages =        "279--285",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:20:36 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#SethiC80",
  acknowledgement = ack-nhfb,
  oldlabel =     "SethiC80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SethiC80",
}

@Article{Maes:1980:AAC,
  author =       "Rik Maes",
  title =        "An Algorithmic Approach to the Conversion of Decision
                 Grid Charts into Compressed Decision Tables",
  journal =      j-CACM,
  volume =       "23",
  number =       "5",
  pages =        "286--293",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:00:54 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#Maes80",
  acknowledgement = ack-nhfb,
  oldlabel =     "Maes80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Maes80",
}

@Article{Gill:1980:HBS,
  author =       "Arthur Gill",
  title =        "Hierarchical Binary Search",
  journal =      j-CACM,
  volume =       "23",
  number =       "5",
  pages =        "294--300",
  month =        may,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:32:07 1997",
  acknowledgement = ack-nhfb,
}

@Article{Deimel:1980:MCP,
  author =       "Lionel E. {Deimel, Jr.}",
  title =        "On a matrix chain product algorithm. Correction to:
                 {``An $O(n)$ algorithm for determining a near-optimal
                 computation order of matrix chain products'' [Comm.
                 ACM, 21, 1978, 544--549, MR 80a:68037] by F. Y. Chin}.
                 With a reply by {Chin}",
  journal =      j-CACM,
  volume =       "23",
  number =       "5",
  pages =        "301",
  month =        may,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68C25",
  MRnumber =     "81j:68049",
  MRreviewer =   "Ondrej S{\'y}kora",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{House:1980:CPS,
  author =       "Roger House",
  title =        "Comments on Program Specification and Testing",
  journal =      j-CACM,
  volume =       "23",
  number =       "6",
  pages =        "324--331",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:51:01 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#House80",
  acknowledgement = ack-nhfb,
  oldlabel =     "House80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/House80",
}

@Article{Chambers:1980:CAI,
  author =       "Jack A. Chambers and Jerry W. Sprecher",
  title =        "Computer Assisted Instruction: Current Trends",
  journal =      j-CACM,
  volume =       "23",
  number =       "6",
  pages =        "332--342",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:30:12 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#ChambersS80",
  acknowledgement = ack-nhfb,
  oldlabel =     "ChambersS80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/ChambersS80",
}

@Article{Whitted:1980:IIM,
  author =       "Turner Whitted",
  title =        "An Improved Illumination Model for Shaded Display",
  journal =      j-CACM,
  volume =       "23",
  number =       "6",
  pages =        "343--349",
  month =        jun,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Aug 24 21:14:52 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.80.bib",
  acknowledgement = ack-nhfb,
  annote =       "Also appears in {\bf Tutorial: Computer Graphics:
                 Image Synthesis}, Kenneth I. Joy, Charles W. Grant,
                 Nelson L. Max, and Lansing Hatfield (eds.), Computer
                 Society Press, Washington, 1988, p. 132-138. \\ The
                 classic paper on ray tracing. Describes a global
                 shading model and extensions to the original ray
                 tracing model. He notes that up to 95\% of the time is
                 spent calculating ray-surface intersections and that
                 there must be a way to speed things up. \\ To
                 accurately render a two-dimensional image of a
                 three-dimensional scene, global illumination
                 information that affects the intensity of each pixel of
                 the image must be known at the time the intensity is
                 calculated. In a simplified form, this information is
                 stored in a tree of ``rays'' extending from the viewer
                 to the first surface encountered and from there to
                 other surfaces and to the light sources. A visible
                 surface algorithm creates this tree for each pixel of
                 the display and passes it to determine the intensity of
                 the light received by the shader to accurately simulate
                 true reflection, shadows, and refraction, as well as
                 the effects simulated by conventional shaders.
                 Anti-aliasing is included as an integral part of the
                 visibility calculations. Surfaces displayed include
                 curved as well as polygonal surfaces.",
  keywords =     "Algorithmic Aspects shading; parallel processing; ray
                 tracing; Three-Dimensional Graphics realism",
}

@Article{Fletcher:1980:MGA,
  author =       "John G. Fletcher",
  title =        "A More General Algorithm for Computing Closed Semiring
                 Costs Between Vertices of a Directed Graph",
  journal =      j-CACM,
  volume =       "23",
  number =       "6",
  pages =        "350--351",
  month =        jun,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:31:45 1997",
  acknowledgement = ack-nhfb,
}

@Article{Banno:1980:KOB,
  author =       "Y. Banno and H. Hirose and Y. Karita and H. Mawatari
                 and H. Murakami and H. Takahashi and S. Yashiro and H.
                 Yoshiki and N. Hagiwara and Y. Sakurai",
  title =        "{KEKOPEN}, An Open Batch Processing System at {KEK}",
  journal =      j-CACM,
  volume =       "23",
  number =       "7",
  pages =        "368--378",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:23:08 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#BannoHKMMTYYHS80",
  acknowledgement = ack-nhfb,
  oldlabel =     "BannoHKMMTYYHS80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/BannoHKMMTYYHS80",
}

@Article{Harel:1980:FT,
  author =       "David Harel",
  title =        "On Folk Theorems",
  journal =      j-CACM,
  volume =       "23",
  number =       "7",
  pages =        "379--389",
  month =        jul,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:32:09 1997",
  acknowledgement = ack-nhfb,
}

@Article{Cheng:1980:GVG,
  author =       "R. C. H. Cheng and G. M. Feast",
  title =        "Gamma variate generators with increased shape
                 parameter range",
  journal =      j-CACM,
  volume =       "23",
  number =       "7",
  pages =        "389--394",
  month =        jul,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:32:35 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib",
  acknowledgement = ack-nhfb,
  annote =       "Gamma generators, easily programmed, and possess a
                 uniform speed over the operating range, but are only
                 valid for $\alpha>1$. Generating random variates using
                 the ratio of uniform variates are combined to produce a
                 family of generators valid for all $\alpha>1/n$ where
                 $n$ is an arbitrary integer. thus if $n$ is greater
                 than unity, variates with $\alpha$ less than unity can
                 be sampled.",
  country =      "USA",
  descriptors =  "distribution; gamma distribution; rng",
  enum =         "547",
  references =   "8",
}

@Article{Luccio:1980:CGA,
  author =       "Fabrizio Luccio and Linda Pagli",
  title =        "Comment on Generalized {AVL} Trees",
  journal =      j-CACM,
  volume =       "23",
  number =       "7",
  pages =        "394--395",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:00:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#LuccioP80",
  acknowledgement = ack-nhfb,
  oldlabel =     "LuccioP80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/LuccioP80",
}

@Article{Card:1980:KLM,
  author =       "Stuart K. Card and Thomas P. Moran and Allen Newell",
  title =        "The Keystroke-Level Model for User Performance Time
                 with Interactive Systems",
  journal =      j-CACM,
  volume =       "23",
  number =       "7",
  pages =        "396--410",
  month =        jul,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:36:31 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/da.3d-metaphors.bib",
  abstract =     "Keystroke-Modell in User Interface Design Environment
                 (UIDE): T(Execute) = K(Keystroking) + P(Pointing at
                 screen Object) + H(Homing on Device) + D(Drawing) +
                 M(Mental Preparation) + R(System Response Time)",
  acknowledgement = ack-nhfb,
}

@Article{Triance:1980:MPM,
  author =       "J. M. Triance and J. F. S. Yow",
  title =        "{MCOBOL} --- {A} Prototype Macro Facility for
                 {Cobol}",
  journal =      j-CACM,
  volume =       "23",
  number =       "8",
  pages =        "432--439",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:26:35 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#TrianceY80",
  acknowledgement = ack-nhfb,
  oldlabel =     "TrianceY80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/TrianceY80",
}

@Article{Compton:1980:EFL,
  author =       "Michael T. Compton",
  title =        "Easing Fault Location in Large Systems",
  journal =      j-CACM,
  volume =       "23",
  number =       "8",
  pages =        "440--442",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:32:22 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#Compton80",
  acknowledgement = ack-nhfb,
  oldlabel =     "Compton80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Compton80",
}

@Article{Iverson:1980:NTT,
  author =       "Kenneth E. Iverson",
  title =        "Notation as a Tool of Thought",
  journal =      j-CACM,
  volume =       "23",
  number =       "8",
  pages =        "444--465",
  month =        aug,
  year =         "1980",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/358896.358899",
  ISSN =         "0001-0782",
  MRclass =      "00A25 (68-02)",
  MRnumber =     "82b:00007",
  MRreviewer =   "B. Brainerd",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CACM apl programming languages",
  remark =       "This is the 1979 ACM Turing Award Lecture.",
}

@Article{Peterson:1980:CLM,
  author =       "G. Peterson and A. B. Budgor",
  title =        "The Computer Language {Mathsy} and Applications to
                 Solid State Physics",
  journal =      j-CACM,
  volume =       "23",
  number =       "8",
  pages =        "466--474",
  month =        aug,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:39:33 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.80.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Applications of Computer Graphics physics",
}

@Article{Halstead:1980:SAP,
  author =       "Maurice H. Halstead and Victor B. Schneider",
  title =        "Self-Assessment Procedure {VII}: {A} Self-Assessment
                 Procedure Dealing with Software Science",
  journal =      j-CACM,
  volume =       "23",
  number =       "8",
  pages =        "475--480",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:48:02 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#HalsteadS80",
  acknowledgement = ack-nhfb,
  oldlabel =     "HalsteadS80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/HalsteadS80",
}

@Article{Hall:1980:VOS,
  author =       "Dennis E. Hall and Deborah K. Scherrer and Joseph S.
                 Sventek",
  title =        "A Virtual Operating System",
  journal =      j-CACM,
  volume =       "23",
  number =       "9",
  pages =        "495--502",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:47:59 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#HallSS80",
  acknowledgement = ack-nhfb,
  oldlabel =     "HallSS80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/HallSS80",
}

@Article{Asai:1980:ONI,
  author =       "Hitohisa Asai",
  title =        "An overrelaxation for a numerical inverse of a
                 constant",
  journal =      j-CACM,
  volume =       "23",
  number =       "9",
  pages =        "503--510",
  month =        sep,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "65B10",
  MRnumber =     "81h:65002",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Kumar:1980:CSD,
  author =       "B. Kumar and E. S. Davidson",
  title =        "Computer System Design Using a Hierarchical Approach
                 to Performance Evaluation",
  journal =      j-CACM,
  volume =       "23",
  number =       "9",
  pages =        "511--521",
  month =        sep,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/storage.bib",
  acknowledgement = ack-nhfb,
}

@Article{Pfaltz:1980:PMR,
  author =       "John L. Pfaltz and William J. Berman and Edgar M.
                 Cagley",
  title =        "Partial-Match Retrieval Using Indexed Descriptor
                 Files",
  journal =      j-CACM,
  volume =       "23",
  number =       "9",
  pages =        "522--528",
  month =        sep,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68H05",
  MRnumber =     "81g:68128",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/80.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chand:1980:LCS,
  author =       "Donald R. Chand and Surya B. Yadav",
  title =        "Logical Construction of Software",
  journal =      j-CACM,
  volume =       "23",
  number =       "10",
  pages =        "546--555",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:30:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#ChandY80",
  acknowledgement = ack-nhfb,
  oldlabel =     "ChandY80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/ChandY80",
}

@Article{Ledgard:1980:NLI,
  author =       "Henry F. Ledgard and John A. Whiteside and Andrew
                 Singer and William Seymour",
  title =        "The Natural Language of Interactive Systems",
  journal =      j-CACM,
  volume =       "23",
  number =       "10",
  pages =        "556--563",
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:58:12 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm23.html#LedgardWSS80",
  acknowledgement = ack-nhfb,
  oldlabel =     "LedgardWSS80",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/LedgardWSS80",
}

@Article{Bard:1980:MSD,
  author =       "Y. Bard",
  title =        "A Model of shared {DASD} and Multipathing",
  journal =      j-CACM,
  volume =       "23",
  number =       "10",
  pages =        "564--572",
  month =        oct,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chandy:1980:CAP,
  author =       "K. Mani Chandy and Charles H. Sauer",
  title =        "Computational algorithms for product form queueing
                 networks",
  journal =      j-CACM,
  volume =       "23",
  number =       "10",
  pages =        "573--583",
  month =        oct,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68C15 (90B22)",
  MRnumber =     "81i:68047",
  bibdate =      "Tue Dec 26 16:39:26 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  acknowledgement = ack-nhfb,
  annote =       "\ldots{}in queueing networks with a product form
                 solution two computational algorithms for product form
                 networks are presented. A comprehensive treatment of
                 these algorithms and the two important existing
                 algorithms, convolution and mean value analysis, is
                 given.",
  descriptors =  "Queueing network; discrete convolution; product form;
                 network; runtime/storage efficiency",
}

@Article{Potier:1980:ALP,
  author =       "D. Potier and P. LeBlanc",
  title =        "Analysis of Locking Policies in Database Management
                 Systems",
  journal =      j-CACM,
  volume =       "23",
  number =       "10",
  pages =        "584--593",
  month =        oct,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 23:01:30 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  annote =       "Consistency control has to be enforced in database
                 management systems (DBMS) where several transactions
                 may concurrently access the database. \ldots{} However,
                 a drawback of integrity enforcement through locking
                 policies is the degradation of the global system
                 performance. \ldots{} The results hereby obtained are
                 aggregated in a second step to yield a global
                 performance evaluation. \ldots{}",
  descriptors =  "Queueing system; Queueing network; performance
                 evaluation; model; DBMS = database management system;
                 concurrency",
  keywords =     "CACM",
}

@Article{Cook:1980:BSA,
  author =       "Curtis R. Cook and Do Jin Kim",
  title =        "Best Sorting Algorithms for Nearly Sorted Lists",
  journal =      j-CACM,
  volume =       "23",
  number =       "11",
  pages =        "620--624",
  month =        nov,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:34:24 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CACM see also McGlinn; SP\&E Oct 1989",
}

@Article{Pitteway:1980:BAG,
  author =       "M. L. V. Pitteway and D. J. Watkinson",
  title =        "{Bresenham}'s algorithm with grey scale",
  journal =      j-CACM,
  volume =       "23",
  number =       "11",
  pages =        "625--626",
  month =        nov,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 18:50:31 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.80.bib",
  note =         "See corrigendum \cite{Pitteway:1981:CAG}.",
  acknowledgement = ack-nhfb,
  keywords =     "algorithmic aspects; aliasing; antialiasing; line
                 drawing; line generation",
}

@Article{Hirschberg:1980:DEF,
  author =       "D. S. Hirschberg and J. B. Sinclair",
  title =        "Decentralized Extrema-Finding in Circular
                 Configurations of Processors",
  journal =      j-CACM,
  volume =       "23",
  number =       "11",
  pages =        "627--628",
  month =        nov,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68B20 (68C25)",
  MRnumber =     "81j:68040",
  bibdate =      "Tue Dec 03 18:09:39 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CACM",
}

@Article{Steele:1980:DLB,
  author =       "Guy Lewis {Steele, Jr.} and Gerald Jay Sussman",
  title =        "Design of a {Lisp}-based Processor",
  journal =      j-CACM,
  volume =       "23",
  number =       "11",
  pages =        "628--645",
  month =        nov,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/scheme.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hofri:1980:DSF,
  author =       "M. Hofri",
  title =        "Disk scheduling: {FCFS} vs. {SSTF} revisited",
  journal =      j-CACM,
  volume =       "23",
  number =       "11",
  pages =        "645--653",
  month =        nov,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:34:57 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib",
  acknowledgement = ack-nhfb,
  annote =       "We report on a rather extensive simulation effort
                 directed at evaluating the merits of two scheduling
                 strategies, fcfs and sstf, for moving-arm disks under
                 stationary request arrival process. For
                 first-come-first-served (fcfs) scheduling, analytic
                 results for the mean waiting time are also given (in a
                 closed form). If the objective of a schedule is to
                 minimize the mean waiting time (or queue size) and its
                 variance, the results seem to confirm \ldots{}.",
  country =      "USA",
  descriptors =  "Queueing discipline; simulation; process management;
                 spt; fifo",
  enum =         "1383",
  references =   "8",
}

@Article{Peterson:1980:CPD,
  author =       "James Lyle Peterson",
  title =        "Computer Programs for Detecting and Correcting
                 Spelling Errors",
  journal =      j-CACM,
  volume =       "23",
  number =       "12",
  pages =        "676--687",
  month =        dec,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Feb 04 16:47:16 1996",
  note =         "See remarks
                 \cite{Dunlavey:1981:LES,Miller:1981:LES,Peterson:1981:LES}.",
  acknowledgement = ack-nhfb,
}

@Article{Winston:1980:LRA,
  author =       "Patrick H. Winston",
  title =        "Learning and Reasoning by Analogy",
  journal =      j-CACM,
  volume =       "23",
  number =       "12",
  pages =        "689--702",
  month =        dec,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:35:08 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/Learning.bib",
  acknowledgement = ack-nhfb,
}

@Article{Samet:1980:DTD,
  author =       "Hanan Samet",
  title =        "Deletion in two-dimensional quad trees",
  journal =      j-CACM,
  volume =       "23",
  number =       "12",
  pages =        "703--710",
  month =        dec,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:35:25 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/80.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shoch:1980:MPE,
  author =       "John F. Shoch and Jon A. Hupp",
  title =        "Measured performance of an {Ethernet} local network",
  journal =      j-CACM,
  volume =       "23",
  number =       "12",
  pages =        "711--721",
  month =        dec,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:35:44 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1980.bib",
  acknowledgement = ack-nhfb,
  annote =       "The Ethernet communications network is a broadcast,
                 multiaccess system for local computer networking, using
                 the techniques of carrier sense and collision
                 detection. Recently we have measured the actual
                 performance and error characteristics of an existing
                 Ethernet installation which provides communications
                 services to over 120 directly connected hosts to
                 network. This paper is a report on some of those
                 measurements -- characterizing ``typical'' \ldots{}.",
  country =      "USA",
  descriptors =  "Performance evaluation; model; Queueing network;
                 Packet switching; traffic intensity; traffic load",
  enum =         "2894",
  references =   "21",
}

@Article{Anonymous:1980:ISA,
  author =       "Anonymous",
  title =        "1980 Index by Subject to Algorithms",
  journal =      j-CACM,
  volume =       "23",
  number =       "12",
  pages =        "722--722",
  month =        dec,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 29 07:00:33 2001",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1980:ICA,
  author =       "Anonymous",
  title =        "Index to {Communications of the ACM}, Volume 23,
                 1980",
  journal =      j-CACM,
  volume =       "23",
  number =       "12",
  pages =        "723--727",
  month =        dec,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 29 07:00:33 2001",
  acknowledgement = ack-nhfb,
}

@Article{Jaeschke:1980:TCC,
  author =       "G. Jaeschke and G. Osterburg",
  title =        "Technical Correspondence: On {Cichelli}'s Minimal
                 Perfect Hash Functions Method",
  journal =      j-CACM,
  volume =       "23",
  number =       "12",
  pages =        "728--729",
  month =        dec,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Jul 19 22:51:08 1994",
  note =         "This letter to the editor contains comments on
                 \cite{Cichelli:1980:MPH}, together with a response from
                 R. J. Cichelli \cite{Cichelli:1980:CMP}.",
  acknowledgement = ack-nhfb,
}

@Article{Cichelli:1980:CMP,
  author =       "R. J. Cichelli",
  title =        "Technical Correspondence: On {Cichelli}'s Minimal
                 Perfect Hash Functions Method",
  journal =      j-CACM,
  volume =       "23",
  number =       "12",
  pages =        "729--729",
  month =        dec,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Apr 29 18:36:31 1999",
  note =         "This is the author's response to the comments in
                 \cite{Jaeschke:1980:CMP} about
                 \cite{Cichelli:1980:MPH}. See also
                 \cite{Sager:1985:PTG}.",
  acknowledgement = ack-nhfb,
}

@Article{McClintock:1980:TCA,
  author =       "John McClintock and Paul Klint",
  title =        "Technical Correspondence: {Algol-W} Approach to Line
                 Number Maintenance",
  journal =      j-CACM,
  volume =       "23",
  number =       "12",
  pages =        "729--729",
  month =        dec,
  year =         "1980",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 29 06:34:29 2001",
  acknowledgement = ack-nhfb,
}

@Article{Dwyer:1981:OMT,
  author =       "Barry Dwyer",
  title =        "One More Time --- How to Update a Master File",
  journal =      j-CACM,
  volume =       "24",
  number =       "1",
  pages =        "3--8",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:37:04 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Dwyer81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Dwyer81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Dwyer81",
}

@Article{Ricart:1981:OAM,
  author =       "Glenn Ricart and Ashok K. Agrawala",
  title =        "An Optimal Algorithm for Mutual Exclusion in Computer
                 Networks",
  journal =      j-CACM,
  volume =       "24",
  number =       "1",
  pages =        "9--17",
  month =        jan,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68B20",
  MRnumber =     "84c:68014",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  abstract =     "An algorithm is proposed that creates mutual exclusion
                 in a computer network whose nodes communicate only by
                 messages and do not share memory. The algorithm sends
                 only 2*(N-1) messages, where N is the number of nodes
                 in the network per critical section invocation. This
                 number of messages is at a minimum if parallel,
                 distributed, symmetric control is used; hence, the
                 algorithm is optimal in this respect. The time needed
                 to achieve mutual exclusion is also minimal under some
                 general assumptions. As in Lamport's ``bakery
                 algorithm'', unbounded sequence numbers are used to
                 provide first-come first-served priority into the
                 critical section. It is shown that the number can be
                 contained in a fixed amount of memory by storing it as
                 the residue of a modulus. The number of messages
                 required to implement the exclusion can be reduced by
                 using sequential node-by-node processing, by using
                 broadcast message techniques, or by sending information
                 through timing channels. The ``readers and writers''
                 problem is solved by a simple modification of the
                 algorithm and the modifications necessary to make the
                 algorithm robust are described.",
  acknowledgement = ack-nhfb,
}

@Article{Pritchard:1981:SAS,
  author =       "Paul Pritchard",
  title =        "A sublinear additive sieve for finding prime numbers",
  journal =      j-CACM,
  volume =       "24",
  number =       "1",
  pages =        "18--23",
  month =        jan,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "10A25 (68C25)",
  MRnumber =     "82c:10011",
  MRreviewer =   "Samuel S. {Wagstaff, Jr.}",
  bibdate =      "Mon Jan 27 12:44:40 1997",
  note =         "See corrigendum \cite{Pritchard:1981:CSA}.",
  acknowledgement = ack-nhfb,
}

@Article{Keen:1981:ISO,
  author =       "Peter G. W. Keen",
  title =        "Information Systems and Organizational Change",
  journal =      j-CACM,
  volume =       "24",
  number =       "1",
  pages =        "24--33",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:54:13 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Keen81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Keen81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Keen81",
}

@Article{Krull:1981:EIH,
  author =       "Fred N. Krull",
  title =        "Experience With {ILIAD}: {A} High-Level Process
                 Control Language",
  journal =      j-CACM,
  volume =       "24",
  number =       "2",
  pages =        "66--72",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:56:23 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Krull81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Krull81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Krull81",
}

@Article{Gauss:1981:PBC,
  author =       "E. J. Gauss",
  title =        "Pracniques: Built-In Checklist Reduces File
                 Destruction",
  journal =      j-CACM,
  volume =       "24",
  number =       "2",
  pages =        "73--??",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:43:21 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Gauss81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Gauss81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Gauss81",
}

@Article{Hoare:1981:EOC,
  author =       "Charles Anthony Richard Hoare",
  title =        "The {Emperor}'s Old Clothes",
  journal =      j-CACM,
  volume =       "24",
  number =       "2",
  pages =        "75--83",
  year =         "1981",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/358549.358561",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:50:25 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Hoare81",
  note =         "This is the 1980 ACM Turing Award Lecture, delivered
                 at ACM'80, Nashville, Tennessee, October 27, 1980.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Hoare81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Hoare81",
}

@Article{Chaum:1981:UEM,
  author =       "David Chaum",
  title =        "Untraceable Electronic Mail, Return Addresses, and
                 Digital Pseudonyms",
  journal =      j-CACM,
  volume =       "24",
  number =       "2",
  pages =        "84--88",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:30:41 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Chaum81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Chaum81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Chaum81",
}

@Article{Pitteway:1981:CBA,
  author =       "M. L. V. Pitteway and D. J. Watkinson",
  title =        "Corrigendum: {``Bresenham's algorithm with grey
                 scale''}",
  journal =      j-CACM,
  volume =       "24",
  number =       "2",
  pages =        "88--88",
  month =        feb,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 29 06:37:45 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/81.bib",
  note =         "See \cite{Pitteway:1980:BAG}.",
  acknowledgement = ack-nhfb,
  keywords =     "antialiasing; line drawing",
}

@Article{Rosenberg:1981:UIO,
  author =       "Arnold L. Rosenberg",
  title =        "On Uniformly Inserting One Data Structure into
                 Another",
  journal =      j-CACM,
  volume =       "24",
  number =       "2",
  pages =        "88--90",
  month =        feb,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68B15",
  MRnumber =     "82i:68016",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Mantai:1981:EPT,
  author =       "Marilyn M. Mantai",
  title =        "The Effect of Programming Team Structures on
                 Programming Tasks",
  journal =      j-CACM,
  volume =       "24",
  number =       "3",
  pages =        "106--113",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:01:34 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Mantai81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Mantai81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Mantai81",
}

@Article{Magel:1981:RML,
  author =       "Kenneth I. Magel and Richard H. Austing and Alfs
                 Berztiss and Gerald L. Engel and John W. Hamblen and A.
                 A. J. Hoffmann and Robert Mathis",
  title =        "Recommendations for Master's Level Programs in
                 Computer Science --- {A} Report of the {ACM} Curriculum
                 Committee on Computer Science",
  journal =      j-CACM,
  volume =       "24",
  number =       "3",
  pages =        "115--123",
  month =        mar,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:40:15 1997",
  acknowledgement = ack-nhfb,
}

@Article{Nunamaker:1981:EPI,
  author =       "Jay F. Nunamaker",
  title =        "Educational Programs in Information Systems",
  journal =      j-CACM,
  volume =       "24",
  number =       "3",
  pages =        "124--133",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:10:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Nunamaker81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Nunamaker81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Nunamaker81",
}

@Article{Minker:1981:CSW,
  author =       "Jack Minker",
  title =        "Computer Scientists Whose Scientific Freedom and Human
                 Rights Have Been Violated: {A} Report of the {ACM
                 Committee on Scientific Freedom and Human Rights}",
  journal =      j-CACM,
  volume =       "24",
  number =       "3",
  pages =        "134--139",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:04:34 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Minker81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Minker81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Minker81",
}

@Article{Andrews:1981:PPP,
  author =       "G. R. Andrews",
  title =        "Parallel Programs: Proofs, Principles, and Practice",
  journal =      j-CACM,
  volume =       "24",
  number =       "3",
  pages =        "140--146",
  month =        mar,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:39:40 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mowshowitz:1981:ASS,
  author =       "Abbe Mowshowitz",
  title =        "On Approaches to the Study of Social Issues in
                 Computing",
  journal =      j-CACM,
  volume =       "24",
  number =       "3",
  pages =        "146--155",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:06:24 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Mowshowitz81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Mowshowitz81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Mowshowitz81",
}

@Article{Nance:1981:TSR,
  author =       "Richard E. Nance",
  title =        "The time and state relationships in simulation
                 modeling",
  journal =      j-CACM,
  volume =       "24",
  number =       "4",
  pages =        "173--179",
  month =        apr,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68J10 (00A69)",
  MRnumber =     "82d:68062",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Discrete event simulation",
  enum =         "2239",
  references =   "0",
}

@Article{Oren:1981:CCA,
  author =       "Tuncer I. {\"O}ren",
  title =        "Concepts and Criteria to Access Acceptability of
                 Simulation Studies: {A} Frame of References",
  journal =      j-CACM,
  volume =       "24",
  number =       "4",
  pages =        "180--189",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:10:42 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Oren81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Oren81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Oren81",
}

@Article{Balci:1981:MCR,
  author =       "Osman Balci and Robert G. Sargent",
  title =        "A methodology for cost-risk analysis in the
                 statistical validation of simulation models",
  journal =      j-CACM,
  volume =       "24",
  number =       "4",
  pages =        "190--197",
  month =        apr,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68J10",
  MRnumber =     "82d:68061",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Chandy:1981:ADS,
  author =       "K. M. Chandy and I. Misra",
  title =        "Asynchronous Distributed Simulation via a Sequence of
                 Parallel Computations",
  journal =      j-CACM,
  volume =       "24",
  number =       "4",
  pages =        "198--206",
  month =        apr,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68J05 (68B20)",
  MRnumber =     "82d:68058",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/concordia.bib",
  acknowledgement = ack-nhfb,
}

@Article{Clark:1981:UPD,
  author =       "Gordon M. Clark",
  title =        "Use of {P\'olya} distributions in approximate
                 solutions to nonstationary ${M}/{M}/s$ queues",
  journal =      j-CACM,
  volume =       "24",
  number =       "4",
  pages =        "206--217",
  month =        apr,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68J05 (60K25 90B22)",
  MRnumber =     "82e:68103",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Continuous simulation; waiting time; M/M/N; queueing
                 approximation; traffic theory",
  enum =         "592",
  references =   "14",
}

@Article{Schriber:1981:CFR,
  author =       "T. J. Schriber and R. W. Andrews",
  title =        "A conceptual framework for research in the analysis of
                 simulation output",
  journal =      j-CACM,
  volume =       "24",
  number =       "4",
  pages =        "218--232",
  month =        apr,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Simulation; statistical technique",
  enum =         "7859",
  location =     "SEL: Wi",
  references =   "0",
  revision =     "16/01/94",
}

@Article{Heidelberger:1981:SMC,
  author =       "Philip Heidelberger and Peter D. Welch",
  title =        "A spectral method for confidence interval generation
                 and run length control in simulations",
  journal =      j-CACM,
  volume =       "24",
  number =       "4",
  pages =        "233--245",
  month =        apr,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68J05",
  MRnumber =     "82d:68059",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Schruben:1981:CIB,
  author =       "Lee W. Schruben",
  title =        "Control of initialization bias in multivariate
                 simulation response",
  journal =      j-CACM,
  volume =       "24",
  number =       "4",
  pages =        "246--252",
  month =        apr,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68J05",
  MRnumber =     "82d:68060",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Simulation; statistical technique",
  enum =         "7862",
  location =     "SEL: Wi",
  references =   "0",
  revision =     "16/01/94",
}

@Article{Donnelly:1981:MMS,
  author =       "J. H. Donnelly and R. E. Shannon",
  title =        "Minimum mean-squared-error estimators for simulation
                 experiments",
  journal =      j-CACM,
  volume =       "24",
  number =       "4",
  pages =        "253--259",
  month =        apr,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:39:46 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Simulation; statistical technique",
  enum =         "7228",
  references =   "0",
}

@Article{Heidelberger:1981:RAE,
  author =       "P. Heidelberger and P. A. W. Lewis",
  title =        "Regression-adjusted estimates for regenerative
                 simulations, with graphics",
  journal =      j-CACM,
  volume =       "24",
  number =       "4",
  pages =        "260--273",
  month =        apr,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 23:15:15 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib",
  acknowledgement = ack-nhfb,
  annote =       "This paper discusses a method for placing confidence
                 limits on the steady state mean of an output sequence
                 generated by a discrete event simulation. An estimate
                 of the variance is obtained by estimating the spectral
                 density at zero frequency. This estimation is
                 accomplished through a regression analysis of the
                 logarithm of the averaged periodogram. By batching the
                 output sequence the storage and computational
                 requirements of the method remain \ldots{}.",
  descriptors =  "Simulation; confidence interval; spectral analysis;
                 application; method; runtime/storage efficiency;
                 variance; variance estimation",
}

@Article{Litecky:1981:EAR,
  author =       "Charles R. Litecky and Larry E. Rittenberg",
  title =        "The External Auditor's Review of Computer Controls",
  journal =      j-CACM,
  volume =       "24",
  number =       "5",
  pages =        "288--295",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:59:26 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#LiteckyR81",
  acknowledgement = ack-nhfb,
  oldlabel =     "LiteckyR81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/LiteckyR81",
}

@Article{Robinson:1981:ASC,
  author =       "P. J. Robinson and Dave Singer",
  title =        "Another Spelling Correction Program",
  journal =      j-CACM,
  volume =       "24",
  number =       "5",
  pages =        "296--297",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:16:39 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#RobinsonS81",
  acknowledgement = ack-nhfb,
  oldlabel =     "RobinsonS81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/RobinsonS81",
}

@Article{Nix:1981:ESE,
  author =       "Robert P. Nix",
  title =        "Experiments With a Space Efficient Way to Store a
                 Dictionary",
  journal =      j-CACM,
  volume =       "24",
  number =       "5",
  pages =        "297--298",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:09:42 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Nix81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Nix81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Nix81",
}

@Article{Inglis:1981:PUM,
  author =       "J. Inglis",
  title =        "Pracniques: Updating {A} Master File --- Yet One More
                 Time",
  journal =      j-CACM,
  volume =       "24",
  number =       "5",
  pages =        "299--??",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:51:50 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Inglis81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Inglis81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Inglis81",
}

@Article{Preparata:1981:CCC,
  author =       "Franco P. Preparata and Jean Vuillemin",
  title =        "The Cube-Connected Cycles: {A} Versatile Network for
                 Parallel Computation",
  journal =      j-CACM,
  volume =       "24",
  number =       "5",
  pages =        "300--309",
  month =        may,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68B20",
  MRnumber =     "82d:68018",
  bibdate =      "Mon Feb 12 14:34:32 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/conc.scientific.computing.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ballard:1981:STH,
  author =       "Dana H. Ballard",
  title =        "Strip Trees, a Hierarchical Representation for
                 Curves",
  journal =      j-CACM,
  volume =       "24",
  number =       "5",
  pages =        "310--321",
  month =        may,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:39:40 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/graphics.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib
                 and ftp://ftp.ira.uka.de/pub/siggraph/81.bib",
  acknowledgement = ack-nhfb,
  annote =       "The use of curves to represent two-dimensional
                 structures is an important part of many scientific
                 investigations. \ldots{} Because of the very large
                 amount of data involved and the need to perform
                 operations on this data efficiently, the representation
                 of such curves is a crucial issue. A hierarchical
                 representation consisting of binary trees with a
                 special datum at each node is described. This datum is
                 called a strip and the tree that contains such
                 \ldots{}.",
  comment =      "Ballard uses two dimensional extents in a hierarchy to
                 define a two dimensional curve at varying resolution.
                 Algorithms are presented to determine intersection of
                 two strip trees, inside-outside tests etc\ldots{}",
  descriptors =  "method; graphics; two-dimensional plot; information
                 system; data structure",
  keywords =     "curves; intersection; strip trees",
}

@Article{Crockett:1981:TP,
  author =       "Dan W. Crockett",
  title =        "Triform Programs",
  journal =      j-CACM,
  volume =       "24",
  number =       "6",
  pages =        "344--350",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:34:04 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Crockett81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Crockett81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Crockett81",
}

@Article{Traub:1981:QVC,
  author =       "Joseph Traub",
  title =        "Quo Vadimus: Computer Science in a Decade",
  journal =      j-CACM,
  volume =       "24",
  number =       "6",
  pages =        "351--369",
  month =        jun,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:42:19 1997",
  acknowledgement = ack-nhfb,
}

@Article{Denning:1981:SRD,
  author =       "Peter J. Denning and Edward A. Feigenbaum and Paul
                 Gilmore and Anthony C. Hearn and Robert W. Ritchie and
                 Joseph F. Traub",
  title =        "The {Snowbird} Report: {A} Discipline in Crisis",
  journal =      j-CACM,
  volume =       "24",
  number =       "6",
  pages =        "370--374",
  month =        jun,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:29 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#DenningFGHRT81",
  acknowledgement = ack-nhfb,
  oldlabel =     "DenningFGHRT81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DenningFGHRT81",
}

@Article{Lee:1981:RFT,
  author =       "John A. N. Lee",
  title =        "Response to the {Federal Trade Commission}'s Proposed
                 Ruling on Standards and Certification",
  journal =      j-CACM,
  volume =       "24",
  number =       "6",
  pages =        "375--380",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:58:15 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Lee81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Lee81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Lee81",
}

@Article{Fischler:1981:RSC,
  author =       "Martin A. Fischler and Robert C. Bolles",
  title =        "Random sample consensus: a paradigm for model fitting
                 with applications to image analysis and automated
                 cartography",
  journal =      j-CACM,
  volume =       "24",
  number =       "6",
  pages =        "381--395",
  month =        jun,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68G10 (51-04 86A30)",
  MRnumber =     "82f:68091",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Stonebraker:1981:OSS,
  author =       "M. Stonebraker",
  title =        "Operating System Support for Database Management",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "412--418",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 23:21:48 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib",
  note =         "Reprinted in M. Stonebraker, Readings in Database
                 Sys., Morgan Kaufmann, San Mateo, CA, 1988",
  abstract =     "Several operating system services are examined with a
                 view toward their applicability to support of database
                 management functions. These services include buffer
                 pool management; the file system; scheduling, process
                 management, and interprocess communication; and
                 consistency control.",
  acknowledgement = ack-nhfb,
  keywords =     "process control storage structures buffer Halloween
                 problem CACM",
}

@Article{Ralston:1981:PNC,
  author =       "Anthony Ralston",
  title =        "The Proposed New {Computing Reviews} Classification
                 Scheme, {A} Report of the {Computing Reviews Category
                 Revision Committee}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "419--433",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:14:46 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Ralston81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Ralston81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Ralston81",
}

@Article{Denning:1981:SRR,
  author =       "Peter J. Denning and David H. Brandin",
  title =        "Special Report: Report of the {Public Cryptography
                 Study Group}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "434--434",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:07 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Denning81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Denning81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Denning81",
}

@Article{Baum:1981:RPC,
  author =       "Werner A. Baum and David H. Brandin and R. Creighton
                 Buck and George I. Davida and George Handelman and
                 Martin E. Hellman and Ira Michael Heyman and Wilfred
                 Kaplan and Daniel C. Schwartz",
  title =        "Report of the {Public Cryptography Study Group},
                 prepared for {American Council on Education, One Dupont
                 Circle, Washington, DC 20036, February 7, 1981}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "435--445",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Jan 28 14:37:22 1997",
  note =         "See the opposing view in \cite{Davida:1981:CAR}.",
  acknowledgement = ack-nhfb,
}

@Article{Davida:1981:CAR,
  author =       "George I. Davida",
  title =        "The Case Against Restraints on Non-Governmental
                 Research in Cryptography",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "445--450",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Jan 28 14:39:33 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  note =         "This is an opposing view published with
                 \cite{Baum:1981:RPC}.",
  acknowledgement = ack-nhfb,
}

@Article{Greenberg:1981:RSS,
  author =       "Harvey J. Greenberg and Richard P. O'Neill",
  title =        "Representing super-sparse matrices with perturbed
                 values",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "451--456",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68C05 (90C05)",
  MRnumber =     "82f:68033",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Billard:1981:PMA,
  author =       "Brian Billard",
  title =        "Polynomial manipulation with {APL}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "457--465",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68C20 (03B35)",
  MRnumber =     "82f:68042",
  bibdate =      "Tue Dec 26 18:50:57 1995",
  note =         "See corrigendum \cite{Billard:1982:CPM}.",
  acknowledgement = ack-nhfb,
}

@Article{Merkle:1981:SME,
  author =       "Ralph C. Merkle and Martin E. Hellman",
  title =        "On the security of multiple encryption",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "465--467",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68K05 (94A24 94B99)",
  MRnumber =     "82f:68103",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib",
  acknowledgement = ack-nhfb,
}

@Article{Demers:1981:SDU,
  author =       "Richard A. Demers",
  title =        "System Design for Usability",
  journal =      j-CACM,
  volume =       "24",
  number =       "8",
  pages =        "494--501",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:02 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Demers81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Demers81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Demers81",
}

@Article{Ash:1981:MPP,
  author =       "William L. Ash",
  title =        "{Mxec}: Parallel Processing with an Advanced Macro
                 Facility",
  journal =      j-CACM,
  volume =       "24",
  number =       "8",
  pages =        "502--509",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:22:07 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Ash81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Ash81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Ash81",
}

@Article{Mayer:1981:PCL,
  author =       "Richard E. Mayer and Piraye Bayman",
  title =        "Psychology of Calculator Languages: {A} Framework for
                 Describing Differences in Users' Knowledge",
  journal =      j-CACM,
  volume =       "24",
  number =       "8",
  pages =        "511--520",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:02:20 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#MayerB81",
  acknowledgement = ack-nhfb,
  oldlabel =     "MayerB81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/MayerB81",
}

@Article{Smith:1981:LTF,
  author =       "Alan Jay Smith",
  title =        "Long-Term File Migration: Development and Evaluation
                 of Algorithms",
  journal =      j-CACM,
  volume =       "24",
  number =       "8",
  pages =        "521--532",
  month =        aug,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:48:33 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
}

@Article{Denning:1981:TKD,
  author =       "D. E. Denning and M. S. Sacco",
  title =        "Timestamps in Key Distribution Protocols",
  journal =      j-CACM,
  volume =       "24",
  number =       "8",
  pages =        "533--536",
  month =        aug,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib",
  acknowledgement = ack-nhfb,
}

@Article{Denning:1981:CAS,
  author =       "P. J. Denning",
  title =        "Computer Architecture: Some Old Ideas that Haven'{T}
                 Quite Made It Yet",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "553--554",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:39:44 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/risc.bib",
  acknowledgement = ack-nhfb,
  keywords =     "RISC",
}

@Article{Dwyer:1981:UFA,
  author =       "Barry Dwyer",
  title =        "A User-Friendly Algorithm",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "556--561",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:37:05 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Dwyer81a",
  acknowledgement = ack-nhfb,
  oldlabel =     "Dwyer81a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Dwyer81a",
}

@Article{Teitelbaum:1981:CPS,
  author =       "Tim Teitelbaum and Thomas Reps",
  title =        "The {Cornell Program Synthesizer}: a Syntax-directed
                 Programming Environment",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "563--573",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:34:33 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/AG.bib",
  note =         "See also: Report TR 80-421, Department of Computer
                 Science, Cornell University, Ithaca, NY (May 1980).",
  acknowledgement = ack-nhfb,
  keywords =     "CPS",
}

@Article{ORourke:1981:LAF,
  author =       "J. O'Rourke",
  title =        "An on-line algorithm for fitting straight lines
                 between data ranges",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "574--578",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:44:24 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/81.bib",
  acknowledgement = ack-nhfb,
  keywords =     "stabbing",
}

@Article{Quittner:1981:CSH,
  author =       "P. Quittner and S. Csoka and S. Halasz and D. Kotsis
                 and K. Varnai",
  title =        "Comparison of Synonym Handling and Bucket Organization
                 Methods",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "579--582",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Sep 22 11:37:23 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  abstract =     "A theoretical description of the access times required
                 in open addressing and external chaining is given.
                 Values are calculated for different record and bucket
                 sizes and load factors, and the corresponding values
                 for the two methods are compared. Practical guidelines
                 for determining bucket sizes and load factors are
                 presented. It is proved that open addressing is almost
                 always superior to external chaining and the optimal
                 bucket size is between 1 and 4.",
  acknowledgement = ack-nhfb,
}

@Article{McEliece:1981:SSR,
  author =       "R. J. McEliece and D. V. Sarwate",
  title =        "On sharing secrets and {Reed--Solomon} codes",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "583--584",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "94B35",
  MRnumber =     "82h:94024",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Fedorowicz:1981:CPP,
  author =       "Jane Fedorowicz",
  title =        "Comments on Price\slash Performance Patterns of {U.S.}
                 Computer Systems",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "585--586",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:39:00 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Fedorowicz81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Fedorowicz81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Fedorowicz81",
}

@Article{Kaiser:1981:AEA,
  author =       "Gail E. Kaiser",
  title =        "Automatic Extension of an {ATN} Knowledge Base",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "587--593",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:53:30 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Kaiser81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Kaiser81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Kaiser81",
}

@Article{Rothe:1981:APM,
  author =       "Christopher E. Rothe",
  title =        "An Abstract Programming Model",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "594--596",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:17:23 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Rothe81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Rothe81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Rothe81",
}

@Article{Gischer:1981:SLP,
  author =       "Jay Gischer",
  title =        "Shuffle Languages, {Petri} Nets, and Context-Sensitive
                 Grammars",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "597--605",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68F05 (68D90 68F10)",
  MRnumber =     "82h:68102",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Dunlavey:1981:LES,
  author =       "Michael R. Dunlavey",
  title =        "Letter to the Editor: On Spelling Correction and
                 Beyond",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "608--608",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Feb 04 16:48:13 1996",
  note =         "See
                 \cite{Peterson:1980:CPD,Miller:1981:LES,Peterson:1981:LES}.",
  acknowledgement = ack-nhfb,
}

@Article{Miller:1981:LES,
  author =       "Lance A. Miller",
  title =        "Letter to the Editor: On Spelling Correction and
                 Beyond",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "608--609",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Feb 04 16:49:22 1996",
  note =         "See
                 \cite{Peterson:1980:CPD,Dunlavey:1981:LES,Peterson:1981:LES}.",
  acknowledgement = ack-nhfb,
}

@Article{Peterson:1981:LES,
  author =       "James L. Peterson",
  title =        "Letter to the Editor: On Spelling Correction and
                 Beyond",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "609--609",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Feb 04 16:49:21 1996",
  note =         "See
                 \cite{Peterson:1980:CPD,Dunlavey:1981:LES,Miller:1981:LES}.",
  acknowledgement = ack-nhfb,
}

@Article{Chamberlin:1981:HES,
  author =       "Donald D. Chamberlin and Morton M. Astrahan and
                 Michael W. Blasgen and James N. Gray and W. Frank King
                 and Bruce G. Lindsay and Raymod Lorie and James W. Mehl
                 and Thomas G. Price and Franco Putzolo and Patricia
                 Griffiths Selinger and Mario Schkolnick and Donald R.
                 Slutz and Irving L. Traiger and Bradford W. Wade and
                 Robert A. Yost",
  title =        "A History and Evaluation of {System R}",
  journal =      j-CACM,
  volume =       "24",
  number =       "10",
  pages =        "632--646",
  month =        oct,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Jan 9 16:15:02 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  note =         "Reprinted in M. Stonebraker, Readings in Database
                 Sys., Morgan Kaufmann, San Mateo, CA, 1988",
  acknowledgement = ack-nhfb,
  keywords =     "relation database IBM San Jose CACM",
}

@Article{Wegner:1981:SAP,
  author =       "Peter Wegner",
  title =        "Self-Assessment Procedure {VIII}: {A} Self-Assessment
                 Procedure Dealing with the Programming Language {Ada}",
  journal =      j-CACM,
  volume =       "24",
  number =       "10",
  pages =        "647--678",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:28:42 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Wegner81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Wegner81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Wegner81",
}

@Article{Robey:1981:CIS,
  author =       "Daniel Robey",
  title =        "Computer Information Systems and Organization
                 Structure",
  journal =      j-CACM,
  volume =       "24",
  number =       "10",
  pages =        "679--687",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:16:32 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Robey81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Robey81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Robey81",
}

@Article{Denning:1981:LCS,
  author =       "Peter J. Denning and T. Don Dennis and Jeffrey A.
                 Brumfield",
  title =        "Low Contention Semaphores and Ready Lists",
  journal =      j-CACM,
  volume =       "24",
  number =       "10",
  pages =        "687--699",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:27 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#DenningDb81",
  acknowledgement = ack-nhfb,
  oldlabel =     "DenningDb81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DenningDb81",
}

@Article{Patterson:1981:EHL,
  author =       "David A. Patterson",
  title =        "An Experiment in High Level Language Microprogramming
                 and Verification",
  journal =      j-CACM,
  volume =       "24",
  number =       "10",
  pages =        "699--709",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:11:39 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Patterson81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Patterson81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Patterson81",
}

@Article{Denning:1981:PAE,
  author =       "P. Denning",
  title =        "Performance Analysis: Experimental computer science at
                 its best",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "725--727",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/monitor.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gass:1981:DMH,
  author =       "Saul I. Gass and Karla L. Hoffman and Richard H. F.
                 Jackson and Lambert S. Joel and Patsy B. Saunders",
  title =        "Documentation for a Model: {A} Hierarchical Approach",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "728--733",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:43:19 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#GassHJJS81",
  acknowledgement = ack-nhfb,
  oldlabel =     "GassHJJS81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/GassHJJS81",
}

@Article{Pechura:1981:MRN,
  author =       "M. A. Pechura",
  title =        "Microcomputers as remote nodes of a distributed
                 system",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "734--738",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "H.4 Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Communications Applications \\ H.3.2
                 Information Systems, INFORMATION STORAGE AND RETRIEVAL,
                 Information Storage, File organization \\ D.4.7
                 Software, OPERATING SYSTEMS, Organization and Design,
                 Distributed systems \\ C.3 Computer Systems
                 Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
                 SYSTEMS, Microprocessor/Microcomputer applications \\
                 C.2 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems",
}

@Article{Hiltz:1981:EUB,
  author =       "Starr Roxanne Hiltz and Murray Turoff",
  title =        "The Evolution of User Behavior in a Computerized
                 Conference System",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "739--751",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  subject =      "H.1.2 Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human factors \\ H.4.3
                 Information Systems, INFORMATION SYSTEMS APPLICATIONS,
                 Communications Applications, Electronic mail \\ C.2.0
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, General, Data communications",
}

@Article{Benbasat:1981:ESH,
  author =       "Izak Benbasat and Albert S. Dexter and Paul S.
                 Masulis",
  title =        "An Experimental Study of the Human\slash Computer
                 Interface",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "752--762",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:45 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#BenbasatDM81",
  acknowledgement = ack-nhfb,
  oldlabel =     "BenbasatDM81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/BenbasatDM81",
}

@Article{Lientz:1981:PAS,
  author =       "Bennet P. Lientz and E. Burton Swanson",
  title =        "Problems in Application Software Maintenance",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "763--769",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:59:03 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#LientzS81",
  acknowledgement = ack-nhfb,
  oldlabel =     "LientzS81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/LientzS81",
}

@Article{Lamport:1981:TNP,
  author =       "Leslie Lamport",
  title =        "Technical Note: Password Authentication with Insecure
                 Communication",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "770--772",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:57:19 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Lamport81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Lamport81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Lamport81",
}

@Article{Pritchard:1981:CSA,
  author =       "Paul Pritchard",
  title =        "Corrigendum: {``A sublinear additive sieve for finding
                 prime numbers''}",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "772--772",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "10A25 (68C25)",
  MRnumber =     "82c:10011",
  MRreviewer =   "Samuel S. {Wagstaff, Jr.}",
  bibdate =      "Mon Jan 27 12:44:36 1997",
  note =         "See \cite{Pritchard:1981:SAS}.",
  acknowledgement = ack-nhfb,
}

@Article{Booth:1981:ASU,
  author =       "K. S. Booth",
  title =        "Authentication of Signatures Using Public Key
                 Encryption",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "772--774",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Sep 22 11:36:41 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  abstract =     "One of Needham and Schroeder's proposed signature
                 authentication protocols is shown to fail when there is
                 a possibility of compromised keys: this invalidates one
                 of the applications of their technique. A more
                 elaborate mechanism is proposed which does not require
                 a network clock, but does require a third party to the
                 transaction. The latter approach is shown to be
                 reliable in a fairly strong sence.",
  acknowledgement = ack-nhfb,
}

@Article{Bass:1981:GUI,
  author =       "Leonard J. Bass and Ralph E. Bunker",
  title =        "A Generalized User Interface for Applications
                 Programs",
  journal =      j-CACM,
  volume =       "24",
  number =       "12",
  pages =        "796--800",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:23:48 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#BassB81",
  acknowledgement = ack-nhfb,
  oldlabel =     "BassB81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/BassB81",
}

@Article{McCormack:1981:AFE,
  author =       "William M. McCormack and Robert G. Sargent",
  title =        "Analysis of future event set algorithms for discrete
                 event simulation",
  journal =      j-CACM,
  volume =       "24",
  number =       "12",
  pages =        "801--812",
  month =        dec,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68J05",
  MRnumber =     "83f:68114",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Simulation; future event set",
  enum =         "2100",
  references =   "0",
}

@Article{Galle:1981:AEG,
  author =       "Per Galle",
  title =        "An Algorithm for Exhaustive Generation of Building
                 Floor Plans",
  journal =      j-CACM,
  volume =       "24",
  number =       "12",
  pages =        "813--825",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:43:02 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Galle81",
  acknowledgement = ack-nhfb,
  oldlabel =     "Galle81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Galle81",
}

@Article{Blackstone:1981:TLS,
  author =       "John H. {Blackstone, Jr.} and Gary L. Hogg and Don T.
                 Phillips",
  title =        "A two-list synchronisation procedure for discrete
                 event simulation",
  journal =      j-CACM,
  volume =       "24",
  number =       "12",
  pages =        "825--829",
  month =        dec,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:45:15 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Simulation; time control; synchronization",
  enum =         "306",
  references =   "0",
}

@Article{Jaeschke:1981:RHM,
  author =       "G. Jaeschke",
  title =        "Reciprocal Hashing: {A} Method for Generating Minimal
                 Perfect Hashing Functions",
  journal =      j-CACM,
  volume =       "24",
  number =       "12",
  pages =        "829--833",
  month =        dec,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68B15",
  MRnumber =     "83f:68013",
  bibdate =      "Mon Feb 12 14:34:32 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib",
  note =         "Hash functions, for a key $x$ in a set $S$ of positive
                 integers, of the form $h(x) = (C/(Dx + E)) \bmod N$ are
                 considered. Though the existence of $h$ is guaranteed,
                 the scheme suffers from many practical problems because
                 of exhaustive nature of the search for $h$.",
  acknowledgement = ack-nhfb,
}

@Article{Briggs:1981:PCB,
  author =       "F. A. Briggs and M. Dubois",
  title =        "Performance of cache-based multiprocessors",
  journal =      j-CACM,
  volume =       "24",
  number =       "??",
  pages =        "181--190",
  month =        "????",
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:44:26 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1981.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Multiprocessor system; cache memory; performance
                 evaluation",
  enum =         "401",
  references =   "0",
  xxnote =       "Not in 1979--1982 volumes, or in ACM Computing Archive
                 CD ROM.",
}

@Article{Gustafson:1982:SPE,
  author =       "G. G. Gustafson and Roberta J. Kerr",
  title =        "Some Practical Experience with a Software Quality
                 Assurance Program",
  journal =      j-CACM,
  volume =       "25",
  number =       "1",
  pages =        "4--12",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:47:35 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#GustafsonK82",
  acknowledgement = ack-nhfb,
  oldlabel =     "GustafsonK82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/GustafsonK82",
}

@Article{Sammet:1982:NCR,
  author =       "Jean E. Sammet and Anthony Ralston",
  title =        "The New (1982) {Computing Reviews} Classification
                 System --- Final Version",
  journal =      j-CACM,
  volume =       "25",
  number =       "1",
  pages =        "13--25",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:18:25 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#SammetR82",
  acknowledgement = ack-nhfb,
  oldlabel =     "SammetR82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SammetR82",
}

@Article{Robinson:1982:DGD,
  author =       "Jane J. Robinson",
  title =        "{DIAGRAM}: {A} Grammar for Dialogues",
  journal =      j-CACM,
  volume =       "25",
  number =       "1",
  pages =        "27--47",
  month =        jan,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:34:33 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nlg.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ahrens:1982:GGV,
  author =       "J. H. Ahrens and U. Dieter",
  title =        "Generating {Gamma} variates by a modified rejection
                 technique",
  journal =      j-CACM,
  volume =       "25",
  number =       "1",
  pages =        "47--54",
  month =        jan,
  year =         "1982",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/360000/358390",
  ISSN =         "0001-0782",
  MRclass =      "65U05 (65C10)",
  MRnumber =     "83f:65223",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1982.bib",
  acknowledgement = ack-nhfb,
  annote =       "A suitable square root transformation of a gamma
                 random variable with mean $a \ge 1$ yields a
                 probability density close to the standard normal
                 density. A modification of the rejection technique then
                 begins by sampling from the normal distribution, being
                 able to accept and transform the initial normal
                 observation quickly at least 85 percent of the time (95
                 percent if $a \ge 4$). When used with efficient
                 subroutines for sampling from the normal and
                 exponential distributions, the resulting accurate
                 method is significantly faster than competing
                 algorithms.",
  country =      "USA",
  descriptors =  "RNG; probability; statistics; distribution; gamma
                 distribution; Poisson distribution; variance; normal
                 distribution",
  enum =         "49",
  references =   "24",
}

@Article{Shneiderman:1982:CFD,
  author =       "Ben Shneiderman",
  title =        "Control Flow and Data Structure Documentation: Two
                 Experiments",
  journal =      j-CACM,
  volume =       "25",
  number =       "1",
  pages =        "55--63",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:21:12 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Shneiderman82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Shneiderman82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Shneiderman82",
}

@Article{Bentley:1982:AAC,
  author =       "Jon Louis Bentley and Mark G. Faust and Franco P.
                 Preparata",
  title =        "Approximation algorithms for convex hulls",
  journal =      j-CACM,
  volume =       "25",
  number =       "1",
  pages =        "64--68",
  month =        jan,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "52-0468G99",
  MRnumber =     "83m:52001",
  MRreviewer =   "V. Medek",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/82.bib",
  acknowledgement = ack-nhfb,
  annote =       "$O(n)$ time",
  keywords =     "approximation; convex hull; designing algorithms;
                 two-dimensional; worst-case analysis",
}

@Article{Mozeico:1982:HCI,
  author =       "Howard Mozeico",
  title =        "A Human\slash Computer Interface to Accommodate User
                 Learning Stages",
  journal =      j-CACM,
  volume =       "25",
  number =       "2",
  pages =        "100--104",
  month =        feb,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:06:28 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.82.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Mozeico82",
  acknowledgement = ack-nhfb,
  keywords =     "I36 human/computer interface",
  oldlabel =     "Mozeico82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Mozeico82",
}

@Article{Welsch:1982:UEM,
  author =       "L. A. Welsch",
  title =        "Using electronic mail as a teaching tool",
  journal =      j-CACM,
  volume =       "25",
  number =       "2",
  pages =        "105--108",
  month =        feb,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "documentation; human factors",
  subject =      "H.4.3 Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Communications Applications, Electronic
                 mail \\ I.7 Computing Methodologies, TEXT PROCESSING,
                 Text Editing \\ K.3 Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer Uses in Education",
}

@Article{Codd:1982:RDP,
  author =       "E. F. Codd",
  title =        "Relational Database: {A} Practical Foundation for
                 Productivity",
  journal =      j-CACM,
  volume =       "25",
  number =       "2",
  pages =        "109--117",
  month =        feb,
  year =         "1982",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/358396.358400",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:34:33 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  annote =       "This is the 1981 ACM Turing Award Lecture, delivered
                 at ACM, Los Angeles, CA, Nov. 9, 1981.",
}

@Article{Skelly:1982:APS,
  author =       "Patrick G. Skelly",
  title =        "The {ACM} Position on Standardization of the {Ada}
                 Language",
  journal =      j-CACM,
  volume =       "25",
  number =       "2",
  pages =        "118--120",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:22:16 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Skelly82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Skelly82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Skelly82",
}

@Article{Ledgard:1982:SAT,
  author =       "Henry F. Ledgard and Andrew Singer",
  title =        "Scaling Down {Ada} (Or Towards a {Standard Ada
                 Subset})",
  journal =      j-CACM,
  volume =       "25",
  number =       "2",
  pages =        "121--125",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:58:10 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#LedgardS82",
  acknowledgement = ack-nhfb,
  oldlabel =     "LedgardS82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/LedgardS82",
}

@Article{Chandy:1982:LHA,
  author =       "K. M. Chandy and D. Neuse",
  title =        "Linearizer: a heuristic algorithm for queueing network
                 models of computing systems",
  journal =      j-CACM,
  volume =       "25",
  number =       "2",
  pages =        "126--134",
  month =        feb,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 23:28:05 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  acknowledgement = ack-nhfb,
  descriptors =  "Queueing network; product form; analysis",
}

@Article{Zahorjan:1982:BJB,
  author =       "John Zahorjan and Kenneth C. Sevcik and Derek L. Eager
                 and Bruce Galler",
  title =        "Balanced job bound analysis of queueing networks",
  journal =      j-CACM,
  volume =       "25",
  number =       "2",
  pages =        "134--141",
  month =        feb,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68C15 (90B22)",
  MRnumber =     "83a:68042",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1982.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Queueing network; product form; analysis",
  enum =         "8057",
  references =   "0",
}

@Article{Jacobson:1982:AQN,
  author =       "P. A. Jacobson and E. D. Lazowska",
  title =        "Analyzing queueing networks with simultaneous resource
                 possession",
  journal =      j-CACM,
  volume =       "25",
  number =       "2",
  pages =        "142--151",
  month =        feb,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:39:57 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1982.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Queueing network; analysis",
  enum =         "7434",
  references =   "0",
}

@Article{Denning:1982:EJ,
  author =       "Peter J. Denning",
  title =        "Electronic Junk",
  journal =      j-CACM,
  volume =       "25",
  number =       "3",
  pages =        "163--165",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:08 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Denning82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Denning82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Denning82",
}

@Article{Shoch:1982:CPW,
  author =       "John F. Shoch and Jon A. Hupp",
  title =        "Computing Practices: The `Worm' Programs --- Early
                 Experience with a Distributed Computation",
  journal =      j-CACM,
  volume =       "25",
  number =       "3",
  pages =        "172--180",
  month =        mar,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:21:22 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/alife.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.object.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#ShochH82",
  abstract =     "The ``worm'' programs were an experiment in the
                 development of distributed computations: programs that
                 span machine boundaries and also replicate themselves
                 in idle machines. A ``worm'' is composed of multiple
                 ``segments'', each running on a different machine. The
                 underlying worm maintenance mechanisms are responsible
                 for maintaining the worm -- finding free machines when
                 needed and replicating the program for each additional
                 segment. These techniques were successfully used to
                 support several real applications, ranging from a
                 simple multimachine test program to a more
                 sophisticated real-time animation system harnessing
                 multiple machines.",
  acknowledgement = ack-nhfb,
  keywords =     "obc olit distribution worms",
  oldlabel =     "ShochH82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/ShochH82",
}

@Article{Weiss:1982:SAP,
  author =       "Eric A. Weiss",
  title =        "Self-Assessment Procedure {IX}: a self-assessment
                 procedure dealing with ethics in computing",
  journal =      j-CACM,
  volume =       "25",
  number =       "3",
  pages =        "181--195",
  month =        mar,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:52:43 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "ACM code of ethics, scenarios, references.",
}

@Article{Wasserman:1982:FP,
  author =       "Anthony I. Wasserman and Steven Gutz",
  title =        "The Future of Programming",
  journal =      j-CACM,
  volume =       "25",
  number =       "3",
  pages =        "196--206",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:28:23 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#WassermanG82",
  acknowledgement = ack-nhfb,
  oldlabel =     "WassermanG82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/WassermanG82",
}

@Article{McCall:1982:PRS,
  author =       "Edward H. McCall",
  title =        "Performance Results of the Simplex Algorithm for a Set
                 of Real-World Linear Programming Models",
  journal =      j-CACM,
  volume =       "25",
  number =       "3",
  pages =        "207--212",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:02:24 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#McCall82",
  acknowledgement = ack-nhfb,
  oldlabel =     "McCall82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/McCall82",
}

@Article{Billard:1982:CPM,
  author =       "Brian Billard",
  title =        "Corrigendum: {``Polynomial manipulation with
                 {APL}''}",
  journal =      j-CACM,
  volume =       "25",
  number =       "3",
  pages =        "213--213",
  month =        mar,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68C20 03B35",
  MRnumber =     "83g:68054",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  note =         "See \cite{Billard:1981:PMA}.",
  acknowledgement = ack-nhfb,
}

@Article{Watkins:1982:TTC,
  author =       "Marvin L. Watkins",
  title =        "A Technique for Testing Command and Control Software",
  journal =      j-CACM,
  volume =       "25",
  number =       "4",
  pages =        "228--232",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:28:28 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Watkins82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Watkins82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Watkins82",
}

@Article{Mitchell:1982:CTN,
  author =       "James G. Mitchell and Jeremy Dion",
  title =        "A Comparison of Two Network-Based File Servers",
  journal =      j-CACM,
  volume =       "25",
  number =       "4",
  pages =        "233--245",
  month =        apr,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 23:36:34 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/network.bib",
  abstract =     "This paper compares two working network-based file
                 servers, Xerox Distributed File System (XDFS)
                 implemented at the Xerox Palo Alto Research Center, and
                 the Cambridge File Server (CFS) implemented at the
                 Cambridge University Computer Laboratory. Both servers
                 support concurrent random access to files using atomic
                 transactions, both are connected to local area
                 networks, and both have been in service long enough to
                 enable us to draw lessons from them for future file
                 servers. We compare the servers in terms of design
                 goals, implementation issues, performance, and their
                 relative successes and failures, and discuss what we
                 would do differently next time.",
  acknowledgement = ack-nhfb,
  keywords =     "CACM operating XDFS CFS Cambridge lans",
}

@Article{Spector:1982:PRO,
  author =       "Alfred Z. Spector",
  title =        "Performing remote operations efficiently on a local
                 computer network",
  journal =      j-CACM,
  volume =       "25",
  number =       "4",
  pages =        "246--260",
  month =        apr,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:52:38 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib",
  abstract =     "A communication model is described that can service as
                 a basis for a highly efficient communication subsystem
                 for local networks. The model contains a taxonomy of
                 communication instructions that can be implemented
                 efficiently and can be a good basis for interprocessor
                 communication. These communication instructions, called
                 remote references, cause an operation to be performed
                 by a remote process and, optionally, cause a value to
                 be returned. This paper also presents implementation
                 considerations for a communication system based upon
                 the model and describes an experimental communication
                 subsystem that provides one class of remote references.
                 These remote references take about 150 microseconds or
                 50 average instruction times to perform on Xerox Alto
                 computers connected by a 2.94 megabit Ethernet.",
  acknowledgement = ack-nhfb,
  keywords =     "performance; reliability",
  review =       "ACM CR 39236",
  subject =      "C.2.2 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol architecture \\ C.2.4 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Network operating systems \\ C.2.5
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Local Networks, Access schemes \\ D.4.4
                 Software, OPERATING SYSTEMS, Communications Management,
                 Message sending \\ D.4.4 Software, OPERATING SYSTEMS,
                 Communications Management, Network communication \\
                 D.4.7 Software, OPERATING SYSTEMS, Organization and
                 Design, Distributed systems",
}

@Article{Birrell:1982:GED,
  author =       "Andrew D. Birrell and Roy Levin and Roger M. Needham
                 and Michael D. Schroeder",
  title =        "{Grapevine}: an exercise in distributed computing",
  journal =      j-CACM,
  volume =       "25",
  number =       "4",
  pages =        "260--274",
  month =        apr,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib",
  abstract =     "Grapevine is a multicomputer system on the Xerox
                 Research Internet. It provides facilities for the
                 delivery of digital messages such as computer mail; for
                 naming people, machines, and services; for
                 authenticating people and machines; and for locating
                 services on the internet. This paper has two goals: to
                 describe the system itself and to serve as a case study
                 of a real application of distributed computing. Part I
                 describes the set of services provided by Grapevine and
                 how its data and function are divided among computers
                 on the internet. Part II presents in more detail
                 selected aspects of Grapevine that illustrate novel
                 facilities or implementation techniques, or that
                 provide insight into the structure of a distributed
                 system. Part III summarizes the current state of the
                 system and the lessons learned from it so far.",
  acknowledgement = ack-nhfb,
  keywords =     "design; distributed naming and binding;
                 experimentation; reliability; replicated databases",
  review =       "ACM CR 39273",
  subject =      "C.2 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems C
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS
                 \\ D.4 Software, OPERATING SYSTEMS, Organization and
                 Design \\ H.2 Information Systems, DATABASE MANAGEMENT,
                 Systems \\ H.2 Information Systems, DATABASE
                 MANAGEMENT, Database Administration \\ H.4 Information
                 Systems, INFORMATION SYSTEMS APPLICATIONS,
                 Communications Applications",
}

@Article{Gifford:1982:CSI,
  author =       "D. K. Gifford and A. K. Jones",
  title =        "Cryptographic Sealing for Information Security and
                 Authentication",
  journal =      j-CACM,
  volume =       "25",
  number =       "4",
  pages =        "274--286",
  month =        apr,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  abstract =     "A new protection mechanism is described that provides
                 general primitives for protection and authentication.
                 The mechanism is based on the idea of sealing an object
                 with a key. Sealed objects are self-authenticating, and
                 in the absence of an appropriate set of keys, only
                 provide information about the size of their contents.
                 New keys can be freely created at any time, and keys
                 can also be derived from existing keys with operators
                 that include Key-And and Key-Or. This flexibility
                 allows the protection mechanism to implement common
                 protection mechanisms such as capabilities, access
                 control lists, and information flow control. The
                 mechanism is enforced with a synthesis of conventional
                 cryptography, public-key cryptography, and a threshold
                 scheme.",
  acknowledgement = ack-nhfb,
  keywords =     "CACM protection operating cryptography",
}

@Article{Howden:1982:CSD,
  author =       "William E. Howden",
  title =        "Contemporary Software Development Environments",
  journal =      j-CACM,
  volume =       "25",
  number =       "5",
  pages =        "318--329",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:51:07 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Howden82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Howden82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Howden82",
}

@Article{Suzuki:1982:APR,
  author =       "Norihisa Suzuki",
  title =        "Analysis of Pointer ``Rotation''",
  journal =      j-CACM,
  volume =       "25",
  number =       "5",
  pages =        "330--335",
  month =        may,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:25:10 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Suzuki82",
  acknowledgement = ack-nhfb,
  keywords =     "functional",
  oldlabel =     "Suzuki82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Suzuki82",
}

@Article{Franklin:1982:IAD,
  author =       "Wm. Randolph Franklin",
  title =        "On an Improved Algorithm for Decentralized Extrema
                 Finding in Circular Configurations of Processors",
  journal =      j-CACM,
  volume =       "25",
  number =       "5",
  pages =        "336--337",
  month =        may,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms",
  subject =      "C.2.5 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Local Networks, Rings
                 \\ D.4.4 Software, OPERATING SYSTEMS, Communications
                 Management, Message sending",
}

@Article{Morey:1982:EIQ,
  author =       "Richard C. Morey",
  title =        "Estimating and Improving the Quality of Information in
                 a {MIS}",
  journal =      j-CACM,
  volume =       "25",
  number =       "5",
  pages =        "337--342",
  month =        may,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:51:35 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "MIS's gets errors occurring because of input delays
                 and overly or insufficiently stringent data edits. In
                 the meantime, the record is out of date and in error.
                 Shows how to forecast the level of improvement in the
                 accuracy of the MIS record if these options are
                 implemented. Considers type 1 and type 2 errors, does
                 not deal well with inadequate input screening.",
}

@Article{Levy:1982:MSF,
  author =       "Michael R. Levy",
  title =        "Modularity and the Sequential File Update Problem",
  journal =      j-CACM,
  volume =       "25",
  number =       "6",
  pages =        "362--367",
  month =        jun,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:04:42 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
}

@Article{Dodds:1982:PRD,
  author =       "D. J. Dodds",
  title =        "Pracniques: Reducing Dictionary Size by Using a
                 Hashing Technique",
  journal =      j-CACM,
  volume =       "25",
  number =       "6",
  pages =        "368--370",
  month =        jun,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:36:21 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Dodds82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Dodds82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Dodds82",
}

@Article{Fournier:1982:CRS,
  author =       "A. Fournier and D. Fussell and L. Carpenter",
  title =        "Computer Rendering of Stochastic Models",
  journal =      j-CACM,
  volume =       "25",
  number =       "6",
  pages =        "371--384",
  month =        jun,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 23:29:46 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.82.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CACM; I35 stochastic processes; model natural terrain
                 stochastic",
}

@Article{Brown:1982:CCM,
  author =       "James W. Brown",
  title =        "Controlling the Complexity of Menu Networks",
  journal =      j-CACM,
  volume =       "25",
  number =       "7",
  pages =        "412--418",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:28:21 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Brown82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Brown82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Brown82",
}

@Article{Meyer:1982:PPD,
  author =       "Bertrand Meyer",
  title =        "Principles of Package Design",
  journal =      j-CACM,
  volume =       "25",
  number =       "7",
  pages =        "419--428",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:04:11 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Meyer82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Meyer82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Meyer82",
}

@Article{Kearsley:1982:ASC,
  author =       "Greg Kearsley",
  title =        "Authoring Systems in Computer Based Education",
  journal =      j-CACM,
  volume =       "25",
  number =       "7",
  pages =        "429--437",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:54:12 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Kearsley82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Kearsley82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Kearsley82",
}

@Article{Swartout:1982:IIS,
  author =       "William Swartout and Robert Balzer",
  title =        "On the Inevitable Intertwining of Specification and
                 Implementation",
  journal =      j-CACM,
  volume =       "25",
  number =       "7",
  pages =        "438--440",
  month =        jul,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 12:51:58 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib",
  acknowledgement = ack-nhfb,
  keywords =     "misc",
}

@Article{Gilchrist:1982:ISE,
  author =       "Bruce Gilchrist and Arlaana Shenkin",
  title =        "The Impact of Scanners on Employment in Supermarkets",
  journal =      j-CACM,
  volume =       "25",
  number =       "7",
  pages =        "441--445",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:44:17 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#GilchristS82",
  acknowledgement = ack-nhfb,
  oldlabel =     "GilchristS82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/GilchristS82",
}

@Article{Weiser:1982:PUS,
  author =       "Mark Weiser",
  title =        "Programmers Use Slices When Debugging",
  journal =      j-CACM,
  volume =       "25",
  number =       "7",
  pages =        "446--452",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:29:02 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Weiser82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Weiser82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Weiser82",
}

@Article{Tsichritzis:1982:FM,
  author =       "Dennis Tsichritzis",
  title =        "Form management",
  journal =      j-CACM,
  volume =       "25",
  number =       "7",
  pages =        "453--478",
  month =        jul,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages; management",
  review =       "ACM CR 39542",
  subject =      "H.4 Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Office Automation \\ H.4.3 Information
                 Systems, INFORMATION SYSTEMS APPLICATIONS,
                 Communications Applications, Electronic mail",
}

@Article{Vikas:1982:SDM,
  author =       "Om Vikas and V. Rajaraman",
  title =        "Searching in a Dynamic Memory with Fast Sequential
                 Access",
  journal =      j-CACM,
  volume =       "25",
  number =       "7",
  pages =        "479--484",
  month =        jul,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68E05 (68B15)",
  MRnumber =     "83h:68098",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "1.5 log memory size search in a shuffle-cyclic memory
                 with sorted entries.",
}

@Article{Cheung:1982:EBA,
  author =       "T-Y. Cheung",
  title =        "Estimating Block Accesses and Number of Records in
                 File Management",
  journal =      j-CACM,
  volume =       "25",
  number =       "7",
  pages =        "484--487",
  month =        jul,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  keywords =     "selectivity CACM",
}

@Article{Elshoff:1982:ICP,
  author =       "James L. Elshoff and Michael Marcotty",
  title =        "Improving Computer Program Readability to Aid
                 Modification",
  journal =      j-CACM,
  volume =       "25",
  number =       "8",
  pages =        "512--521",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 29 07:10:19 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#ElshoffM82",
  acknowledgement = ack-nhfb,
  oldlabel =     "ElshoffM82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/ElshoffM82",
}

@Article{Turba:1982:LSL,
  author =       "T. N. Turba",
  title =        "Length-segmented lists",
  journal =      j-CACM,
  volume =       "25",
  number =       "8",
  pages =        "522--526",
  month =        aug,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Jul 24 09:09:04 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; languages",
  subject =      "D.4.3 Software, OPERATING SYSTEMS, File Systems
                 Management, Access methods \\ D.4.3 Software, OPERATING
                 SYSTEMS, File Systems Management, Directory structures
                 \\ H.2.2 Information Systems, DATABASE MANAGEMENT,
                 Physical Design, Access methods \\ H.3.1 Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Content
                 Analysis and Indexing, Dictionaries \\ E.1 Data, DATA
                 STRUCTURES, Lists \\ E.1 Data, DATA STRUCTURES, Tables
                 \\ E.2 Data, DATA STORAGE REPRESENTATIONS, Contiguous
                 representations \\ H.3.1 Information Systems,
                 INFORMATION STORAGE AND RETRIEVAL, Content Analysis and
                 Indexing, Indexing methods \\ H.4.1 Information
                 Systems, INFORMATION SYSTEMS APPLICATIONS, Office
                 Automation, Word processing \\ I.7.1 Computing
                 Methodologies, TEXT PROCESSING, Text Editing,
                 Spelling",
}

@Article{Simmons:1982:RSS,
  author =       "Robert F. Simmons and Daniel L. Chester",
  title =        "Relating Sentences and Semantic Networks with
                 Procedural Logic",
  journal =      j-CACM,
  volume =       "25",
  number =       "8",
  pages =        "527--547",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:21:46 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#SimmonsC82",
  acknowledgement = ack-nhfb,
  oldlabel =     "SimmonsC82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SimmonsC82",
}

@Article{Berk:1982:HFS,
  author =       "T. Berk and L. Brownston and A. Kaufman",
  title =        "A Human Factors Study of Color Notation Systems for
                 Computer Graphics",
  journal =      j-CACM,
  volume =       "25",
  number =       "8",
  pages =        "547--550",
  month =        aug,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/siggraph/82.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I36 color specification",
}

@Article{Doyle:1982:SSS,
  author =       "M. S. Doyle and J. W. Graham",
  title =        "A Study of Superfluity in Storage Hierarchies",
  journal =      j-CACM,
  volume =       "25",
  number =       "8",
  pages =        "550--555",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:36:44 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#DoyleG82",
  acknowledgement = ack-nhfb,
  oldlabel =     "DoyleG82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DoyleG82",
}

@Article{Lam:1982:TNC,
  author =       "Clement W. H. Lam and Leonard H. Soicher",
  title =        "Three New Combination Algorithms with the Minimal
                 Change Property",
  journal =      j-CACM,
  volume =       "25",
  number =       "8",
  pages =        "555--559",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:57:11 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#LamS82",
  acknowledgement = ack-nhfb,
  oldlabel =     "LamS82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/LamS82",
}

@Article{Pearl:1982:SBF,
  author =       "Judea Pearl",
  title =        "The Solution for the Branching Factor of the
                 Alpha-Beta Pruning Algorithm and its Optimality",
  journal =      j-CACM,
  volume =       "25",
  number =       "8",
  pages =        "559--564",
  month =        aug,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68G20 (68C25 68E10)",
  MRnumber =     "83k:68096",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/tree-search.bib",
  acknowledgement = ack-nhfb,
}

@Article{Samet:1982:HLD,
  author =       "Hanan Samet",
  title =        "Heuristics for the Line Division Problem in Computer
                 Justified Text",
  journal =      j-CACM,
  volume =       "25",
  number =       "8",
  pages =        "564--571",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:18:18 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Samet82",
  acknowledgement = ack-nhfb,
  keywords =     "typography",
  oldlabel =     "Samet82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Samet82",
}

@Article{Martin:1982:EGC,
  author =       "Johannes J. Martin",
  title =        "An Efficient Garbage Compaction Algorithm",
  journal =      j-CACM,
  volume =       "25",
  number =       "8",
  pages =        "571--581",
  month =        aug,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68B15",
  MRnumber =     "83k:68013",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib",
  acknowledgement = ack-nhfb,
}

@Article{Mandelbrot:1982:CCR,
  author =       "B. B. Mandelbrot",
  title =        "Comment on Computer Rendering of Fractal Stochastic
                 Models",
  journal =      j-CACM,
  volume =       "25",
  number =       "8",
  pages =        "581--584",
  month =        aug,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:40:01 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.82.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I34 fractal stochastic models",
}

@Article{Gremillion:1982:DBF,
  author =       "L. L. Gremillion",
  title =        "Designing a {Bloom} Filter for Differential File
                 Access",
  journal =      j-CACM,
  volume =       "25",
  number =       "9",
  pages =        "600--604",
  month =        sep,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:34:33 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  keywords =     "files CACM",
}

@Article{Pechura:1982:FAT,
  author =       "Michael A. Pechura",
  title =        "File Archival Techniques Using Data Compression",
  journal =      j-CACM,
  volume =       "25",
  number =       "9",
  pages =        "605--609",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:11:57 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Pechura82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Pechura82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Pechura82",
}

@Article{Shneiderman:1982:PDC,
  author =       "Ben Shneiderman",
  title =        "Pracniques: Designing Computer System Messages",
  journal =      j-CACM,
  volume =       "25",
  number =       "9",
  pages =        "610--611",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:21:13 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Shneiderman82a",
  acknowledgement = ack-nhfb,
  oldlabel =     "Shneiderman82a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Shneiderman82a",
}

@Article{Goodman:1982:UCE,
  author =       "Seymour E. Goodman",
  title =        "{U.S.} Computer Export Control Policies: Value
                 Conflicts and Policy Choices",
  journal =      j-CACM,
  volume =       "25",
  number =       "9",
  pages =        "613--623",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:45:26 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Goodman82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Goodman82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Goodman82",
}

@Article{Chapman:1982:PTA,
  author =       "David Chapman",
  title =        "A Program Testing Assistant",
  journal =      j-CACM,
  volume =       "25",
  number =       "9",
  pages =        "625--634",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:30:30 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Chapman82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Chapman82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Chapman82",
}

@Article{Lee:1982:ACVa,
  author =       "Yong Tsui Lee and Aristides A. G. Requicha",
  title =        "Algorithms for Computing the Volume and Other Integral
                 Properties of Solids. {I}. Known Methods and Open
                 Issues",
  journal =      j-CACM,
  volume =       "25",
  number =       "9",
  pages =        "635--641",
  month =        sep,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "52-04 (51-04 65C05 65D30 68K05)",
  MRnumber =     "84a:52003b",
  bibdate =      "Tue Dec 26 16:40:00 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.82.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I35 volume computation of solids",
}

@Article{Lee:1982:ACVb,
  author =       "Y. T. Lee and A. A. G. Requicha",
  title =        "Algorithms for Computing the Volume and Other Integral
                 Properties of Solids. {II}. {A} Family of Algorithms
                 Based on Representation Conversion and Cellular
                 Approximation",
  journal =      j-CACM,
  volume =       "25",
  number =       "9",
  pages =        "642--650",
  month =        sep,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "52-04 (51-04 65C05 65D30 68K05)",
  MRnumber =     "84a:52003a",
  bibdate =      "Tue Dec 26 16:40:00 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/82.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I35 volume computation of solids",
}

@Article{Bic:1982:PMI,
  author =       "Lubomir Bic",
  title =        "A Protection Model and Its Implementation in a
                 Dataflow System",
  journal =      j-CACM,
  volume =       "25",
  number =       "9",
  pages =        "650--658",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:26:18 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Bic82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Bic82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bic82",
}

@Article{Chin:1982:EPA,
  author =       "Francis Y. Chin and John Lam and I Ngo Chen",
  title =        "Efficient parallel algorithms for some graph
                 problems",
  journal =      j-CACM,
  volume =       "25",
  number =       "9",
  pages =        "659--665",
  month =        sep,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68C25 (05C70 68E10)",
  MRnumber =     "84a:68038",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib",
  acknowledgement = ack-nhfb,
}

@Article{Isner:1982:FPM,
  author =       "J. F. Isner",
  title =        "A {Fortran} Programming Methodology based on Data
                 Abstraction",
  journal =      j-CACM,
  volume =       "25",
  number =       "10",
  pages =        "686--698",
  month =        oct,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:34:33 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gillenson:1982:SPD,
  author =       "Mark L. Gillenson",
  title =        "The State of Practice of Data Administration--1981",
  journal =      j-CACM,
  volume =       "25",
  number =       "10",
  pages =        "699--706",
  month =        oct,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:06:21 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reports on a survey of IBM, IMS, and DOS DL/I account
                 systems engineers in the US, and of personnel in
                 internal IBM IMS user organizations in the US and
                 Canada.",
}

@Article{Lipsky:1982:ABT,
  author =       "Lester Lipsky and Chee-Min Henry Lieu and Abolfazl
                 Tehranipour and Appie van de Liefvoort",
  title =        "On the Asymptotic Behavior of Time-Sharing Systems",
  journal =      j-CACM,
  volume =       "25",
  number =       "10",
  pages =        "707--714",
  month =        oct,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 29 07:19:49 2001",
  acknowledgement = ack-nhfb,
}

@Article{Beck:1982:DSA,
  author =       "Leland L. Beck",
  title =        "A Dynamic Storage Allocation Technique Based on Memory
                 Residence Time",
  journal =      j-CACM,
  volume =       "25",
  number =       "10",
  pages =        "714--724",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:09 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Beck82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Beck82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Beck82",
}

@Article{Cohen:1982:CAM,
  author =       "Jacques Cohen",
  title =        "Computer-assisted microanalysis of programs",
  journal =      j-CACM,
  volume =       "25",
  number =       "10",
  pages =        "724--733",
  month =        oct,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kornfeld:1982:CIA,
  author =       "William A. Kornfeld",
  title =        "Combinatorially Implosive Algorithms",
  journal =      j-CACM,
  volume =       "25",
  number =       "10",
  pages =        "734--738",
  month =        oct,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib",
  acknowledgement = ack-nhfb,
}

@Article{Nievergelt:1982:PSA,
  author =       "J. Nievergelt and F. P. Preparata",
  title =        "Plane-Sweep Algorithms for Intersecting Geometric
                 Figures",
  journal =      j-CACM,
  volume =       "25",
  number =       "10",
  pages =        "739--747",
  month =        oct,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:40:04 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.82.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I35 intersecting geometric figures",
}

@Article{Houle:1982:CGD,
  author =       "P. A. Houle",
  title =        "Comment on gamma deviate generation",
  journal =      j-CACM,
  volume =       "25",
  number =       "10",
  pages =        "747--748",
  month =        oct,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:39:57 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1982.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "RVG",
  enum =         "7409",
  references =   "0",
}

@Article{Wicklund:1982:MEP,
  author =       "Thomas L. Wicklund",
  title =        "{MINI-EXEC}: {A} Portable Executive for $8$-Bit
                 Microcomputers",
  journal =      j-CACM,
  volume =       "25",
  number =       "11",
  pages =        "772--780",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:29:33 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Wicklund82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Wicklund82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Wicklund82",
}

@Article{Gauss:1982:PWF,
  author =       "E. J. Gauss",
  title =        "Pracniques: The ``Wolf Fence'' Algorithm for
                 Debugging",
  journal =      j-CACM,
  volume =       "25",
  number =       "11",
  pages =        "780--??",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:43:22 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Gauss82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Gauss82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Gauss82",
}

@Article{Nunamaker:1982:ISC,
  author =       "Jay F. {Nunamaker, Jr.} and J. Daniel Couger and
                 Gordon B. Davis",
  title =        "Information Systems Curriculum Recommendations for the
                 80s: Undergraduate and Graduate Programs",
  journal =      j-CACM,
  volume =       "25",
  number =       "11",
  pages =        "781--805",
  month =        nov,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Sep 30 15:08:25 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "A report of the ACM Curriculum Committee on
                 Information Systems --- H4 is databases.",
}

@Article{Sterling:1982:UPD,
  author =       "Theodor D. Sterling",
  title =        "Unionization of Professionals in Data Processing: An
                 Assessment of Recent Trends",
  journal =      j-CACM,
  volume =       "25",
  number =       "11",
  pages =        "807--816",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:24:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Sterling82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Sterling82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Sterling82",
}

@Article{Lageweg:1982:CAC,
  author =       "B. J. Lageweg and J. K. Lenstra and A. H. G. Rinnooy
                 Kan",
  title =        "Computer-Aided Complexity Classification of
                 Combinatorial Problems",
  journal =      j-CACM,
  volume =       "25",
  number =       "11",
  pages =        "817--822",
  month =        nov,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68C25 (90B35)",
  MRnumber =     "84d:68040a",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Lim:1982:HSD,
  author =       "W. Y.-P. Lim",
  title =        "{HISDL}: a structure description language",
  journal =      j-CACM,
  volume =       "25",
  number =       "11",
  pages =        "823--830",
  month =        nov,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 07 13:23:08 1994",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  subject =      "B.5.2 Hardware, REGISTER-TRANSFER-LEVEL
                 IMPLEMENTATION, Design Aids, Hardware description
                 languages \\ B.6.3 Hardware, LOGIC DESIGN, Design Aids,
                 Hardware description languages \\ B.4.3 Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Interconnections
                 (subsystems), Topology \\ D.3.2 Software, PROGRAMMING
                 LANGUAGES, Language Classifications, Design languages",
}

@Article{Langer:1982:DGA,
  author =       "A. M. Langer and A. W. Shum",
  title =        "The Distribution of Granule Accesses Made by Database
                 Transactions",
  journal =      j-CACM,
  volume =       "25",
  number =       "11",
  pages =        "831--832",
  month =        nov,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:06:31 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chandy:1982:DCG,
  author =       "K. M. Chandy and J. Misra",
  title =        "Distributed Computation on Graphs: Shortest Path
                 Algorithms",
  journal =      j-CACM,
  volume =       "25",
  number =       "11",
  pages =        "833--837",
  month =        nov,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68E10 (05C35 90B10)",
  MRnumber =     "84e:68067",
  bibdate =      "Mon Jan 29 07:21:39 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CACM",
}

@Article{Olson:1982:IOA,
  author =       "Margrethe H. Olson and Henry C. {Lucas, Jr.}",
  title =        "The Impact of Office Automation on the Organization:
                 Some Implications for Research and Practice",
  journal =      j-CACM,
  volume =       "25",
  number =       "11",
  pages =        "838--847",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:10:36 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#OlsonL82",
  acknowledgement = ack-nhfb,
  oldlabel =     "OlsonL82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/OlsonL82",
}

@Article{Evans:1982:SEC,
  author =       "Michael Evans",
  title =        "Software Engineering for the {Cobol} Environment",
  journal =      j-CACM,
  volume =       "25",
  number =       "12",
  pages =        "874--882",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:38:16 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Evans82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Evans82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Evans82",
}

@Article{Gourd:1982:SAP,
  author =       "Roger S. Gourd",
  title =        "Self-Assessment Procedure {X}: {A} Self-Assessment
                 Procedure Dealing with Software Project Management",
  journal =      j-CACM,
  volume =       "25",
  number =       "12",
  pages =        "883--887",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:45:53 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Gourd82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Gourd82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Gourd82",
}

@Article{Minker:1982:CPW,
  author =       "Jack Minker",
  title =        "Computer Professionals Whose Scientific Freedom and
                 Human Rights Have Been Violated --- 1982",
  journal =      j-CACM,
  volume =       "25",
  number =       "12",
  pages =        "888--894",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:04:35 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Minker82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Minker82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Minker82",
}

@Article{Lew:1982:EFD,
  author =       "Art Lew",
  title =        "On the Emulation of Flowcharts by Decision Tables",
  journal =      j-CACM,
  volume =       "25",
  number =       "12",
  pages =        "895--905",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:58:43 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Lew82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Lew82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Lew82",
}

@Article{Gargantini:1982:EWR,
  author =       "I. Gargantini",
  title =        "An Effective Way to Represent Quadtrees",
  journal =      j-CACM,
  volume =       "25",
  number =       "12",
  pages =        "905--910",
  month =        dec,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:39:55 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.82.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I35 quadtree representation",
}

@Article{Vitter:1982:ICH,
  author =       "J. S. Vitter",
  title =        "Implementations for Coalesced Hashing",
  journal =      j-CACM,
  volume =       "25",
  number =       "12",
  pages =        "911--926",
  month =        dec,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jul 18 19:48:12 1994",
  acknowledgement = ack-nhfb,
}

@Article{ODonnell:1982:CFH,
  author =       "M. J. O'Donnell",
  title =        "A Critique of the Foundations of {Hoare} Style
                 Programming Logics",
  journal =      j-CACM,
  volume =       "25",
  number =       "12",
  pages =        "927--934",
  month =        dec,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  abstract =     "Much recent discussion in computing journals has been
                 devoted to arguments about the feasibility and
                 usefulness of formal verification methods. Too little
                 attention has been given to precise criticism of
                 specific proposed systems for reasoning about programs.
                 Wether such systems are to be used for formal
                 verification, by hand or automatically, or as a
                 rigorous foundation for informal reasoning, it is
                 essential that they be logically sound. Several popular
                 rules in the Hoare language are, in fact, not sound.
                 These rules have been accepted because they have not
                 been subjected to sufficiently strong standards of
                 correctness. This paper attempts to clarify the
                 different technical definitions of correctness of a
                 logic, to show that only the strongest of these
                 definitions is acceptable for Hoare logic, and to
                 correct some of the unsound rules that have appeared in
                 the literature. The corrected rules are given merely to
                 show that it is possible to do so. Convenient and
                 elegant rules for reasoning about certain programming
                 constructs will probably require a more flexible
                 notation than Hoare's.",
  acknowledgement = ack-nhfb,
}

@Article{Mor:1982:HCM,
  author =       "M. Mor and A. S. Fraenkel",
  title =        "A Hash Code Method for Detecting and Correcting
                 Spelling Errors",
  journal =      j-CACM,
  volume =       "25",
  number =       "12",
  pages =        "935--938",
  month =        dec,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Jul 24 09:03:39 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance",
  review =       "ACM CR 40850",
  subject =      "E.2 Data, DATA STORAGE REPRESENTATIONS, Hash-table
                 representations \\ H.3.1 Information Systems,
                 INFORMATION STORAGE AND RETRIEVAL, Content Analysis and
                 Indexing, Dictionaries \\ H.3.3 Information Systems,
                 INFORMATION STORAGE AND RETRIEVAL, Information Search
                 and Retrieval, Search process \\ I.7.1 Computing
                 Methodologies, TEXT PROCESSING, Text Editing,
                 Spelling",
}

@Article{Eastman:1982:CEN,
  author =       "C. M. Eastman",
  title =        "A Comment on {English} Neologisms and Programming
                 Language Keywords",
  journal =      j-CACM,
  volume =       "25",
  number =       "12",
  pages =        "938--940",
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:37:17 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm25.html#Eastman82",
  acknowledgement = ack-nhfb,
  oldlabel =     "Eastman82",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Eastman82",
}

@Article{Samelson:1983:SFT,
  author =       "K. Samelson and Friedrich L. Bauer",
  title =        "Sequential Formula Translation (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "9--13",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:18:15 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#SamelsonB83",
  note =         "Reprint of \cite{Samelson:1960:SFT}.",
  acknowledgement = ack-nhfb,
  oldlabel =     "SamelsonB83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SamelsonB83",
}

@Article{Irons:1983:SDC,
  author =       "Edgar T. Irons",
  title =        "A Syntax Directed Compiler for {ALGOL 60} (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "14--16",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:51:54 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Irons83",
  note =         "Reprint of \cite{Irons:1961:SDC}.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Irons83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Irons83",
}

@Article{Sussenguth:1983:UTS,
  author =       "Edward H. {Sussenguth, Jr.}",
  title =        "Use of Tree Structures for Processing Files
                 (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "17--20",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:25:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Sussenguth83",
  note =         "Reprint of \cite{Sussenguth:1963:UTS}.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Sussenguth83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Sussenguth83",
}

@Article{Dijkstra:1983:SPC,
  author =       "Edsger W. Dijkstra",
  title =        "Solution of a Problem in Concurrent Programming
                 Control (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "21--22",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:07:58 1997",
  note =         "Reprint of \cite{Dijkstra:1965:SPC}.",
  acknowledgement = ack-nhfb,
}

@Article{Weizenbaum:1983:ECP,
  author =       "Joseph Weizenbaum",
  title =        "{ELIZA} --- {A} Computer Program For the Study of
                 Natural Language Communication Between Man And Machine
                 (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "23--28",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:29:12 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Weizenbaum83",
  note =         "Reprint of \cite{Weizenbaum:1966:ECP}.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Weizenbaum83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Weizenbaum83",
}

@Article{Dennis:1983:PSM,
  author =       "Jack B. Dennis and Earl C. Van Horn",
  title =        "Programming Semantics for Multiprogrammed Computations
                 (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "29--35",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:39 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#DennisH83",
  note =         "Reprint of \cite{Dennis:1966:PSM}.",
  acknowledgement = ack-nhfb,
  oldlabel =     "DennisH83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DennisH83",
}

@Article{Maurer:1983:IHC,
  author =       "W. D. Maurer",
  title =        "An Improved Hash Code for Scatter Storage (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "36--38",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Jul 19 01:13:05 1994",
  note =         "Reprint of \cite{Maurer:1968:IHS}.",
  acknowledgement = ack-nhfb,
}

@Article{Morris:1983:SST,
  author =       "Robert Morris",
  title =        "Scatter Storage Techniques (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "39--42",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:10:10 1997",
  note =         "Reprint of \cite{Morris:1968:SST}.",
  acknowledgement = ack-nhfb,
}

@Article{Denning:1983:WSM,
  author =       "Peter J. Denning",
  title =        "The Working Set Model for Program Behaviour
                 (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "43--48",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:09 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Denning83",
  note =         "Reprint of \cite{Denning:1968:WSM}.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Denning83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Denning83",
}

@Article{Dijkstra:1983:SMS,
  author =       "Edsger W. Dijkstra",
  title =        "The Structure of the {``THE''}-Multiprogramming System
                 (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "49--52",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:36:11 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Dijkstra83a",
  note =         "Reprint of \cite{Dijkstra:1968:SMS}.",
  acknowledgement = ack-nhfb,
  annote =       "Design principles for correct programming systems",
  oldlabel =     "Dijkstra83a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Dijkstra83a",
}

@Article{Hoare:1983:ABC,
  author =       "C. A. R. Hoare",
  title =        "An Axiomatic Basis for Computer Programming
                 (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "53--56",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:09:18 1997",
  note =         "Reprint of \cite{Hoare:1969:ABC}.",
  acknowledgement = ack-nhfb,
}

@Article{Earley:1983:ECF,
  author =       "Jay Earley",
  title =        "An Efficient Context-Free Parsing Algorithm
                 (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "57--61",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:08:28 1997",
  note =         "Reprint of \cite{Earley:1970:ECF}.",
  acknowledgement = ack-nhfb,
}

@Article{Bell:1983:QQM,
  author =       "James R. Bell",
  title =        "The Quadratic Quotient Method: {A} Hash Code
                 Eliminating Secondary Clustering (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "62--63",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:34:34 1996",
  note =         "Reprint of \cite{Bell:1970:QQM}.",
  acknowledgement = ack-nhfb,
}

@Article{Codd:1983:RMD,
  author =       "E. F. Codd",
  title =        "A Relational Model of Data for Large Shared Data Banks
                 (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "64--69",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:07:22 1997",
  note =         "Reprint of \cite{Codd:1970:RMD}.",
  acknowledgement = ack-nhfb,
}

@Article{Wirth:1983:PDS,
  author =       "Niklaus Wirth",
  title =        "Program Development by Stepwise Refinement (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "70--74",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:11:24 1997",
  note =         "Reprint of \cite{Wirth:1971:PDS}.",
  acknowledgement = ack-nhfb,
}

@Article{Parnas:1983:TSM,
  author =       "David Lorge Parnas",
  title =        "A Technique for Software Module Specification with
                 Examples (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "75--78",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:11:23 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Parnas83",
  note =         "Reprint of \cite{Parnas:1972:TSM}.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Parnas83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Parnas83",
}

@Article{Kuki:1983:SSA,
  author =       "H. Kuki and W. J. Cody",
  title =        "A statistical study of the accuracy of floating point
                 number systems (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "79--83",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Sep 6 22:00:00 MDT 1994",
  note =         "Reprint of \cite{Kuki:1973:SSA}.",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "F.2.1 Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Numerical Algorithms and
                 Problems, Number-theoretic computations G Mathematics
                 of Computing, PROBABILITY AND STATISTICS \\ B.2
                 Hardware, ARITHMETIC AND LOGIC STRUCTURES,
                 Miscellaneous \\ B.5 Hardware, REGISTER-TRANSFER-LEVEL
                 IMPLEMENTATION, Design \\ D.2 Software, SOFTWARE
                 ENGINEERING, General",
}

@Article{Ritchie:1983:UTS,
  author =       "Dennis M. Ritchie and Ken Thompson",
  title =        "The {UNIX} Time-Sharing System (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "84--89",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:13:58 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  note =         "Reprint of \cite{Ritchie:1974:UTS}.",
  abstract =     "UNIX is a general-purpose, multi-user, interactive
                 operating system for the Digital Equipment Corporation
                 PDP-11/40 and 11/45 computers. It offers a number of
                 features seldom found even in larger operating systems,
                 including: (1) a hierarchical file system incorporating
                 demountable volumes; (2) compatible file, device, and
                 inter-process I/O; (3) the ability to initiate
                 asynchronous processes; (4) system command languages
                 selectable on a per-user basis; and (5) over 100
                 subsystems including a dozen languages. This paper
                 discusses the nature and implementation of the file
                 system and of the user command interface.",
  acknowledgement = ack-nhfb,
}

@Article{Metcalfe:1983:EDP,
  author =       "Robert M. Metcalfe and David R. Boggs",
  title =        "{Ethernet}: Distributed Packet Switching for Local
                 Computer Networks",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "90--95",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  note =         "Reprint of \cite{Metcalfe:1976:EDP}.",
  abstract =     "Ethernet is a branching broadcast communication system
                 for carrying digital data packets among locally
                 distributed computing stations. The packet transport
                 mechanisms provided by Ethernet has been used to build
                 systems which can be viewed as either local computer
                 networks or loosely coupled multiprocessors. An
                 Ethernet's shared communication facility, its Ether, is
                 a passive broadcast medium with no central control.
                 Coordination of access to the Ether for packet
                 broadcasts is distributed among the contending
                 transmitting stations using controlled statistical
                 arbitration. Switching of packets to their destinations
                 on the Ether is distributed among the receiving
                 stations using packet address recognition. Design
                 principles and implementation are described, based on
                 experience with an operating Ethernet of 100 nodes
                 along a kilometer of coaxial cable. A model for
                 estimating performance under heavy loads and a packet
                 protocol for error controlled communication are
                 included for completeness.",
  acknowledgement = ack-nhfb,
  subject =      "C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network communications \\ D.4.1 Software,
                 OPERATING SYSTEMS, Process Management,
                 Multiprocessing/multiprogramming \\ B.4 Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Input/Output
                 Devices \\ B.4 Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, General",
}

@Article{Rivest:1983:MOD,
  author =       "R. L. Rivest and A. Shamir and L. Adleman",
  title =        "A Method for Obtaining Digital Signatures and
                 Public-Key Cryptosystems (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "96--99",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Sep 22 11:37:34 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  note =         "Reprint of \cite{Rivest:1978:MOD}.",
  abstract =     "An encryption method is presented with the novel
                 property that publicly revealing an encryption key does
                 not thereby reveal the corresponding decryption key.
                 This has two important consequences: (1) Couriers or
                 other secure means are not needed to transmit keys,
                 since a message can be enciphered using an encryption
                 key publicly revealed by the intended recipient. Only
                 he can decipher the message, since only he knows the
                 corresponding decryption key. (2) A message can be
                 ``signed'' using a privately held decryption key.
                 Anyone can verify this signature using the
                 corresponding publicly revealed encryption key.
                 Signatures cannot be forged, and a signer cannot later
                 deny the validity of his signature. This has obvious
                 applications in ``electronic mail'' and ``electronic
                 funds transfer'' systems. A message is encrypted by
                 representing it as a number $M$, raising $M$ to a
                 publicly specified power $e$, and then taking the
                 remainder when the result is divided by the publicly
                 specified product, $n$, of two large secret prime
                 numbers $p$ and $q$. Decryption is similar; only a
                 different, secret, power $d$ is used, where $e * d ==
                 1(\mbox{mod}(p-1)*(q-1))$. The security of the system
                 rests in part on the difficulty of factoring the
                 published divisor, n.",
  acknowledgement = ack-nhfb,
}

@Article{Hoare:1983:CSP,
  author =       "C. A. R. Hoare",
  title =        "{Communicating Sequential Processes} (Reprint)",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "100--106",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:50:27 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Hoare83a",
  note =         "Reprint of \cite{Hoare:1978:CSP}.",
  acknowledgement = ack-nhfb,
  keywords =     "Communicating Sequential Processes (CSP)",
  oldlabel =     "Hoare83a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Hoare83a",
}

@Article{Zaki:1983:REF,
  author =       "Ahmed S. Zaki",
  title =        "Regulation of Electronic Funds Transfer: Impact and
                 Legal Issues",
  journal =      j-CACM,
  volume =       "26",
  number =       "2",
  pages =        "112--118",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:31:35 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Zaki83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Zaki83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Zaki83",
}

@Article{Bell:1983:CMM,
  author =       "Gordon Bell",
  title =        "The {Computer Museum} Member's First Field Trip: The
                 {Northbay AN\slash FSQ7 Sage} Site",
  journal =      j-CACM,
  volume =       "26",
  number =       "2",
  pages =        "118--119",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:24 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Bell83a",
  acknowledgement = ack-nhfb,
  oldlabel =     "Bell83a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bell83a",
}

@Article{Kent:1983:SGF,
  author =       "W. Kent",
  title =        "A Simple Guide to Five Normal Forms in Relational
                 Database Theory",
  journal =      j-CACM,
  volume =       "26",
  number =       "2",
  pages =        "120--125",
  month =        feb,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  note =         "Reprinted in A. R. Hurson, L. L. Miller, and S. H.
                 Pakzad, Parallel Architectures for Database Systems,
                 IEEE Computer Society Press, Washington, DC, 1989",
  acknowledgement = ack-nhfb,
  keywords =     "CACM",
}

@Article{Bell:1983:MCD,
  author =       "R. Charles Bell",
  title =        "{Monte Carlo} Debugging: {A} Brief Tutorial",
  journal =      j-CACM,
  volume =       "26",
  number =       "2",
  pages =        "126--127",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:25 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Bell83b",
  acknowledgement = ack-nhfb,
  oldlabel =     "Bell83b",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bell83b",
}

@Article{Vessey:1983:SFA,
  author =       "Iris Vessey and Ron Weber",
  title =        "Some Factors Affecting Program Repair Maintenance: An
                 Empirical Study",
  journal =      j-CACM,
  volume =       "26",
  number =       "2",
  pages =        "128--134",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:27:20 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#VesseyW83",
  acknowledgement = ack-nhfb,
  oldlabel =     "VesseyW83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/VesseyW83",
}

@Article{Srinivasan:1983:SDT,
  author =       "B. Srinivasan",
  title =        "On the Synthesis of Decision Tables",
  journal =      j-CACM,
  volume =       "26",
  number =       "2",
  pages =        "135--136",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:23:47 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Srinivasan83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Srinivasan83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Srinivasan83",
}

@Article{Mathey:1983:CMQ,
  author =       "Michael J. Mathey and Bernard M. E. Moret",
  title =        "The Computational Metaphor and Quantum Physics",
  journal =      j-CACM,
  volume =       "26",
  number =       "2",
  pages =        "137--145",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:02:10 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#MatheyM83",
  acknowledgement = ack-nhfb,
  oldlabel =     "MatheyM83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/MatheyM83",
}

@Article{Schwarz:1983:FCT,
  author =       "Arthur I. Schwarz",
  title =        "On File Compression Techniques",
  journal =      j-CACM,
  volume =       "26",
  number =       "2",
  pages =        "148--148",
  month =        feb,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 6 07:22:30 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
}

@Article{Pechura:1983:FCT,
  author =       "Michael Pechura",
  title =        "On File Compression Techniques: Author's Response",
  journal =      j-CACM,
  volume =       "26",
  number =       "2",
  pages =        "148--149",
  month =        feb,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 6 07:22:31 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
}

@Article{Olson:1983:ROW,
  author =       "M. H. Olson",
  title =        "Remote office work: changing work patterns in space
                 and time",
  journal =      j-CACM,
  volume =       "26",
  number =       "3",
  pages =        "182--187",
  month =        mar,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; management",
  review =       "ACM CR 40615",
  subject =      "C.2.0 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Data
                 communications \\ H.4 Information Systems, INFORMATION
                 SYSTEMS APPLICATIONS, Office Automation \\ K.4
                 Computing Milieux, COMPUTERS AND SOCIETY,
                 Organizational Impacts",
}

@Article{Pechura:1983:CTM,
  author =       "Michael A. Pechura",
  title =        "Comparing Two Microcomputer Operating Systems: {CP/M}
                 and {HDOS}",
  journal =      j-CACM,
  volume =       "26",
  number =       "3",
  pages =        "188--195",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:11:58 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Pechura83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Pechura83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Pechura83",
}

@Article{Chesnais:1983:MPA,
  author =       "A. Chesnais and Erol Gelenbe and Isi Mitrani",
  title =        "On the Modeling of Parallel Access to Shared Data",
  journal =      j-CACM,
  volume =       "26",
  number =       "3",
  pages =        "196--202",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:30:55 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#ChesnaisGM83",
  acknowledgement = ack-nhfb,
  oldlabel =     "ChesnaisGM83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/ChesnaisGM83",
}

@Article{Lam:1983:TCA,
  author =       "Simon S. Lam and Y. Luke Lien",
  title =        "A tree convolution algorithm for the solution of
                 queueing networks",
  journal =      j-CACM,
  volume =       "26",
  number =       "3",
  pages =        "203--215",
  month =        mar,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:11:52 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib",
  acknowledgement = ack-nhfb,
  country =      "USA",
  descriptors =  "Queueing network; bibliography; tree convolution
                 algorithm; normalization constant",
  enum =         "1866",
  references =   "0",
}

@Article{Asai:1983:SOM,
  author =       "Hitohisa Asai and C. K. Cheng",
  title =        "Speeding Up an Overrelaxation Method of Division in
                 Radix-$2^n$ Machine",
  journal =      j-CACM,
  volume =       "26",
  number =       "3",
  pages =        "216--220",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:22:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#AsaiC83",
  acknowledgement = ack-nhfb,
  keywords =     "arithmetic",
  oldlabel =     "AsaiC83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/AsaiC83",
}

@Article{Brown:1983:EMN,
  author =       "P. J. Brown",
  title =        "Error Messages: The Neglected Area of the Man\slash
                 Machine Interface?",
  journal =      j-CACM,
  volume =       "26",
  number =       "4",
  pages =        "246--249",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:28:22 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Brown83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Brown83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Brown83",
}

@Article{Motzkin:1983:PM,
  author =       "Dalia Motzkin",
  title =        "Pracnique: {MEANSORT}",
  journal =      j-CACM,
  volume =       "26",
  number =       "4",
  pages =        "250--251",
  month =        apr,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:06:23 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Motzkin83",
  acknowledgement = ack-nhfb,
  keywords =     "sorting",
  oldlabel =     "Motzkin83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Motzkin83",
}

@Article{Schneider:1983:IHC,
  author =       "Michael L. Schneider and John C. Thomas",
  title =        "Introduction: The Humanization of Computer
                 Interfaces",
  journal =      j-CACM,
  volume =       "26",
  number =       "4",
  pages =        "252--253",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:19:35 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#SchneiderT83",
  acknowledgement = ack-nhfb,
  oldlabel =     "SchneiderT83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SchneiderT83",
}

@Article{Norman:1983:DRB,
  author =       "Donald A. Norman",
  title =        "Design Rules Based on Analyses of Human Error",
  journal =      j-CACM,
  volume =       "26",
  number =       "4",
  pages =        "254--258",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:09:51 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Norman83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Norman83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Norman83",
}

@Article{Jacob:1983:UFS,
  author =       "Robert J. K. Jacob",
  title =        "Using Formal Specifications in the Design of a
                 Human-Computer Interface",
  journal =      j-CACM,
  volume =       "26",
  number =       "4",
  pages =        "259--264",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:52:21 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Jacob83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Jacob83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Jacob83",
}

@Article{Roberts:1983:ETE,
  author =       "T. L. Roberts and T. P. Moran",
  title =        "The Evaluation of Text Editors, Methodology and
                 Empirical Results",
  journal =      j-CACM,
  volume =       "26",
  number =       "4",
  pages =        "265--283",
  month =        apr,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:14:23 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "based on PhDthesis. Part is a keystroke model.",
}

@Article{Sauter:1983:JHI,
  author =       "Steven L. Sauter and Mark S. Gottlieb and Karen C.
                 Jones and Vernon N. Dodson and Kathryn M. Rohrer",
  title =        "Job and Health Implications of {VDT} Use: Initial
                 results of the {Wisconsin--NIOSH} Study",
  journal =      j-CACM,
  volume =       "26",
  number =       "4",
  pages =        "284--294",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:19:08 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#SauterGJDR83",
  acknowledgement = ack-nhfb,
  oldlabel =     "SauterGJDR83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SauterGJDR83",
}

@Article{Gould:1983:CLS,
  author =       "J. D. Gould and J. Conti and T. Hovanyecz",
  title =        "Composing Letters with a Simulated Listening
                 Typewriter",
  journal =      j-CACM,
  volume =       "26",
  number =       "4",
  pages =        "295--308",
  month =        apr,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:40:12 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/ai-articles.bib",
  acknowledgement = ack-nhfb,
  keywords =     "AI05",
}

@Article{Girill:1983:DIO,
  author =       "T. R. Girill and Clement H. Luk",
  title =        "{Document}: An Interactive, Online Solution to Four
                 Documentation Problems",
  journal =      j-CACM,
  volume =       "26",
  number =       "5",
  pages =        "328--337",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:44:32 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#GirillL83",
  acknowledgement = ack-nhfb,
  oldlabel =     "GirillL83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/GirillL83",
}

@Article{Ginzberg:1983:ITP,
  author =       "Michael J. Ginzberg",
  title =        "Introduction: Three Papers from the {Third
                 International Conference on Information Systems}",
  journal =      j-CACM,
  volume =       "26",
  number =       "5",
  pages =        "339--??",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:44:29 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Ginzberg83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Ginzberg83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Ginzberg83",
}

@Article{Abdel-Hamid:1983:DSP,
  author =       "Tarek K. Abdel-Hamid and Stuart E. Madnick",
  title =        "The Dynamics of Software Project Scheduling",
  journal =      j-CACM,
  volume =       "26",
  number =       "5",
  pages =        "340--346",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:20:12 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Abdel-HamidM83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Abdel-HamidM83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Abdel-HamidM83",
}

@Article{Mason:1983:PII,
  author =       "R. E. A. Mason and T. T. Carey",
  title =        "Prototyping Interactive Information Systems",
  journal =      j-CACM,
  volume =       "26",
  number =       "5",
  pages =        "347--354",
  month =        may,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib",
  acknowledgement = ack-nhfb,
  keywords =     "misc information",
}

@Article{Will:1983:ALS,
  author =       "H. J. Will",
  title =        "{ACL}: {A} Language Specific for Auditors",
  journal =      j-CACM,
  volume =       "26",
  number =       "5",
  pages =        "356--361",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:30:03 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Will83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Will83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Will83",
}

@Article{Taylor:1983:GPA,
  author =       "Richard N. Taylor",
  title =        "A General-Purpose Algorithm for Analyzing Concurrent
                 Programs",
  journal =      j-CACM,
  volume =       "26",
  number =       "5",
  pages =        "362--376",
  month =        may,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/monitor.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/debug_3.1.bib",
  acknowledgement = ack-nhfb,
}

@Article{Konvalina:1983:MPK,
  author =       "John Konvalina and Stanley A. Wileman and Larry J.
                 Stephens",
  title =        "Math Proficiency: {A} Key to Success for Computer
                 Science Students",
  journal =      j-CACM,
  volume =       "26",
  number =       "5",
  pages =        "377--381",
  month =        may,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:09:47 1997",
  acknowledgement = ack-nhfb,
}

@Article{Hora:1983:EIF,
  author =       "Stephen C. Hora",
  title =        "Estimation of the inverse function for random variate
                 generation",
  journal =      j-CACM,
  volume =       "26",
  number =       "5",
  pages =        "590--594",
  month =        may,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:13:06 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib",
  acknowledgement = ack-nhfb,
  annote =       "A regression method for estimating the inverse of a
                 continuous cumulative probability function F(X) is
                 presented. It is assumed that an ordered sample,
                 $x_1,\ldots,x_n$, of identically and independently
                 distributed random variables is available. A reference
                 distribution $f_0(x)$ with known inverse $f_0^{-1}(p)$
                 is used to calculate the quantities
                 $w_i=i(f_0(x_i)/f_0(x_{i+1}))$. These quantities are
                 used to estimate the function
                 $\gamma(p)=pd\ln=>f_0(f^{-1}(p))</dp$ from \ldots{}",
  country =      "USA",
  descriptors =  "RNG; RVG; Transform; approximation; method;
                 INVERSION",
  enum =         "1406",
  references =   "0",
}

@Article{Cook:1983:OCC,
  author =       "Stephen A. Cook",
  title =        "An Overview of Computational Complexity",
  journal =      j-CACM,
  volume =       "26",
  number =       "6",
  pages =        "400--408",
  month =        jun,
  year =         "1983",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/358141.358144",
  ISSN =         "0001-0782",
  MRclass =      "68C25",
  MRnumber =     "84m:68035",
  MRreviewer =   "R. E. Ladner",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
  keywords =     "complexity of computing the matrix permanent",
  remark =       "This is the 1982 ACM Turing Award Lecture.",
}

@Article{Jacky:1983:GPD,
  author =       "Jonathan Jacky and Ira Kalet",
  title =        "A General Purpose Data Entry Program",
  journal =      j-CACM,
  volume =       "26",
  number =       "6",
  pages =        "409--417",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:52:19 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#JackyK83",
  acknowledgement = ack-nhfb,
  oldlabel =     "JackyK83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/JackyK83",
}

@Article{Bemer:1983:CTT,
  author =       "Robert W. Bemer",
  title =        "Coordinated Text and Transparencies",
  journal =      j-CACM,
  volume =       "26",
  number =       "6",
  pages =        "418--??",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:42 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Bemer83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Bemer83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bemer83",
}

@Article{Lieberman:1983:RTG,
  author =       "Henry Lieberman and Carl Hewitt",
  title =        "A Real-Time Garbage Collector Based on the Lifetimes
                 of Objects",
  journal =      j-CACM,
  volume =       "26",
  number =       "6",
  pages =        "419--429",
  month =        jun,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  keywords =     "CACM",
}

@Article{Markus:1983:PPM,
  author =       "M. Lynne Markus",
  title =        "Power, Politics, and {MIS} Implementation",
  journal =      j-CACM,
  volume =       "26",
  number =       "6",
  pages =        "430--444",
  month =        jun,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:14:41 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "People resist MIS because of their own internal
                 factors, because of poor system design, and because of
                 the interaction of specific system design features with
                 aspects of the organizational context of system use.
                 Data from a case study demonstrate the interaction
                 theory.",
}

@Article{Ramsey:1983:FVP,
  author =       "H. Rudy Ramsey and Michael E. Atwood and James R. Van
                 Doren",
  title =        "Flowcharts Versus Program Design Languages: An
                 Experimental Comparison",
  journal =      j-CACM,
  volume =       "26",
  number =       "6",
  pages =        "445--449",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:15:00 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#RamseyAD83",
  acknowledgement = ack-nhfb,
  oldlabel =     "RamseyAD83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/RamseyAD83",
}

@Article{Gardner:1983:NRI,
  author =       "David P. Gardner and Yvonne W. Larsen",
  title =        "A Nation At Risk: The Imperative for Educational
                 Reform, Report by {The National Commission on
                 Excellence in Education}",
  journal =      j-CACM,
  volume =       "26",
  number =       "7",
  pages =        "467--478",
  month =        jul,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:43:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#GardnerL83",
  acknowledgement = ack-nhfb,
  oldlabel =     "GardnerL83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/GardnerL83",
}

@Article{Weiss:1983:SAP,
  author =       "Eric A. Weiss",
  title =        "Self-Assessment Procedure {XI}: {A} Self-Assessment
                 Procedure Dealing with One Part of Early Computing
                 History",
  journal =      j-CACM,
  volume =       "26",
  number =       "7",
  pages =        "479--482",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:29:07 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Weiss83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Weiss83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Weiss83",
}

@Article{Morland:1983:HFG,
  author =       "D. V. Morland",
  title =        "Human factors guidelines for terminal interface
                 design",
  journal =      j-CACM,
  volume =       "26",
  number =       "7",
  pages =        "484--494",
  month =        jul,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; human factors; performance",
  subject =      "B.4.2 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Input/Output Devices, Data terminals and printers \\
                 D.2.2 Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces \\ D.4.3 Software,
                 OPERATING SYSTEMS, File Systems Management, Directory
                 structures \\ D.4.7 Software, OPERATING SYSTEMS,
                 Organization and Design, Interactive systems \\ D.4.7
                 Software, OPERATING SYSTEMS, Organization and Design,
                 Real-time systems \\ H.1.2 Information Systems, MODELS
                 AND PRINCIPLES, User/Machine Systems, Human factors",
}

@Article{Landauer:1983:NCN,
  author =       "Thomas K. Landauer and Kathleen M. Galotti and S.
                 Hartwell",
  title =        "Natural Command Names and Initial Learning: {A} Study
                 of Text-Editing Terms",
  journal =      j-CACM,
  volume =       "26",
  number =       "7",
  pages =        "495--503",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:57:26 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#LandauerGH83",
  acknowledgement = ack-nhfb,
  oldlabel =     "LandauerGH83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/LandauerGH83",
}

@Article{Yau:1983:HDS,
  author =       "M.-M. Yau and S. N. Srihari",
  title =        "A Hierarchical Data Structure for Multidimensional
                 Digital Images",
  journal =      j-CACM,
  volume =       "26",
  number =       "7",
  pages =        "504--515",
  month =        jul,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/spacetime.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I35 Data Structure",
}

@Article{Fushimi:1983:KDG,
  author =       "M. Fushimi and S. Tezuka",
  title =        "The $k$-distribution of Generalized Feedback Shift
                 Register Pseudorandom Numbers",
  journal =      j-CACM,
  volume =       "26",
  number =       "7",
  pages =        "516--523",
  month =        jul,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Oct 21 23:58:25 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib",
  acknowledgement = ack-nhfb,
  descriptors =  "Shift register sequences; RNG",
}

@Article{Cloutier:1983:PAR,
  author =       "Mark J. Cloutier and Matthew J. Friedman",
  title =        "Precision Averaging for Real-Time Analysis",
  journal =      j-CACM,
  volume =       "26",
  number =       "7",
  pages =        "525--529",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:31:47 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#CloutierF83",
  acknowledgement = ack-nhfb,
  oldlabel =     "CloutierF83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/CloutierF83",
}

@Article{Bentley:1983:PPC,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Cracking the Oyster",
  journal =      j-CACM,
  volume =       "26",
  number =       "8",
  pages =        "549--552",
  month =        aug,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:56 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Bentley83",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley83",
}

@Article{Burr:1983:OPA,
  author =       "William E. Burr",
  title =        "An overview of the proposed {American National
                 Standard for Local Distributed Data Interfaces}",
  journal =      j-CACM,
  volume =       "26",
  number =       "8",
  pages =        "554--561",
  month =        aug,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "includes discussion of problems of impedance match of
                 disk and CSMA on LAN-(Ethernet) networks.",
  keywords =     "design; experimentation; performance;
                 standardization",
  review =       "ACM CR 8406-0432",
  subject =      "B.4.2 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Input/Output Devices, Channels and controllers \\ B.4.3
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Interconnections (subsystems), Interfaces \\ B.4.3
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Interconnections (subsystems), Physical structures \\
                 C.1.2 Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Interconnection architectures \\
                 C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Distributed networks \\ C.2.2 Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Network Protocols, Protocol architecture \\ C.2.5
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Local Networks, MONET \\ C.2 Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Local
                 Networks",
}

@Article{Hansen:1983:ACD,
  author =       "James V. Hansen",
  title =        "Audit Considerations in Distributed Processing
                 Systems",
  journal =      j-CACM,
  volume =       "26",
  number =       "8",
  pages =        "562--569",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:48:18 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Hansen83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Hansen83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Hansen83",
}

@Article{Mullin:1983:SLB,
  author =       "James K. Mullin",
  title =        "A Second Look at {Bloom} Filters",
  journal =      j-CACM,
  volume =       "26",
  number =       "8",
  pages =        "570--571",
  month =        aug,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:06:45 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Mullin83",
  acknowledgement = ack-nhfb,
  keywords =     "also applicable to bit vector filters CACM;
                 differential files; see Gremillion CACM1982",
  oldlabel =     "Mullin83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Mullin83",
}

@Article{Parnas:1983:GCS,
  author =       "David Lorge Parnas",
  title =        "A Generalized Control Structure and Its Formal
                 Definition",
  journal =      j-CACM,
  volume =       "26",
  number =       "8",
  pages =        "572--581",
  month =        aug,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:10:58 1997",
  acknowledgement = ack-nhfb,
}

@Article{Milne:1983:EDG,
  author =       "Frank Milne and Ron Weber",
  title =        "The Economics of Designing Generalized Software",
  journal =      j-CACM,
  volume =       "26",
  number =       "8",
  pages =        "582--589",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:04:32 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#MilneW83",
  acknowledgement = ack-nhfb,
  oldlabel =     "MilneW83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/MilneW83",
}

@Article{Peemoller:1983:CBM,
  author =       "J{\"{u}}rgen Peem{\"{o}}ller",
  title =        "A correction to {Br\'elaz}'s modification of {Brown}'s
                 coloring algorithm",
  journal =      j-CACM,
  volume =       "26",
  number =       "8",
  pages =        "595--597",
  month =        aug,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Jan 09 15:58:07 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/clique.color.bib",
  acknowledgement = ack-nhfb,
  annote =       "Corrects implicit enumeration algorithm in
                 \cite{Brelaz:1979:NMC}.",
}

@Article{Bentley:1983:PPA,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Aha! Algorithms",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  pages =        "623--628",
  month =        sep,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:57 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Bentley83a",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley83a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley83a",
}

@Article{McCorduck:1983:IFG,
  author =       "P. McCorduck",
  title =        "Introduction to the Fifth Generation",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  pages =        "629--630",
  month =        sep,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/prolog.bib",
  acknowledgement = ack-nhfb,
}

@Article{Licker:1983:JAB,
  author =       "Paul S. Licker",
  title =        "The {Japanese} Approach: {A} Better Way to Manage
                 Programmers?",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  pages =        "631--636",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:58:50 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Licker83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Licker83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Licker83",
}

@Article{Shapiro:1983:FGP,
  author =       "E. Y. Shapiro",
  title =        "The Fifth Generation Project --- {A} Trip Report",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  pages =        "637--641",
  month =        sep,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:34:34 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/prolog.bib",
  abstract =     "As part of Japan's effort to become a leader in the
                 computer industry, the Institute for New Generation
                 Computer Technology has launched a revolutionary
                 ten-year plan for the development of large computer
                 systems which will be applicable to knowledge
                 information processing systems. These Fifth Generation
                 computers will be built around the concepts of logic
                 programming. In order to refute the accusation that
                 Japan exploits knowledge from abroad without
                 contributing any of its own, this project will
                 stimulate original research and will make its results
                 available to the international research community.",
  acknowledgement = ack-nhfb,
}

@Article{Steier:1983:CKI,
  author =       "Rosalie Steier",
  title =        "Cooperation is the Key: An Interview with {B. R.
                 Inman}",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  pages =        "642--645",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:24:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Steier83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Steier83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Steier83",
}

@Article{Watanabe:1983:SDL,
  author =       "T. Watanabe and T. Ohsawa and T. Suzuki",
  title =        "A Simple Database Language for Personal Computers",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  pages =        "646--653",
  month =        sep,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:14:51 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "Micro MUMPS.",
  review =       "ACM CR 8405-0380",
}

@Article{Tanenbaum:1983:PTK,
  author =       "Andrew S. Tanenbaum and Hans van Staveren and E. G.
                 Keizer and J. W. Stevenson",
  title =        "A Practical Tool Kit for Making Portable Compilers",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  pages =        "654--660",
  month =        sep,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:15:03 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib",
  abstract =     "The Amsterdam Compiler Kit is an integrated collection
                 of programs designed to simplify the task of producing
                 portable (cross) compilers and interpreters. For each
                 language to be compiled, a program (called a front end)
                 must be written to translate the source program into a
                 common intermediate code. This intermediate code can be
                 optimized and then either directly interpreted or
                 translated to the assembly language of the desired
                 target machine. The paper describes the various pieces
                 of the tool kit in some detail, as well as discussing
                 the overall strategy.",
  acknowledgement = ack-nhfb,
}

@Article{Eppinger:1983:ESI,
  author =       "Jeffrey L. Eppinger",
  title =        "An Empirical Study of Insertion an Deletion in Binary
                 Search Trees",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  pages =        "663--669",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:38:01 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Eppinger83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Eppinger83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Eppinger83",
}

@Article{Loui:1983:OPG,
  author =       "Ronald Prescott Loui",
  title =        "Optimal Paths in Graphs with Stochastic or
                 Multidimensional Weights",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  pages =        "670--676",
  month =        sep,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "90B15",
  MRnumber =     "86d:90052",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Bayman:1983:DBP,
  author =       "Piraye Bayman and Richard E. Mayer",
  title =        "A Diagnosis of Beginning Programmers' Misconceptions
                 of {BASIC} Programming Statements",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  pages =        "677--679",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:04 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#BaymanM83",
  acknowledgement = ack-nhfb,
  oldlabel =     "BaymanM83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/BaymanM83",
}

@Article{Samet:1983:QMA,
  author =       "H. Samet",
  title =        "A Quadtree Medial Axis Transform",
  journal =      j-CACM,
  volume =       "26",
  number =       "9",
  address =      "USA",
  pages =        "680--693",
  month =        sep,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:40:26 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/83.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I35 data structures and I35 quadtrees",
}

@Article{Bentley:1983:PPD,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Data Structures Programs",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "726--730",
  month =        oct,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:58 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Bentley83b",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley83b",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley83b",
}

@Article{DeSanctis:1983:TFU,
  author =       "Gerardine DeSanctis and James F. Courtney",
  title =        "Toward Friendly User {MIS} Implementation",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "732--738",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:42 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#DesanctisC83",
  acknowledgement = ack-nhfb,
  oldlabel =     "DesanctisC83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DesanctisC83",
}

@Article{Guimaraes:1983:MAP,
  author =       "Tor Guimaraes",
  title =        "Managing Application Program Maintenance
                 Expenditures",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "739--746",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:47:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Guimaraes83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Guimaraes83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Guimaraes83",
}

@Article{Comer:1983:CSR,
  author =       "D. A. Comer",
  title =        "A Computer Science Research Network {CSNET}: {A}
                 History and Status Report",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "747--753",
  month =        oct,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:34:34 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib",
  acknowledgement = ack-nhfb,
  keywords =     "csnet overview",
}

@Article{Pechura:1983:EFA,
  author =       "M. A. Pechura and J. D. Schoeffler",
  title =        "Estimating File Access Time of Floppy Disks",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "754--763",
  month =        oct,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
}

@Article{Durham:1983:SCU,
  author =       "I. Durham and D. Lamb and J. Saxe",
  title =        "Spelling correction in user interfaces",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "764--773",
  month =        oct,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Jul 24 09:09:04 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; human factors",
  subject =      "D.1 Software, PROGRAMMING TECHNIQUES, General \\ D.2.2
                 Software, SOFTWARE ENGINEERING, Tools and Techniques,
                 Software libraries \\ D.2.2 Software, SOFTWARE
                 ENGINEERING, Tools and Techniques, User interfaces \\
                 H.1.2 Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human factors",
}

@Article{Davis:1983:ISS,
  author =       "Gordon B. Davis and M. H. Schwartz",
  title =        "Introduction to the Special Section on Information
                 Systems Management",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "775--??",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:34:45 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#DavisS83",
  acknowledgement = ack-nhfb,
  oldlabel =     "DavisS83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DavisS83",
}

@Article{Rockart:1983:MEU,
  author =       "J. F. Rockart and L. S. Flannery",
  title =        "The Management of End-User Computing",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "776--784",
  month =        oct,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/gesturing.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ives:1983:MUI,
  author =       "Blake Ives and Margrethe H. Olson and Jack J.
                 Baroudi",
  title =        "The Measurement of User Information Satisfaction",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "785--793",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:52:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#IvesOB83",
  acknowledgement = ack-nhfb,
  oldlabel =     "IvesOB83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/IvesOB83",
}

@Article{Kahn:1983:SRD,
  author =       "Beverly K. Kahn",
  title =        "Some Realities of Data Administration",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "794--799",
  month =        oct,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:16:18 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ivancevich:1983:OSA,
  author =       "John M. Ivancevich and H. Albert Napier and James C.
                 Wetherbe",
  title =        "Occupational Stress, Attitudes, and Health Problems in
                 the Information Systems Professionals",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "800--806",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:52:10 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#IvancevichNW83",
  acknowledgement = ack-nhfb,
  oldlabel =     "IvancevichNW83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/IvancevichNW83",
}

@Article{Bartol:1983:TAD,
  author =       "Kathryn M. Bartol",
  title =        "Turnover Among {DP} Personnel: {A} Causal Analysis",
  journal =      j-CACM,
  volume =       "26",
  number =       "10",
  pages =        "807--811",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:23:40 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Bartol83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Bartol83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bartol83",
}

@Article{Allen:1983:MKA,
  author =       "J. F. Allen",
  title =        "Maintaining Knowledge about Temporal Intervals",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "832--843",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/time.bib",
  abstract =     "An interval-based temporal logic is introduced,
                 together with a computationally effective reasoning
                 algorithm based on constraint propagation. This system
                 is notable in offering a delicate balance between
                 expressive power and the efficiency of its deductive
                 engine. A notion of reference intervals is introduced
                 which captures the temporal hierarchy implicit in many
                 domains, and which can be used to precisely control the
                 amount of deduction performed automatically by the
                 system. Examples are provided for a database containing
                 historical data, a database used for modeling processes
                 and process interaction, and a database for an
                 interactive system where the present moment is
                 continually being updated.",
  acknowledgement = ack-nhfb,
}

@Article{Bibel:1983:MM,
  author =       "Wolfgang Bibel",
  title =        "Matings in matrices",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "844--852",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68T15 (03B35)",
  MRnumber =     "86c:68071",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/formal.hardware.verification.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Logic",
  language =     "english",
}

@Article{Soloway:1983:CSL,
  author =       "Elliot Soloway and Jeffrey Bonar and Kate Ehrlich",
  title =        "Cognitive Strategies and Looping Constructs: An
                 Empirical Study",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "853--860",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:23:20 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#SolowayBE83",
  acknowledgement = ack-nhfb,
  oldlabel =     "SolowayBE83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SolowayBE83",
}

@Article{Miara:1983:PIC,
  author =       "Richard J. Miara and Joyce A. Musselman and Juan A.
                 Navarro and Ben Shneiderman",
  title =        "Program Indentation and Comprehensibility",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "861--867",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:04:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#MiaraMNS83",
  acknowledgement = ack-nhfb,
  oldlabel =     "MiaraMNS83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/MiaraMNS83",
}

@Article{Liang:1983:AAP,
  author =       "You Dong Liang and Brian A. Barsky",
  title =        "An analysis and algorithm for polygon clipping",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "868--877",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68U05",
  MRnumber =     "784 119",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.83.bib",
  note =         "See corrigenda
                 \cite{Liang:1984:CAAa,Liang:1984:CAAb}.",
  acknowledgement = ack-nhfb,
  keywords =     "I33 Line Clipping",
}

@Article{Postmus:1983:EDS,
  author =       "J. T. Postmus and A. H. G. Rinnooy Kan and G. T.
                 Timmer",
  title =        "An efficient dynamic selection method",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "878--881",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68Q25",
  MRnumber =     "784 120",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Abbott:1983:PDI,
  author =       "Russel J. Abbott",
  title =        "Program design by Informal {English} Descriptions",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "882--894",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:20:10 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Abbott83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Abbott83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Abbott83",
}

@Article{Kessels:1983:FOD,
  author =       "Joep L. W. Kessels",
  title =        "On-the-Fly Optimization of Data Structures",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "895--901",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:54:36 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Kessels83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Kessels83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Kessels83",
}

@Article{Wile:1983:PDF,
  author =       "D. Wile",
  title =        "Program developments: formal explanations of
                 implementations.",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "902--911",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 28 23:15:00 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gonnet:1983:CAD,
  author =       "G. Gonnet and F. W. Tompa",
  title =        "A constructive approach to the design of algorithms
                 and their data structures",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "912--920",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Aug 13 17:16:20 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; documentation; languages;
                 performance",
  review =       "ACM CR 8407-0561",
  subject =      "F.3 Theory of Computation, LOGICS AND MEANINGS OF
                 PROGRAMS, Miscellaneous \\ F.4 Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Formal
                 Languages \\ F.4 Theory of Computation, MATHEMATICAL
                 LOGIC AND FORMAL LANGUAGES, Grammars and Other
                 Rewriting Systems \\ D.3.3 Software, PROGRAMMING
                 LANGUAGES, Language Constructs, Data types and
                 structures E Data, DATA STRUCTURES \\ F.2 Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Miscellaneous",
}

@Article{Korsh:1983:MSM,
  author =       "James F. Korsh and Gary Laison",
  title =        "A Multiple-Stack Manipulation Procedure",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "921--923",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:55:48 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#KorshL83",
  acknowledgement = ack-nhfb,
  oldlabel =     "KorshL83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/KorshL83",
}

@Article{Bell:1983:MCS,
  author =       "R. Charles Bell and Bryan Floyd",
  title =        "A {Monte Carlo} Study of {Cichelli} Hash-Function
                 Solvability",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "924--925",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:30 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#BellF83",
  acknowledgement = ack-nhfb,
  oldlabel =     "BellF83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/BellF83",
}

@Article{Kleijnen:1983:PCC,
  author =       "Jack P. C. Kleijnen and Anton J. Van Reeken",
  title =        "Principles of Computer Charging in a University-Type
                 Organization",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "926--932",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:55:02 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#KleijnenR83",
  acknowledgement = ack-nhfb,
  oldlabel =     "KleijnenR83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/KleijnenR83",
}

@Article{OliveiRamon:1983:IDA,
  author =       "Antoni {Oliv{\'{e}} i Ramon}",
  title =        "Information Derivability Analysis in Logical
                 Information Systems",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "933--938",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:14:59 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Ramon83",
  acknowledgement = ack-nhfb,
  annote =       "a database schema and `precedence relationships'",
  oldlabel =     "Ramon83",
  review =       "ACM CR 8407-0587",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Ramon83",
}

@Article{Whang:1983:EBA,
  author =       "Kyu Young Whang and Gio Wiederhold and Daniel
                 Sagalowicz",
  title =        "Estimating Block Accesses in Database Organizations:
                 {A} Closed Noniterative Formula",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "940--944",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P15",
  MRnumber =     "784 121",
  bibdate =      "Tue Dec 26 18:03:59 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  review =       "ACM CR 8406-0477",
}

@Article{Luk:1983:EBA,
  author =       "W. S. Luk",
  title =        "On Estimating Block Accesses in Database
                 Organizations",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "945--947",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P15",
  MRnumber =     "784 122",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I/O cost estimation CACM",
}

@Article{Vitalari:1983:PSE,
  author =       "N. Vitalari and G. Dickson",
  title =        "{Problem Solving for Effective Systems Analysis: An
                 Experimental Exploration}",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "948--956",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:40:40 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/is.bib",
  acknowledgement = ack-nhfb,
}

@Article{Schruben:1983:SME,
  author =       "Lee Schruben",
  title =        "Simulation Modeling with Event Graphs",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "957--963",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:19:56 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Schruben83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Schruben83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Schruben83",
}

@Article{Fishman:1983:AVR,
  author =       "George S. Fishman and Bao Sheng D. Huang",
  title =        "Antithetic variates revisited",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "964--971",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "65C05",
  MRnumber =     "86f:65023",
  MRreviewer =   "Gheorghe Barbu",
  bibdate =      "Tue Dec 26 18:01:12 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib",
  acknowledgement = ack-nhfb,
  annote =       "in some simulation problems, for example, estimating
                 integrals by Monte Carlo methods, it is important to
                 reduce the variance of the estimates. \ldots{} A method
                 for reducing the variances was developed by Hammersley
                 and Morton in the fifties; this method is called the
                 antithetic sampling technique. This technique is viewed
                 in a new light in this article as a combination of
                 rotation and reflection sampling on a circle. some
                 practical implications \ldots{}.",
  country =      "USA",
  descriptors =  "Antithetic simulation; variance reduction;
                 simulation",
  enum =         "956",
  references =   "1",
}

@Article{Barber:1983:SRT,
  author =       "Raymond E. Barber and Henry C. {Lucas, Jr.}",
  title =        "System Response Time, Operator Productivity, and Job
                 Satisfaction",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "972--986",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:23:12 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#BarberL83",
  acknowledgement = ack-nhfb,
  oldlabel =     "BarberL83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/BarberL83",
}

@Article{Dagwell:1983:SDU,
  author =       "Ron Dagwell and Ron Weber",
  title =        "System Designers' User Models: {A} Comparative Study
                 and Methodological Critique",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "987--997",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:34:21 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#DagwellW83",
  acknowledgement = ack-nhfb,
  oldlabel =     "DagwellW83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DagwellW83",
}

@Article{Silberman:1983:SPT,
  author =       "Gabriel M. Silberman",
  title =        "Stack Processing Techniques in Delayed-Staging Storage
                 Hierarchies",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "999--1007",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:21:39 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Silberman83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Silberman83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Silberman83",
}

@Article{Petersen:1983:VFN,
  author =       "W. P. Petersen",
  title =        "{Vector Fortran} for Numerical Problems on {CRAY-1}",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "1008--1021",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:12:19 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/ovr.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Petersen83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Petersen83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Petersen83",
}

@Article{Salton:1983:EBI,
  author =       "Gerard Salton and Edward A. Fox and Harry Wu",
  title =        "Extended {Boolean} information retrieval",
  journal =      j-CACM,
  volume =       "26",
  number =       "11",
  pages =        "1022--1036",
  month =        nov,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P20",
  MRnumber =     "784 124",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "p-norms between documents and simple queries as
                 propagates for compound queries.",
  language =     "english",
  review =       "ACM CR 8407-0586",
}

@Article{Bentley:1983:PPW,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Writing Correct Programs",
  journal =      j-CACM,
  volume =       "26",
  number =       "12",
  pages =        "1040--1045",
  month =        dec,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:59 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Bentley83c",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley83c",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley83c",
}

@Article{Yau:1983:MCC,
  author =       "S. S. Yau and R. W. Ritchie and W. Semon and J. Traub
                 and A. Van Dam and S. Winkler",
  title =        "Meeting the Crisis in Computer Science",
  journal =      j-CACM,
  volume =       "26",
  number =       "12",
  pages =        "1046--1050",
  month =        dec,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Jan 28 14:42:03 1997",
  acknowledgement = ack-nhfb,
}

@Article{Morrison:1983:SAT,
  author =       "Perry R. Morrison",
  title =        "A Survey of Attitudes Toward Computers",
  journal =      j-CACM,
  volume =       "26",
  number =       "12",
  pages =        "1051--1057",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:06:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Morrison83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Morrison83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Morrison83",
}

@Article{Eisenstadt:1983:UFS,
  author =       "Marc Eisenstadt",
  title =        "A User-Friendly Software Environment for the Novice
                 Programmer",
  journal =      j-CACM,
  volume =       "26",
  number =       "12",
  pages =        "1058--1064",
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:37:46 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm26.html#Eisenstadt83",
  acknowledgement = ack-nhfb,
  oldlabel =     "Eisenstadt83",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Eisenstadt83",
}

@Article{Jalics:1983:TPO,
  author =       "P. J. Jalics and T. S. Heines",
  title =        "Transporting a Portable Operating System: {UNIX} to an
                 {IBM} Minicomputer",
  journal =      j-CACM,
  volume =       "26",
  number =       "12",
  pages =        "1066--1072",
  month =        dec,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Sep 21 23:49:09 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/unix.1.bib",
  abstract =     "The `portable' UNIX operating system was transported
                 to an IBM Series/1 minicomputer. The process of
                 transporting is described with emphasis on (1) adapting
                 to the target machine architecture; (2) the selection
                 of the approach taken to transporting; (3) a
                 description of the problems encountered; (4) the
                 degrees of portability of the UNIX system; and (5) a
                 summary of the portability lessons learned.",
  acknowledgement = ack-nhfb,
  annote =       "An operating system is a complex set of computer
                 programs that manages the execution of application
                 programs. Every computer typically has its own
                 operating system written in a machine-dependent
                 language. Thus, every time a new machine is developed a
                 new operating system and new compilers must also be
                 developed. In addition, existing application programs
                 need modification because the new operating system
                 requires facilities that are different",
  descriptors =  "OPERATING SYSTEM; REALIZATION; UNIX",
}

@Article{Gonnet:1983:BBT,
  author =       "Gaston H. Gonnet",
  title =        "Balancing Binary Trees by Internal Path Reduction",
  journal =      j-CACM,
  volume =       "26",
  number =       "12",
  pages =        "1074--1081",
  month =        dec,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P10 (68P05)",
  MRnumber =     "783 508",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Nishihara:1983:RRT,
  author =       "Seiichi Nishihara and Katsuo Ikeda",
  title =        "Reducing the retrieval time of hashing method by using
                 predictors",
  journal =      j-CACM,
  volume =       "26",
  number =       "12",
  pages =        "1082--1088",
  month =        dec,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P10",
  MRnumber =     "783 509",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Appelbe:1984:ECS,
  author =       "W. F. Appelbe and A. P. Ravn",
  title =        "Encapsulation constructs in systems programming
                 languages",
  journal =      j-CACM,
  volume =       "6",
  number =       "2",
  pages =        "129--158",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  subject =      "D.3.2 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Ada \\ D.3.3 Software, PROGRAMMING
                 LANGUAGES, Language Constructs, Modules, packages \\
                 D.4.0 Software, OPERATING SYSTEMS, General, UNIX \\
                 D.4.7 Software, OPERATING SYSTEMS, Organization and
                 Design, Hierarchical design",
}

@Article{Abrams:1984:EI,
  author =       "P. Abrams",
  title =        "Electronic islands",
  journal =      j-CACM,
  volume =       "26",
  number =       "4",
  pages =        "241--242",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  subject =      "C.2.1 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network communications \\ H.4.3 Information
                 Systems, INFORMATION SYSTEMS APPLICATIONS,
                 Communications Applications, Electronic mail",
}

@Article{Bentley:1984:PPAa,
  author =       "J. Bentley",
  title =        "Programming Pearls: Algorithm Design Techniques",
  journal =      j-CACM,
  volume =       "27",
  number =       "0",
  institution =  "BTL",
  pages =        "865--871",
  month =        sep,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:21:01 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/rosenfeld/1984.bib",
  acknowledgement = ack-nhfb,
  keywords =     "dependence image measurement; image part selection",
}

@Article{Bentley:1984:PPAb,
  author =       "J. L. Bentley",
  title =        "Programming Pearls: About the Column",
  journal =      j-CACM,
  volume =       "27",
  number =       "1",
  pages =        "12--13",
  month =        jan,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  acknowledgement = ack-nhfb,
}

@Article{Berns:1984:ASM,
  author =       "Gerald M. Berns",
  title =        "Assessing Software Maintainability",
  journal =      j-CACM,
  volume =       "27",
  number =       "1",
  pages =        "14--23",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:55 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Berns84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Berns84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Berns84",
}

@Article{Geils:1984:WSR,
  author =       "John W. Geils",
  title =        "Why Students Reject Engineering Teching Careers",
  journal =      j-CACM,
  volume =       "27",
  number =       "1",
  pages =        "25--27",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:43:30 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Geils84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Geils84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Geils84",
}

@Article{Winner:1984:SAP,
  author =       "Robert I. Winner and Edward M. Carter",
  title =        "Self-Assessment Procedure {XII}: {A} Self-Assessment
                 Procedure Dealing with Computer Architecture",
  journal =      j-CACM,
  volume =       "27",
  number =       "1",
  pages =        "29--36",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:30:19 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#WinnerC84",
  acknowledgement = ack-nhfb,
  oldlabel =     "WinnerC84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/WinnerC84",
}

@Article{Wallis:1984:RAA,
  author =       "Peter J. L. Wallis and Brian A. Wichmann",
  title =        "Requirements Analysis for {Ada} Compilers",
  journal =      j-CACM,
  volume =       "27",
  number =       "1",
  pages =        "37--41",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:27:59 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#WallisW84",
  acknowledgement = ack-nhfb,
  oldlabel =     "WallisW84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/WallisW84",
}

@Article{Basili:1984:SEC,
  author =       "Victor R. Basili and Barry T. Perricone",
  title =        "Software Errors and Complexity: An Empirical
                 Investigation",
  journal =      j-CACM,
  volume =       "27",
  number =       "1",
  pages =        "42--52",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:23:44 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#BasiliP84",
  acknowledgement = ack-nhfb,
  oldlabel =     "BasiliP84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/BasiliP84",
}

@Article{Pritchard:1984:SNR,
  author =       "Paul Pritchard",
  title =        "Some Negative Results Concerning Prime Number
                 Generators",
  journal =      j-CACM,
  volume =       "27",
  number =       "1",
  pages =        "53--57",
  month =        jan,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "11Y55 (11A41)",
  MRnumber =     "86h:11112",
  MRreviewer =   "Duncan A. Buell",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Lucas:1984:OPI,
  author =       "Henry C. {Lucas, Jr.}",
  title =        "Organizational Power and the Information Services
                 Department",
  journal =      j-CACM,
  volume =       "27",
  number =       "1",
  pages =        "58--65",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:59:56 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Lucas84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Lucas84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Lucas84",
}

@Article{Bentley:1984:PPC,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Code Tuning",
  journal =      j-CACM,
  volume =       "27",
  number =       "2",
  pages =        "91--96",
  month =        feb,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:01 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Bentley84a",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley84a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley84a",
}

@Article{Wichmann:1984:ATB,
  author =       "Brian A. Wichmann",
  title =        "Is {Ada} Too Big? {A} Designer Answers the Critics",
  journal =      j-CACM,
  volume =       "27",
  number =       "2",
  pages =        "98--103",
  month =        feb,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:29:32 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Wichmann84",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  oldlabel =     "Wichmann84",
  subject =      "D.3.2 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Ada",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Wichmann84",
}

@Article{Zave:1984:OVC,
  author =       "Pamela Zave",
  title =        "The operational versus the conventional approach to
                 software development",
  journal =      j-CACM,
  volume =       "27",
  number =       "2",
  pages =        "104--118",
  month =        feb,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/real.time.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anderson:1984:CUF,
  author =       "G. E. Anderson",
  title =        "The Coordinated Use of Five Performance Evaluation
                 Methodologies",
  journal =      j-CACM,
  volume =       "27",
  number =       "2",
  pages =        "119--125",
  month =        feb,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/monitor.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  abstract =     "During the past twelve years, there has been a rapid
                 evolution of performance evaluation from hit-and-miss
                 measurement to experimental computer science. The
                 progress in the development of algorithms for solving
                 queueing network models, for example, has been
                 remarkable. However, the many recent papers dealing
                 with performance evaluation usually have either
                 presented anew algorithm for solving queuing networks
                 or dealt with only one performance evaluation
                 methodology. This paper described the coordinated use
                 of five performance evaluation methodologies to
                 determine system performance feasibility, influence
                 system design, predict the performance attributes of
                 proposed systems, identify performance bottlenecks and
                 provide upward migration paths for a real-time
                 point-of-sale system. The methodologies applied are
                 work-load characterization, queueing network modeling,
                 load simulation, measurement with a hardware monitor,
                 and simulation modeling.",
  acknowledgement = ack-nhfb,
}

@Article{Houghton:1984:OHS,
  author =       "R. C. {Houghton, Jr.}",
  title =        "Online Help Systems: {A} Conspectus",
  journal =      j-CACM,
  volume =       "27",
  number =       "2",
  pages =        "126--133",
  month =        feb,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:34:34 1996",
  acknowledgement = ack-nhfb,
}

@Article{Hehner:1984:PPPa,
  author =       "Eric C. R. Hehner",
  title =        "Predicative Programming, Part {I}",
  journal =      j-CACM,
  volume =       "27",
  number =       "2",
  pages =        "134--143",
  month =        feb,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68Q55",
  MRnumber =     "87c:68051a",
  bibdate =      "Mon Jan 22 06:49:19 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Hehner84",
  note =         "See corrigendum \cite{Hehner:1984:CPP}.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Hehner84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Hehner84",
}

@Article{Hehner:1984:PPPb,
  author =       "Eric C. R. Hehner",
  title =        "Predicative Programming, Part {II}",
  journal =      j-CACM,
  volume =       "27",
  number =       "2",
  pages =        "144--151",
  month =        feb,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68Q55",
  MRnumber =     "87c:68051a",
  bibdate =      "Mon Jan 22 06:49:20 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Hehner84a",
  note =         "See corrigendum \cite{Hehner:1984:CPP}.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Hehner84a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Hehner84a",
}

@Article{Liang:1984:CAAb,
  author =       "You Dong Liang and Brian A. Barsky",
  title =        "Corrigendum: {``An analysis and algorithm for polygon
                 clipping''}",
  journal =      j-CACM,
  volume =       "27",
  number =       "2",
  pages =        "151--151",
  month =        feb,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68U05",
  MRnumber =     "784 126",
  bibdate =      "Tue Dec 03 18:16:17 1996",
  note =         "See \cite{Liang:1983:AAP,Liang:1984:CAAa}.",
  acknowledgement = ack-nhfb,
}

@Article{Santoro:1984:CMM,
  author =       "Nicola Santoro",
  title =        "Chain multiplication of matrices of approximately or
                 exactly the same size",
  journal =      j-CACM,
  volume =       "27",
  number =       "2",
  pages =        "152--156",
  month =        feb,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68Q25 (65F30)",
  MRnumber =     "784 127",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Bentley:1984:PPB,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: The Back of the Envelope",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "180--184",
  month =        mar,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:02 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Bentley84b",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley84b",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley84b",
}

@Article{Dallaire:1984:SCP,
  author =       "Gene Dallaire and Fortney H. Stark and Hal Berghel",
  title =        "Should Congress Provide Special Tax Incentives for
                 Firms Donating Computers to Schools?",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "185--194",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:34:28 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#DallaireSB84",
  acknowledgement = ack-nhfb,
  oldlabel =     "DallaireSB84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DallaireSB84",
}

@Article{Rogers:1984:PPT,
  author =       "Jean B. Rogers and David G. Moursund and Gerald L.
                 Engel",
  title =        "Preparing Precollege Teachers for the Computer Age",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "195--200",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:16:49 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#RogersME84",
  acknowledgement = ack-nhfb,
  oldlabel =     "RogersME84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/RogersME84",
}

@Article{Blanning:1984:CMI,
  author =       "Robert W. Blanning",
  title =        "Conversing with Management Information Systems in
                 Natural Language",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "201--207",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:26:46 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Blanning84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Blanning84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Blanning84",
}

@Article{DAuria:1984:AVP,
  author =       "Thomas A. D'Auria",
  title =        "{ACM}'s Visit to the {People's Republic of China}",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "208--214",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:34:20 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#DAuria84",
  acknowledgement = ack-nhfb,
  oldlabel =     "DAuria84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DAuria84",
}

@Article{Jalics:1984:CVP,
  author =       "Paul J. Jalics",
  title =        "{COBOL} vs. {PL/1}: Some Performance Comparisons",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "216--221",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:52:33 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Jalics84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Jalics84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Jalics84",
}

@Article{Bozman:1984:SLB,
  author =       "Gerald Bozman",
  title =        "The Software Lookaside Buffer Reduces Search Overhead
                 with Linked Lists",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "222--227",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:27:53 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Bozman84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Bozman84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bozman84",
}

@Article{Dori:1984:ENC,
  author =       "Dov Dori and Moshe Ben-Bassat",
  title =        "Efficient nesting of congruent convex figures",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "228--235",
  month =        mar,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68U05 (68U10)",
  MRnumber =     "784 128",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/84.bib",
  acknowledgement = ack-nhfb,
}

@Article{Zhang:1984:FPA,
  author =       "T. Y. Zhang and C. Y. Suen",
  title =        "A Fast Parallel Algorithm for Thinning Digital
                 Patterns",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "236--239",
  month =        mar,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:19:16 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/rosenfeld/1984.bib",
  acknowledgement = ack-nhfb,
  keywords =     "image part processing",
}

@Article{Diehr:1984:OPB,
  author =       "George Diehr and Bruce Faaland",
  title =        "Optimal pagination of {B-trees} with variable-length
                 items",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "241--247",
  month =        mar,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P05",
  MRnumber =     "784 129",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Tamminen:1984:CQO,
  author =       "Markku Tamminen",
  title =        "Comments on quad- and octtrees",
  journal =      j-CACM,
  volume =       "27",
  number =       "3",
  pages =        "248--249",
  month =        mar,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:19:38 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.84.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I35 Octrees; I35 Quadtrees",
}

@Article{Bentley:1984:PPH,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: How to Sort",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "287--291",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:03 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Bentley84c",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley84c",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley84c",
}

@Article{Dallaire:1984:AUN,
  author =       "Gene Dallaire",
  title =        "{American} Universities Need Greater Access to
                 Supercomputers",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "293--298",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:34:27 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Dallaire84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Dallaire84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Dallaire84",
}

@Article{Hayes:1984:ASN,
  author =       "Edward F. Hayes",
  title =        "Access to Supercomputers: An {NSF} Perspective
                 (Interview)",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "299--303",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:49:04 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Hayes84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Hayes84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Hayes84",
}

@Article{Anonymous:1984:CIR,
  author =       "Anonymous",
  title =        "Coping with the imprecision of the real world. An
                 interview with {Lotfi A. Zadeh}",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "304--311",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "01A65 (03-03) 03E72",
  MRnumber =     "86h:01065",
  bibdate =      "Mon Jan 22 07:31:28 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Zadeh84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Zadeh84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Zadeh84",
}

@Article{Denning:1984:CCP,
  author =       "Peter J. Denning and Donn B. Parker and Susan H. Nycum
                 and Willis H. Ware",
  title =        "Computers, Crime and Privacy --- {A} National Dilema,
                 Congressional Testimony from the Industry",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "312--321",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:33 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#DenningPNW84",
  acknowledgement = ack-nhfb,
  oldlabel =     "DenningPNW84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DenningPNW84",
}

@Article{Tucker:1984:PMT,
  author =       "Allen B. Tucker",
  title =        "A Perspective on Machine Translation: Theory and
                 Practice",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "322--329",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:26:44 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Tucker84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Tucker84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Tucker84",
}

@Article{Mulder:1984:CSP,
  author =       "Michael C. Mulder and John F. Dalphin",
  title =        "Computer Science Program Requirements and
                 Accreditation, An Interim Report of the {ACM\slash IEEE
                 Computer Society Joint Task Force}",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "330--335",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:06:34 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#MulderD84",
  acknowledgement = ack-nhfb,
  oldlabel =     "MulderD84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/MulderD84",
}

@Article{Sammet:1984:SRP,
  author =       "Jean E. Sammet and Bernard Rous",
  title =        "Special Report: Progress Report on the {ACM Guide to
                 Computing Literature}",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "336--341",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:22:59 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#SmmetR84",
  acknowledgement = ack-nhfb,
  oldlabel =     "SmmetR84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SmmetR84",
}

@Article{Neumann:1984:FVF,
  author =       "Peter G. Neumann",
  title =        "A Further View of the First Quarter Century:
                 Introduction to the {April 1984} Special Section",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "343--??",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:07:53 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Neumann84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Neumann84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Neumann84",
}

@Article{Knuth:1984:CSA,
  author =       "Donald E. Knuth",
  title =        "The Complexity of Songs ({April 1984} Special
                 Section)",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "344--348",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68Q25 (03D15)",
  MRnumber =     "87c:68032a",
  bibdate =      "Mon Jan 22 06:55:27 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Knuth84",
  note =         "See corrigendum \cite{Knuth:1984:CCS}.",
  acknowledgement = ack-nhfb,
  oldlabel =     "Knuth84",
  subject =      "J.5 Computer Applications, ARTS AND HUMANITIES,
                 Music",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Knuth84",
}

@Article{Clark:1984:LCG,
  author =       "R. Lawrence Clark",
  title =        "A Linuistic Contribution to Goto-Less Programming
                 ({April 1984} Special Section)",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "349--350",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:31:26 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Clark84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Clark84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Clark84",
}

@Article{Nedginn:1984:CAP,
  author =       "Preet J. Nedginn and Trebor L. Bworn",
  title =        "{CLOG}: An {Ada} Package for Automatic Footnote
                 Generation in {UNIX} ({April 1984} Special Section)",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "351--??",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:07:31 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#NedginnB84",
  acknowledgement = ack-nhfb,
  keywords =     "typography",
  oldlabel =     "NedginnB84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/NedginnB84",
}

@Article{Brown:1984:LTI,
  author =       "P. J. Brown",
  title =        "Languages: Three Interviews ({April 1984} Special
                 Section)",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "352--355",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:28:23 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Brown84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Brown84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Brown84",
}

@Article{Cadwallader-Cohen:1984:CIA,
  author =       "J. B. Cadwallader-Cohen and W. W. Zysic and R. B.
                 Donnelly",
  title =        "The {Chaostron}: An Important Advance in Learning
                 Machines ({April 1984} Special Section)",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "356--357",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:29:13 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Cadwallader-CohenZD84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Cadwallader-CohenZD84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Cadwallader-CohenZD84",
}

@Article{Pollock:1984:ASC,
  author =       "J. J. Pollock and A. Zamora",
  title =        "Automatic spelling correction in scientific and
                 scholarly text",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "358--368",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Jul 24 09:09:04 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms",
  subject =      "H.4.1 Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Office Automation, Word processing \\
                 I.7.1 Computing Methodologies, TEXT PROCESSING, Text
                 Editing, Spelling",
}

@Article{Blair:1984:DDD,
  author =       "David C. Blair",
  title =        "The Data-Document Distinction in Information
                 Retrieval",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "369--374",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:26:43 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Blair84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Blair84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Blair84",
}

@Article{Benbasat:1984:CAB,
  author =       "Izak Benbasat and Yair Wand",
  title =        "Command abbreviation behavior in human-computer
                 interaction",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "376--383",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:20:03 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1984.bib",
  acknowledgement = ack-nhfb,
  annote =       "This paper reports the findings of an experiment
                 conducted to observe the command abbreviation behavior
                 of users of an interactive decision-support system.",
  country =      "USA",
  descriptors =  "Command language; human factors",
  enum =         "253",
  references =   "16",
}

@Article{Liang:1984:CAAa,
  author =       "You Dong Liang and Brian A. Barsky",
  title =        "Corrigendum: {``An analysis and algorithm for polygon
                 clipping''}",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "383",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68U05",
  MRnumber =     "784 132",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  note =         "See \cite{Liang:1983:AAP,Liang:1984:CAAb}.",
  acknowledgement = ack-nhfb,
}

@Article{Chang:1984:SOM,
  author =       "C. C. Chang",
  title =        "The Study of an Ordered Minimal Perfect Hashing
                 Scheme",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "384--387",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P10",
  MRnumber =     "86d:68016",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib",
  note =         "The English translation of Ref.~6 of this paper
                 appears in \cite{Hua:1982:INT}; that book contains the
                 fundamental prime number functions needed for the
                 ordered minimal perfect hash functions described
                 here.",
  acknowledgement = ack-nhfb,
  annote =       "Chang uses hash functions of the form
                 $h(x)=(C\bmod{}p(x))$ where $C$ is an integer constant
                 and $p(x)$ generates a different prime for each integer
                 $x$. No general method for finding $p(x)$ is given.",
}

@Article{Denning:1984:DSR,
  author =       "Dorothy E. Denning",
  title =        "Digital Signatures with {RSA} and Other Public-Key
                 Cryptosystems",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "388--392",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P25",
  MRnumber =     "784 134",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Rivest:1984:HEE,
  author =       "Ronald L. Rivest and Adi Shamir",
  title =        "How to Expose an Eavesdropper",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "393--395",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:18:33 1997",
  acknowledgement = ack-nhfb,
}

@Article{Bentley:1984:PPS,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Squeezing Space",
  journal =      j-CACM,
  volume =       "27",
  number =       "5",
  pages =        "416--421",
  month =        may,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:04 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Bentley84d",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley84d",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley84d",
}

@Article{Graham:1984:LPC,
  author =       "Robert L. Graham",
  title =        "The Legal Protection of Computer Software",
  journal =      j-CACM,
  volume =       "27",
  number =       "5",
  pages =        "422--426",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:45:58 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Graham84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Graham84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Graham84",
}

@Article{Giddings:1984:AUS,
  author =       "Richard V. Giddings",
  title =        "Accommodating Uncertainty in Software Design",
  journal =      j-CACM,
  volume =       "27",
  number =       "5",
  pages =        "428--434",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:44:07 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Giddings84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Giddings84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Giddings84",
}

@Article{Gupta:1984:SAP,
  author =       "Gopal K. Gupta",
  title =        "Self-Assessment Procedure {XIII}: {A} Self-Assessment
                 Procedure Dealing with Binary Trees and {B}-Trees",
  journal =      j-CACM,
  volume =       "27",
  number =       "5",
  pages =        "435--443",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:47:18 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Gupta84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Gupta84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Gupta84",
}

@Article{Wada:1984:VMS,
  author =       "Ben Tsutom Wada",
  title =        "A Virtual Memory System for Picture Processing",
  journal =      j-CACM,
  volume =       "27",
  number =       "5",
  pages =        "444--454",
  month =        may,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:20:22 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/rosenfeld/1984.bib",
  acknowledgement = ack-nhfb,
  keywords =     "digital; image processing",
}

@Article{Finn:1984:AOB,
  author =       "Gerard D. Finn",
  title =        "An Algorithm for Optimized {Boolean} Evaluation in
                 Information Management Systems",
  journal =      j-CACM,
  volume =       "27",
  number =       "5",
  pages =        "455--464",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:39:39 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Finn84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Finn84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Finn84",
}

@Article{King:1984:EOI,
  author =       "John Leslie King and Kenneth L. Kraemer",
  title =        "Evolution and Organizational Information Systems: An
                 Assessment of {Nolan}'s Stage Model",
  journal =      j-CACM,
  volume =       "27",
  number =       "5",
  pages =        "466--475",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:54:54 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#KingK84",
  acknowledgement = ack-nhfb,
  oldlabel =     "KingK84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/KingK84",
}

@Article{Benbasat:1984:CSH,
  author =       "Izak Benbasat and Albert S. Dexter and Donald H. Drury
                 and Robert C. Goldstein",
  title =        "A Critique of the Stage Hypothesis: Theory and
                 Empirical Evidence",
  journal =      j-CACM,
  volume =       "27",
  number =       "5",
  pages =        "476--485",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:24:44 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#BenbasatDDG84",
  acknowledgement = ack-nhfb,
  oldlabel =     "BenbasatDDG84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/BenbasatDDG84",
}

@Article{Becker:1984:DSD,
  author =       "R. A. Becker and J. M. Chambers",
  title =        "Design of the {S} System for Data Analysis",
  journal =      j-CACM,
  volume =       "27",
  number =       "5",
  pages =        "486--495",
  month =        may,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:40:44 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.84.bib",
  acknowledgement = ack-nhfb,
  keywords =     "and I3m Data Analysis; statistics",
}

@Article{Bentley:1984:PPG,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Graphic Output",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "529--536",
  month =        jun,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:05 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.84.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Bentley84e",
  acknowledgement = ack-nhfb,
  keywords =     "I34 Programming Skills; programming pearls",
  oldlabel =     "Bentley84e",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley84e",
}

@Article{Dallaire:1984:CMS,
  author =       "Gene Dallaire and John Shattuck and Richard P.
                 Kusserow",
  title =        "Computer Matching: Should It Be Banned?",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "537--545",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:34:29 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#DallaireSK84",
  acknowledgement = ack-nhfb,
  oldlabel =     "DallaireSK84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DallaireSK84",
}

@Article{Shattuck:1984:CMI,
  author =       "J. Shattuck",
  title =        "Computer Matching is a Serious Threat to Individual
                 Rights",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "538",
  month =        jun,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  keywords =     "privacy social security civil liberties union multiple
                 distributed heterogeneous databases CACM",
}

@Article{Kusserow:1984:GNC,
  author =       "R. P. Kusserow",
  title =        "The Government Needs Computer Matching to Root Out
                 Waste and Fraud",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "542",
  month =        jun,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  keywords =     "privacy social security civil liberties union multiple
                 distributed heterogeneous databases CACM",
}

@Article{Fujitani:1984:LOD,
  author =       "Larry Fujitani",
  title =        "Laser Optical Disk: The Coming Revolution in On-Line
                 Storage",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "546--554",
  month =        jun,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib",
  acknowledgement = ack-nhfb,
  annote =       "Includes description of new 5 1/4in disc by Shugart
                 Corp.",
  keywords =     "misc hardware",
}

@Article{Alavi:1984:APA,
  author =       "M. Alavi",
  title =        "An Assessment of the Prototyping Approach to
                 Information Systems Development",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "556--563",
  month =        jun,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:21:56 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hinxman:1984:UDU,
  author =       "Anthony I. Hinxman",
  title =        "Updating a Database in an Unsafe Environment",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "564--566",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:50:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Hinxman84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Hinxman84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Hinxman84",
}

@Article{Glinert:1984:LFV,
  author =       "E. P. Glinert and R. E. Ladner",
  title =        "A large font virtual terminal interface: a software
                 prosthesis for the visually impaired",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "567--572",
  month =        jun,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors",
  subject =      "D.2.2 Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces \\ D.4.4 Software,
                 OPERATING SYSTEMS, Communications Management, Buffering
                 \\ D.4.4 Software, OPERATING SYSTEMS, Communications
                 Management, Input/Output \\ D.4.4 Software, OPERATING
                 SYSTEMS, Communications Management, Terminal management
                 \\ D.4.7 Software, OPERATING SYSTEMS, Organization and
                 Design, Interactive systems",
}

@Article{Wilensky:1984:TUE,
  author =       "Robert Wilensky and Yigal Arens and David N. Chin",
  title =        "Talking to {UNIX} in {English}: An Overview of {UC}",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "574--593",
  month =        jun,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:22:04 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/nlg.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hehner:1984:CPP,
  author =       "Eric C. R. Hehner",
  title =        "Corrigendum: {``Predicative programming. I, II''}",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "593--593",
  month =        jun,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "593.68Q55",
  MRnumber =     "87c:68051b",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  note =         "See \cite{Hehner:1984:PPa,Hehner:1984:PPb}.",
  acknowledgement = ack-nhfb,
}

@Article{Knuth:1984:CCS,
  author =       "Donald E. Knuth",
  title =        "Corrigendum: {``The complexity of songs''}",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "593--593",
  month =        jun,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68Q25 (03D15)",
  MRnumber =     "87c:68032b",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  note =         "See \cite{Knuth:1984:CS}.",
  acknowledgement = ack-nhfb,
}

@Article{Lai:1984:APB,
  author =       "Ten Hwang Lai and Sartaj Sahni",
  title =        "Anomalies in Parallel Branch-and-Bound Algorithms",
  journal =      j-CACM,
  volume =       "27",
  number =       "6",
  pages =        "594--602",
  month =        jun,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68Q20 (65W05 90C35)",
  MRnumber =     "806 435",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/constr.logic.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.branch.and.bound.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bentley:1984:PPU,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Updates",
  journal =      j-CACM,
  volume =       "27",
  number =       "7",
  pages =        "630--636",
  month =        jul,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Bentley84f",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley84f",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley84f",
}

@Article{Steier:1984:MU,
  author =       "Rosalie Steier",
  title =        "An {MCC} Update",
  journal =      j-CACM,
  volume =       "27",
  number =       "7",
  pages =        "636--637",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:24:07 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Steier84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Steier84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Steier84",
}

@Article{Anonymous:1984:CGC,
  author =       "{Anonymous}",
  title =        "Computer Graphics Comes of Age, An Interview with
                 {Andries van Dam}",
  journal =      j-CACM,
  volume =       "27",
  number =       "7",
  pages =        "638--648",
  month =        jul,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:34:30 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.84.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/84.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Dam84",
  acknowledgement = ack-nhfb,
  keywords =     "CACM; general; I30 Future Advances",
  oldlabel =     "Dam84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Dam84",
}

@Article{Gifford:1984:TRS,
  author =       "D. Gifford and A. Spector",
  title =        "The {TWA} Reservation System",
  journal =      j-CACM,
  volume =       "27",
  number =       "7",
  pages =        "649--669",
  month =        jul,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Sep 22 00:03:45 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  acknowledgement = ack-nhfb,
  annote =       "interview transcript of airlines application of PARS
                 under ACP, running at 200 transactions/second on an IBM
                 9083 (mod 3083) with 144 3350 disks.",
}

@Article{Larson:1984:FOI,
  author =       "Per-{\AA}ke Larson and Ajay Kajla",
  title =        "File Organization: Implementation of a Method
                 Guaranteeing Retrieval in One Access",
  journal =      j-CACM,
  volume =       "27",
  number =       "7",
  pages =        "670--677",
  month =        jul,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Jul 21 09:21:04 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/networking.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kaunitz:1984:ATC,
  author =       "John Kaunitz and Louis van Ekert",
  title =        "Audit Trail Compaction for Database Recovery",
  journal =      j-CACM,
  volume =       "27",
  number =       "7",
  pages =        "678--683",
  month =        jul,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue May 2 16:17:53 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "Delete redundant afterimages.",
  review =       "ACM CR 8502-0133",
}

@Article{Tilove:1984:NOD,
  author =       "R. B. Tilove",
  title =        "A Null-Object Detection Algorithm for Constructive
                 Solid Geometry",
  journal =      j-CACM,
  volume =       "27",
  number =       "7",
  pages =        "684--694",
  month =        jul,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:40:53 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.84.bib",
  acknowledgement = ack-nhfb,
  keywords =     "I35 Constructive Solid Geometry; I35 Null-Object
                 Detection Algorithm",
}

@Article{Chang:1984:EAG,
  author =       "Hsi Chang and S. Sitharama Iyengar",
  title =        "Efficient Algorithms to Globally Balance a Binary
                 Search Tree",
  journal =      j-CACM,
  volume =       "27",
  number =       "7",
  pages =        "695--702",
  month =        jul,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:16:07 1997",
  acknowledgement = ack-nhfb,
}

@Article{Vitter:1984:FMR,
  author =       "Jeffrey Scott Vitter",
  title =        "Faster Methods for Random Sampling",
  journal =      j-CACM,
  volume =       "27",
  number =       "7",
  pages =        "703--718",
  month =        jul,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "65C20",
  MRnumber =     "86f:65032",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Babad:1984:END,
  author =       "Y. M. Babad and J. F. Hoffer",
  title =        "Even No Data Has {A} Value",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "748--756",
  month =        aug,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 12 14:34:34 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "missing data in programming, statistics, and
                 hierarchical databases.",
}

@Article{Ritchie:1984:RSR,
  author =       "Dennis M. Ritchie",
  title =        "Reflections on Software Research",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "758--760",
  month =        aug,
  year =         "1984",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/358198.358207",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:18:03 1997",
  acknowledgement = ack-nhfb,
  remark =       "This is part one of the 1983 Turing Award Lecture.",
}

@Article{Thompson:1984:RTT,
  author =       "Ken Thompson",
  title =        "Reflections on Trusting Trust",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "761--763",
  month =        aug,
  year =         "1984",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/358198.358210",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib",
  acknowledgement = ack-nhfb,
  keywords =     "security unix",
  remark =       "This is part two of the 1983 Turing Award Lecture.",
}

@Article{Madhavji:1984:VAP,
  author =       "Nazim H. Madhavji",
  title =        "Visibility Aspects of Programmed Dyamic Data
                 Structures",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "764--776",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:00:46 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Madhavji84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Madhavji84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Madhavji84",
}

@Article{Haskett:1984:PAU,
  author =       "James A. Haskett",
  title =        "Pass-Algorithms: {A} User Validation Scheme Based on
                 Knowledge of Secret Algorithms",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "777--781",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:48:51 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Haskett84",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
  oldlabel =     "Haskett84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Haskett84",
}

@Article{Jones:1984:IIU,
  author =       "Douglas W. Jones",
  title =        "Improved Interpretation of {UNIX}-Like File Names
                 Embedded in Data",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "782--784",
  year =         "1984",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/358198.358215",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:53:04 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Jones84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Jones84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Jones84",
}

@Article{Markowitz:1984:EAD,
  author =       "H. M. Markowitz and A. Malhotra and D. P. Pazel",
  title =        "The {EAS}-{E} Application Development System:
                 Principles and Language Summary",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "785--799",
  month =        aug,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  note =         "Also published in/as: IBM, Res. R. No. RC9910, Apr.
                 1983.",
  acknowledgement = ack-nhfb,
  annote =       "Report generator, using entity-attribute-set model
                 (equiv. to ER) implementation for VM370.",
}

@Article{Carroll:1984:TWU,
  author =       "John M. Carroll and Caroline Carrithers",
  title =        "Training Wheels in a User Interface",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "800--806",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:29:50 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#CarrollC84",
  acknowledgement = ack-nhfb,
  oldlabel =     "CarrollC84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/CarrollC84",
}

@Article{Brownrigg:1984:WMF,
  author =       "D. R. K. Brownrigg",
  title =        "The Weighted Median Filter",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  institution =  "U London",
  pages =        "807--818",
  month =        aug,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:20:35 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/rosenfeld/1984.bib",
  acknowledgement = ack-nhfb,
  keywords =     "image processing; quality",
}

@Article{Davies:1984:MOP,
  author =       "D. Julian M. Davies",
  title =        "Memory Occupancy Patterns in Garbage Collection
                 Systems",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "819--825",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:34:37 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Davies84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Davies84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Davies84",
}

@Article{Gremillion:1984:DPR,
  author =       "Lee L. Gremillion",
  title =        "Determinants of Program Repair Maintenance
                 Requirements",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "826--832",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:46:27 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Gremillion84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Gremillion84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Gremillion84",
}

@Article{Bentley:1984:PPAc,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Algorithm Design Techniques",
  journal =      j-CACM,
  volume =       "27",
  number =       "9",
  pages =        "865--871",
  month =        sep,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:07 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Bentley84g",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley84g",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley84g",
}

@Article{Gifford:1984:SSP,
  author =       "David K. Gifford and Alfred Z. Spector",
  title =        "The {Space Shuttle} Primary Computer System",
  journal =      j-CACM,
  volume =       "27",
  number =       "9",
  pages =        "872--900",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:44:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#GiffordS84a",
  acknowledgement = ack-nhfb,
  oldlabel =     "GiffordS84a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/GiffordS84a",
}

@Article{Spector:1984:SSP,
  author =       "A. Spector and D. Gifford",
  title =        "The Space Shuttle Primary Computer System",
  journal =      j-CACM,
  volume =       "27",
  number =       "9",
  pages =        "874--900",
  month =        sep,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Sep 09 12:08:37 1994",
  bibsource =    "file://sunrise/tmp/bibdb/public.bib-bcl",
  abstract =     "IBM's Federal Systems Division is responsible for
                 supplying `error-free' software for NASA's Space
                 Shuttle Program. Case Studies editors David Gifford and
                 Alfred Spector interview the people responsible for
                 designing, building, and maintaining the Shuttle's
                 Primary Avionics and Software System.",
  acknowledgement = ack-nhfb,
}

@Article{Ng:1984:ISS,
  author =       "Edward Ng and Paul B. Schneck",
  title =        "Introduction to the Special Section on Computing in
                 Space",
  journal =      j-CACM,
  volume =       "27",
  number =       "9",
  pages =        "901--??",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:09:20 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#NgS84",
  acknowledgement = ack-nhfb,
  oldlabel =     "NgS84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/NgS84",
}

@Article{Trevathan:1984:DAN,
  author =       "Charles E. Trevathan and Thomas D. Taylor and Raymond
                 G. Hartenstein and Ann. C. Merwarth and William N.
                 Stewart",
  title =        "Development and Application of {NASA}'s First Standard
                 Spacecraft Computer",
  journal =      j-CACM,
  volume =       "27",
  number =       "9",
  pages =        "902--913",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:26:34 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#TrevathanTHMS84",
  acknowledgement = ack-nhfb,
  oldlabel =     "TrevathanTHMS84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/TrevathanTHMS84",
}

@Article{Madden:1984:DDI,
  author =       "William A. Madden and Kyle Y. Rone",
  title =        "Design, Development, Integration: {Space Shuttle}
                 Primary Flight Software System",
  journal =      j-CACM,
  volume =       "27",
  number =       "9",
  pages =        "914--925",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:00:45 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#MaddenR84",
  acknowledgement = ack-nhfb,
  oldlabel =     "MaddenR84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/MaddenR84",
}

@Article{Carlow:1984:ASS,
  author =       "G. D. Carlow",
  title =        "Architecture of the Space Shuttle Primary Avionics
                 Software System",
  journal =      j-CACM,
  volume =       "27",
  number =       "9",
  pages =        "926--937",
  month =        sep,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/softeng.bib",
  abstract =     "Many lessons have been learned over the last 20 years
                 about the development of large, complex systems.
                 Structured programming techniques used for
                 implementation have led to improved software quality
                 and maintainability. Compilers and other tools have
                 been developed to improve productivity and reliability.
                 Management procedures have evolved that improved the
                 control and stability of the development process.
                 However, as effective as they all are, these tools and
                 techniques along cannot prevent or overcome the
                 problems that will exist if a well-structured system
                 architecture has not been established on the front end
                 of the development process. Such an architecture, as
                 described in this article, has been developed by the
                 IBM Federal Systems Division for NASA's Space Shuttle
                 Orbiter Primary Avionics Software System (PASS). PASS
                 performs a critical role in virtually all operational
                 aspects of the Space Shuttle Orbiter. It employs
                 state-of-the-art multiple computer redundancy
                 management concepts and incorporates a multitude of
                 functions required to support Shuttle operations on the
                 ground and in flight. Influenced by software
                 engineering concepts evolved in recent years, the
                 software organization responsible for development of
                 this system has implemented a design architecture and
                 executed plans and procedures that resulted in the
                 top-down integration and delivery of incremental
                 software releases. User schedule and capability
                 requirements have been satisfied and numerous
                 requirements modifications have been accommodated in a
                 very controlled and timely manner.",
  acknowledgement = ack-nhfb,
}

@Article{Gomaa:1984:SDM,
  author =       "Hassan Gomaa",
  title =        "A Software Design Method for Real-Time Systems",
  journal =      j-CACM,
  volume =       "27",
  number =       "9",
  pages =        "938--949",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:45:16 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Gomaa84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Gomaa84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Gomaa84",
}

@Article{Maude:1984:HPA,
  author =       "Tim Maude and Derwent Maude",
  title =        "Hardware Protection Against Software Piracy",
  journal =      j-CACM,
  volume =       "27",
  number =       "9",
  pages =        "950--959",
  month =        sep,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:17:18 1997",
  acknowledgement = ack-nhfb,
}

@Article{Good:1984:BUD,
  author =       "M. D. Good and J. A. Whiteside and D. R. Wixon and S.
                 J. Jones",
  title =        "Building a user-derived interface",
  journal =      j-CACM,
  volume =       "27",
  number =       "9",
  pages =        "1032--1043",
  month =        sep,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Aug 14 18:32:13 MDT 1994",
  acknowledgement = ack-nhfb,
  keywords =     "experimentation; human factors",
  subject =      "D.2.2 Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces \\ H.1.2 Information
                 Systems, MODELS AND PRINCIPLES, User/Machine Systems,
                 Human factors \\ H.4.3 Information Systems, INFORMATION
                 SYSTEMS APPLICATIONS, Communications Applications,
                 Electronic mail",
}

@Article{Ichbiah:1984:APP,
  author =       "Jean Ichbiah",
  title =        "{Ada}: Past, Present, Future, An Interview with {Jean
                 Ichbiah}, the Principle Designer of {Ada}",
  journal =      j-CACM,
  volume =       "27",
  number =       "10",
  pages =        "990--997",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:51:41 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Ichbiah84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Ichbiah84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Ichbiah84",
}

@Article{Koffman:1984:RCC,
  author =       "Elliot B. Koffman and Philip L. Miller and Caroline E.
                 Wardle",
  title =        "Recommended Curriculum for {CS1}, 1984",
  journal =      j-CACM,
  volume =       "27",
  number =       "10",
  pages =        "998--1001",
  month =        oct,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:16:52 1997",
  acknowledgement = ack-nhfb,
}

@Article{Ralston:1984:FCC,
  author =       "Anthony Ralston",
  title =        "The First Course in Computer Science Needs a
                 Mathematical Corequisite",
  journal =      j-CACM,
  volume =       "27",
  number =       "10",
  pages =        "1002--1009",
  month =        oct,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:17:45 1997",
  acknowledgement = ack-nhfb,
}

@Article{Ashenhurst:1984:CIL,
  author =       "Robert L. Ashenhurst",
  title =        "A Conference on Information Law and Ethics",
  journal =      j-CACM,
  volume =       "27",
  number =       "10",
  pages =        "1006--1007",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:22:10 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Ashenhurst84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Ashenhurst84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Ashenhurst84",
}

@Article{Krishna:1984:OCC,
  author =       "C. M. Krishna and Kang G. Shin and Yann-Hang Lee",
  title =        "Optimization Criteria for Checkpoint Placement",
  journal =      j-CACM,
  volume =       "27",
  number =       "10",
  pages =        "1008--1012",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:56:17 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#KrishnaSL84",
  acknowledgement = ack-nhfb,
  oldlabel =     "KrishnaSL84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/KrishnaSL84",
}

@Article{Weicker:1984:DSS,
  author =       "Reinhold Weicker",
  title =        "{DHRYSTONE}: {A} Synthetic Systems Programming
                 Benchmark",
  journal =      j-CACM,
  volume =       "27",
  number =       "10",
  pages =        "1013--1030",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:28:47 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Weicker84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Weicker84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Weicker84",
}

@Article{Marcus:1984:AAI,
  author =       "Robert Marcus",
  title =        "An Application of Artificial Intelligence to
                 Operations Research",
  journal =      j-CACM,
  volume =       "27",
  number =       "10",
  pages =        "1044--1047",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:01:44 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Marcus84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Marcus84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Marcus84",
}

@Article{Bentley:1984:PPP,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Perspective on Performance",
  journal =      j-CACM,
  volume =       "27",
  number =       "11",
  pages =        "1087--1092",
  month =        nov,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:08 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Bentley84h",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley84h",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley84h",
}

@Article{Campbell:1984:PSF,
  author =       "Patricia F. Campbell and George P. McCabe",
  title =        "Predicting the Success of Freshmen in a Computer
                 Science Major",
  journal =      j-CACM,
  volume =       "27",
  number =       "11",
  pages =        "1108--1113",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:29:24 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#CampbellM84",
  acknowledgement = ack-nhfb,
  oldlabel =     "CampbellM84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/CampbellM84",
}

@Article{Mathews:1984:CCR,
  author =       "Walter M. Mathews and Kaye Reifers",
  title =        "The Computer in Cartoons: {A} Retrospective from the
                 {Saturday Review}",
  journal =      j-CACM,
  volume =       "27",
  number =       "11",
  pages =        "1114--1119",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:02:09 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#MathewsR84",
  acknowledgement = ack-nhfb,
  oldlabel =     "MathewsR84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/MathewsR84",
}

@Article{Arnold:1984:SMW,
  author =       "Robert S. Arnold and Norman F. Schneidewind and
                 Nicholas Zvegintzov",
  title =        "A Software Maintenance Workshop",
  journal =      j-CACM,
  volume =       "27",
  number =       "11",
  pages =        "1120--1121",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:22:00 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#ArnoldSZ84",
  acknowledgement = ack-nhfb,
  oldlabel =     "ArnoldSZ84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/ArnoldSZ84",
}

@Article{Medsker:1984:IDS,
  author =       "Larry R. Medsker",
  title =        "An Interactive Decision Support System for Energy
                 Policy Analysis",
  journal =      j-CACM,
  volume =       "27",
  number =       "11",
  pages =        "1122--1128",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:03:37 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Medsker84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Medsker84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Medsker84",
}

@Article{Hansen:1984:RAD,
  author =       "James V. Hansen and William F. Messier",
  title =        "A Relational Approach to Decision Support for {EDP}
                 Auditing",
  journal =      j-CACM,
  volume =       "27",
  number =       "11",
  pages =        "1129--1133",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:48:22 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#HansenM84",
  acknowledgement = ack-nhfb,
  oldlabel =     "HansenM84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/HansenM84",
}

@Article{Valiant:1984:TL,
  author =       "Leslie G. Valiant",
  title =        "A Theory of the Learnable",
  journal =      j-CACM,
  volume =       "27",
  number =       "11",
  pages =        "1134--1142",
  month =        nov,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:42:36 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/colt.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/data-mining.pryke.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/handbook.prob.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/inductive.inference.bib",
  abstract =     "Humans appear to be able to learn new concepts without
                 needing to be programmed explicitly in any conventional
                 sense. In this paper we regard learning as the
                 phenomenon of knowledge acquisition in the absence of
                 specific programming. We give a precise methodology for
                 studying this phenomenon from a computational
                 viewpoint. It consists of choosing an appropriate
                 information gathering mechanism, the learning protocol,
                 and exploring the class of concepts that can be learned
                 using it in a reasonable (polynomial) number of steps.
                 Although inherent algorithmic complexity appears to set
                 serious limits to the range of concepts that can be
                 learned, we show that there are some important
                 nontrivial classes of propositional concepts that can
                 be learned in a realistic sense.",
  acknowledgement = ack-nhfb,
  comment =      "Defines `learnability' wrt EXAMPLES and ORACLE using
                 arbitrary probability measure on event space. Shows
                 k-CNF learnable from examples only.",
}

@Article{Hickey:1984:PAF,
  author =       "Tim Hickey and Jacques Cohen",
  title =        "Performance Analysis of On-the-Fly Garbage
                 Collection",
  journal =      j-CACM,
  volume =       "27",
  number =       "11",
  pages =        "1143--1154",
  month =        nov,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bentley:1984:PPL,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: {A} Little Program, {A} Lot of
                 Fun",
  journal =      j-CACM,
  volume =       "27",
  number =       "12",
  pages =        "1179--1182",
  month =        dec,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:09 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Bentley84i",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley84i",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley84i",
}

@Article{Davis:1984:SPF,
  author =       "Gordon B. Davis",
  title =        "Selected Papers from the {Fifth International
                 Conference on Information Systems} --- Introduction",
  journal =      j-CACM,
  volume =       "27",
  number =       "12",
  pages =        "1183--??",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:34:40 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Davis84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Davis84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Davis84",
}

@Article{Attewell:1984:COW,
  author =       "Paul Attewell and James Rule",
  title =        "Computing and Organizations: What We Know and What We
                 Don't Know",
  journal =      j-CACM,
  volume =       "27",
  number =       "12",
  pages =        "1184--1192",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:22:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#AttewellR84",
  acknowledgement = ack-nhfb,
  oldlabel =     "AttewellR84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/AttewellR84",
}

@Article{Ives:1984:ISC,
  author =       "Blake Ives and Gerard P. Learmonth",
  title =        "The Information System as a Competitive Weapon",
  journal =      j-CACM,
  volume =       "27",
  number =       "12",
  pages =        "1193--1201",
  month =        Dec,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/EDI.bib",
  acknowledgement = ack-nhfb,
}

@Article{Franz:1984:IUL,
  author =       "Charles R. Franz and Daniel Robey",
  title =        "An Investigation of User-Led System Design: Rational
                 and Political Perspectives",
  journal =      j-CACM,
  volume =       "27",
  number =       "12",
  pages =        "1202--1209",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:41:31 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#FranzR84",
  acknowledgement = ack-nhfb,
  oldlabel =     "FranzR84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/FranzR84",
}

@Article{Turner:1984:CMW,
  author =       "Jon Turner",
  title =        "Computer Mediated Work: The Interplay Between
                 Technology and Structured Jobs",
  journal =      j-CACM,
  volume =       "27",
  number =       "12",
  pages =        "1210--1217",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:26:51 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Turner84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Turner84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Turner84",
}

@Article{Kling:1984:CIS,
  author =       "Rob Kling and Suzanne Iacono",
  title =        "The Control of Information Systems Developments after
                 Implementation",
  journal =      j-CACM,
  volume =       "27",
  number =       "12",
  pages =        "1218--1226",
  month =        dec,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
}

@Article{Litke:1984:IST,
  author =       "J. D. Litke",
  title =        "An improved solution to the traveling salesman problem
                 with thousands of nodes",
  journal =      j-CACM,
  volume =       "27",
  number =       "12",
  pages =        "1227--1236",
  month =        dec,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:40:50 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1984.bib",
  acknowledgement = ack-nhfb,
  annote =       "A new method for calculating the shortest path
                 solution has been successfully applied to sets
                 containing up to 17,000 points. The method reduced path
                 length by 27 percent compared to a human-estimated
                 shortest path and outperformed previous algorithms,
                 which achieved only a 2 percent reduction.",
  country =      "USA",
  descriptors =  "Routing; shortest path",
  enum =         "4095",
  references =   "5",
}

@Article{Wilmot:1984:FKD,
  author =       "Richard B. Wilmot",
  title =        "Foreign Keys Decrease Adaptability of Database
                 Designs",
  journal =      j-CACM,
  volume =       "27",
  number =       "12",
  pages =        "1237--1243",
  month =        dec,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:22:41 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib",
  acknowledgement = ack-nhfb,
  annote =       "advocates removing referencing attributes into
                 separate records to permit rapid adaptation from 1:n to
                 m:n relationships.",
  review =       "ACM CR 8506-0531",
}

@Article{Wolfram:1984:SSC,
  author =       "Stephen Wolfram",
  title =        "Special Section on Computing at the Frontiers of
                 Theoretical Physics --- Introduction",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "352--353",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:30:40 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Wolfram84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Wolfram84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Wolfram84",
}

@Article{Arnett:1984:CA,
  author =       "W. David Arnett",
  title =        "Computational Astrophysics",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "354--357",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:21:58 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Arnett84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Arnett84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Arnett84",
}

@Article{Lautrup:1984:MCM,
  author =       "B. Lautrup",
  title =        "{Monte Carlo} Methods in Theoretical High-Energy
                 Physics",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "358--362",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:57:52 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Lautrup84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Lautrup84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Lautrup84",
}

@Article{Kirkpatrick:1984:SMD,
  author =       "Scott Kirkpatrick and Robert H. Swendsen",
  title =        "Statistical Mechanics and Disordered Systems",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "363--373",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:54:57 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#KirkpatrickS84",
  acknowledgement = ack-nhfb,
  oldlabel =     "KirkpatrickS84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/KirkpatrickS84",
}

@Article{Campbell:1984:EMR,
  author =       "David Campbell and Jim Crutchfield and Doyne Farmer
                 and Erica Jen",
  title =        "Experimental Mathematics: The Role of Computation in
                 Nonlinear Science",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "374--384",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:29:21 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#CampbellCFJ84",
  acknowledgement = ack-nhfb,
  oldlabel =     "CampbellCFJ84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/CampbellCFJ84",
}

@Article{Pearson:1984:SPP,
  author =       "Robert B. Pearson and John L. Richardson and Doug
                 Toussaint",
  title =        "Special-Purpose Processors in Theoretical Physics",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "385--389",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:11:55 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#PearsonRT84",
  acknowledgement = ack-nhfb,
  oldlabel =     "PearsonRT84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PearsonRT84",
}

@Article{Wolfram:1984:SMC,
  author =       "Stephen Wolfram",
  title =        "Symbolic Mathematical Computation",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "390--394",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:30:41 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Wolfram84a",
  acknowledgement = ack-nhfb,
  oldlabel =     "Wolfram84a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Wolfram84a",
}

@Article{Wainwright:1984:CSA,
  author =       "Roger L. Wainwright",
  title =        "A Class of Sorting Algorithms Based on {Quicksort}",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "396--403",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:27:47 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Wainwright84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Wainwright84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Wainwright84",
}

@Article{Bentley:1984:AAS,
  author =       "Jon Louis Bentley and Catherine C. McGeoch",
  title =        "Amortized Analyses of Self-Organizing Sequential
                 Search Heuristics",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "404--411",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:28 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#BentleyM84",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "BentleyM84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/BentleyM84",
}

@Article{Kubale:1984:GIE,
  author =       "Marek Kubale and Boguslaw Jackowski",
  title =        "A Generalized Implicit Enumeration Algorithm for Graph
                 Coloring",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "412--418",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:56:25 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#KubaleJ84",
  acknowledgement = ack-nhfb,
  oldlabel =     "KubaleJ84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/KubaleJ84",
}

@Article{Bentley:1984:PPAd,
  author =       "Jon Louis Bentley and David {Gries (special guest
                 oyster)}",
  title =        "Programming Pearls: Abstract Data Types",
  journal =      j-CACM,
  volume =       "30",
  number =       "4",
  pages =        "284--290",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:00 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Bentley84",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley84",
}

@Article{Spector:1984:CSI,
  author =       "Alfred Z. Spector and David K. Gifford",
  title =        "Case Study: {IBM}'s {System\slash 360--370}
                 Architecture",
  journal =      j-CACM,
  volume =       "30",
  number =       "4",
  pages =        "291--307",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:23:36 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#SpectorG84",
  acknowledgement = ack-nhfb,
  oldlabel =     "SpectorG84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SpectorG84",
}

@Article{Ein-Dor:1984:APC,
  author =       "Phillip Ein-Dor and Jacob Feldmesser",
  title =        "Attributes of the Performance of Central Processing
                 Units: {A} Relative Performance Prediction Model",
  journal =      j-CACM,
  volume =       "30",
  number =       "4",
  pages =        "308--317",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:37:38 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Ein-DorF84",
  acknowledgement = ack-nhfb,
  oldlabel =     "Ein-DorF84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Ein-DorF84",
}

@Article{Sanz:1984:CMC,
  author =       "Jorge L. C. Sanz and Irs'hak Dinstein and Dragutin
                 Petkovic",
  title =        "Computing Multi-Colored Polygonal Masks in Pipeline
                 Architectures and Its Application to Automated Visual
                 Inspection",
  journal =      j-CACM,
  volume =       "30",
  number =       "4",
  pages =        "318--329",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:19:00 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#SanzDP84",
  acknowledgement = ack-nhfb,
  oldlabel =     "SanzDP84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SanzDP84",
}

@Article{Denning:1985:SSC,
  author =       "Peter J. Denning",
  title =        "Special Section on Computer Architecture ---
                 Introduction",
  journal =      j-CACM,
  volume =       "28",
  number =       "1",
  pages =        "6--7",
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:11 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Denning85",
  acknowledgement = ack-nhfb,
  oldlabel =     "Denning85",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Denning85",
}

@Article{Patterson:1985:RIS,
  author =       "David A. Patterson",
  title =        "Reduced instruction set computers",
  journal =      j-CACM,
  volume =       "28",
  number =       "1",
  pages =        "8--21",
  month =        jan,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/risc.bib
                 and ftp://ftp.ira.uka.de/pub/bibliography/Misc/arch.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214917.html",
  abstract =     "Reduced instruction set computers aim for both
                 simplicity in hardware and synergy between
                 architectures and compilers. Optimizing compilers are
                 used to compile programming languages down to
                 instructions that are as unencumbered as
                 microinstructions in a large virtual address space, and
                 to make the instruction cycle time as fast as
                 possible.",
  acknowledgement = ack-nhfb,
  keywords =     "design; MIPS RISC reduced restricted instruction set
                 computer architecture pipelining microcoding;
                 performance",
  subject =      "{\bf C.0}: Computer Systems Organization, GENERAL,
                 Instruction set design.",
}

@Article{Seitz:1985:CC,
  author =       "Charles L. Seitz",
  title =        "The cosmic cube",
  journal =      j-CACM,
  volume =       "28",
  number =       "1",
  pages =        "22--33",
  month =        jan,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2467.html",
  abstract =     "Sixty-four small computers are connected by a network
                 of point-to-point communication channels in the plan of
                 a binary 6-cube. This ``Cosmic Cube'' computer is a
                 hardware simulation of a future VLSI implementation
                 that will consist of single-chip nodes. The machine
                 offers high degrees of concurrency in applications and
                 suggests that future machines with thousands of nodes
                 are both feasible and attractive. It uses message
                 switching instead of shared variables for communicating
                 between concurrent processes.",
  acknowledgement = ack-nhfb,
  annote =       "Excellent survey of this project. Reproduced in
                 ``Parallel Computing: Theory and Comparisons,'' by G.
                 Jack Lipovski and Miroslaw Malek, Wiley-Interscience,
                 New York, 1987, pp. 295-311, appendix E. * Brief survey
                 of the Cosmic Cube, and its hardware (JLH \& DP). This
                 is a good discussion of the Caltech approach, which
                 embodies the ideas several of these machines (often
                 called hypercubes). The work at Caltech is the basis
                 for the machines at JPL and the Intel iPSC, as well as
                 closely related to the NCUBE design. Another paper by
                 Seitz on this same topic appears in the Dec. 1984 issue
                 of IEEE Trans. on Computers. Literature search yielded:
                 \begin{quotation} 1450906 C85023854 The Cosmic Cube
                 (Concurrent Computing) Seitz, C. L. Author Affil: Dept.
                 of Comput. Sci., California Inst. of Technol.,
                 Pasadena, CA, USA Source: Commun. ACM (USA) Vol.28,
                 No.1, Pp.: 22--33 Publication Year: Jan. 1985 CODEN:
                 CACMA2 ISSN: 0001-0782 U. S. Copyright Clearance Center
                 Code: 0001-0782/85/0100-002275c Treatment: Practical;
                 Document Type: Journal Paper Languages: English (14
                 Refs) \end{quotation}",
  descriptors =  "multiprocessing systems; message switching
                 identifiers: message passing architectures; process
                 programming; VLSI systems; point-to-point communication
                 channels; binary 6-cube; cosmic cube; hardware
                 simulation; VLSI implementation; single-chip nodes;
                 concurrency class codes: C5440; C5620",
  keywords =     "algorithms; design; experimentation; measurement;
                 performance",
  review =       "ACM CR 8507-0591",
  subject =      "{\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors). {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming. {\bf C.2.4}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Distributed Systems. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management,
                 Multiprocessing/multiprogramming. {\bf C.1.2}: Computer
                 Systems Organization, PROCESSOR ARCHITECTURES, Multiple
                 Data Stream Architectures (Multiprocessors),
                 Interconnection architectures. {\bf D.4.4}: Software,
                 OPERATING SYSTEMS, Communications Management. {\bf
                 D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Measurements. {\bf C.5.4}: Computer Systems
                 Organization, COMPUTER SYSTEM IMPLEMENTATION, VLSI
                 Systems. {\bf B.7.2}: Hardware, INTEGRATED CIRCUITS,
                 Design Aids, Simulation.",
}

@Article{Gurd:1985:MPD,
  author =       "J. R. Gurd and C. C. Kirkham and I. Watson",
  title =        "The {Manchester} Prototype Dataflow Computer",
  journal =      j-CACM,
  volume =       "28",
  number =       "1",
  pages =        "34--52",
  month =        jan,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Sep 22 00:19:25 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2468.html",
  acknowledgement = ack-nhfb,
  annote =       "A special issue on Computer Architecture. Mentions
                 SISAL, but not LLNL. Using tagged-token dataflow, the
                 Manchester processor is running reasonably large user
                 programs at maximum rates of between 1 and 2 MIPS.
                 Reproduced in ``Selected Reprints on Dataflow and
                 Reduction Architectures'' ed. S. S. Thakkar, IEEE,
                 1987, pp. 111-129. (JH \& DP) This paper discusses the
                 machine, its software, and evaluates performance.",
  keywords =     "C.4 [ Performance of Systems]; CR Categories and
                 Subject Descriptors: C.1.3 [Processor Architectures]:
                 Other Architecture Styles; D.3.2 [Programming
                 Languages]: Language Classifications General Terms:
                 Design; design; dmp; dp; enm; grequired91; jlh;
                 Languages; measurement; parallel computation;
                 performance; Performance Additional Key Words and
                 Phrases: tagged-token dataflow; single assignment
                 programming; SISAL",
  subject =      "{\bf C.1.3}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Other Architecture Styles, Data-flow
                 architectures. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Data-flow languages. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, SISAL.",
}

@Article{Sammet:1985:RAC,
  author =       "Jean E. Sammet and Robert W. Rector",
  title =        "In recognition of the 25th anniversary of {Computing
                 Reviews}: selected reviews 1960--1984",
  journal =      j-CACM,
  volume =       "28",
  number =       "1",
  pages =        "53--68",
  month =        jan,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214920.html",
  acknowledgement = ack-nhfb,
  keywords =     "documentation",
  subject =      "{\bf A.0}: General Literature, GENERAL.",
}

@Article{Minker:1985:CPW,
  author =       "Jack Minker",
  title =        "Computer professionals whose scientific freedom and
                 human rights have been violated --- 1984: a report of
                 the {ACM} committee on scientific freedom and human
                 rights",
  journal =      j-CACM,
  volume =       "28",
  number =       "1",
  pages =        "69--78",
  month =        jan,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214922.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; legal aspects",
  subject =      "{\bf K.5.0}: Computing Milieux, LEGAL ASPECTS OF
                 COMPUTING, General. {\bf K.4.0}: Computing Milieux,
                 COMPUTERS AND SOCIETY, General.",
}

@Article{Berry:1985:SAC,
  author =       "R. E. Berry and B. A. E. Meekings",
  title =        "A style analysis of {C} programs",
  journal =      j-CACM,
  volume =       "28",
  number =       "1",
  pages =        "80--88",
  month =        jan,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2469.html",
  acknowledgement = ack-nhfb,
  keywords =     "languages; measurement",
  subject =      "{\bf D.2.8}: Software, SOFTWARE ENGINEERING, Metrics.
                 {\bf D.2.9}: Software, SOFTWARE ENGINEERING,
                 Management, Software quality assurance (SQA). {\bf
                 D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, C.",
}

@Article{Nash:1985:DIV,
  author =       "John C. Nash",
  title =        "Design and implementation of a very small linear
                 algebra program package",
  journal =      j-CACM,
  volume =       "28",
  number =       "1",
  pages =        "89--94",
  month =        jan,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2470.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; performance",
  subject =      "{\bf G.4}: Mathematics of Computing, MATHEMATICAL
                 SOFTWARE. {\bf G.1.3}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, Numerical Linear Algebra.",
}

@Article{Merritt:1985:ITS,
  author =       "Susan M. Merritt",
  title =        "An inverted taxonomy of sorting algorithms",
  journal =      j-CACM,
  volume =       "28",
  number =       "1",
  pages =        "96--99",
  month =        jan,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214925.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching.",
}

@Article{Bentley:1985:PPTa,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Tricks of the Trade",
  journal =      j-CACM,
  volume =       "28",
  number =       "2",
  pages =        "138--141",
  month =        feb,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:10 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Bentley85",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley85",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley85",
}

@Article{Ein-Dor:1985:GLR,
  author =       "Phillip Ein-Dor",
  title =        "{Grosch}'s law re-revisited: {CPU} power and the cost
                 of computation",
  journal =      j-CACM,
  volume =       "28",
  number =       "2",
  pages =        "142--151",
  month =        feb,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2787.html",
  acknowledgement = ack-nhfb,
  keywords =     "economics; measurement; performance",
  subject =      "{\bf K.6.2}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Installation
                 Management, Pricing and resource allocation. {\bf C.4}:
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS.
                 {\bf K.1}: Computing Milieux, THE COMPUTER INDUSTRY.
                 {\bf K.6.m}: Computing Milieux, MANAGEMENT OF COMPUTING
                 AND INFORMATION SYSTEMS, Miscellaneous.",
}

@Article{Lemos:1985:RMC,
  author =       "Ronald S. Lemos",
  title =        "Rating the major computing periodicals on
                 readability",
  journal =      j-CACM,
  volume =       "28",
  number =       "2",
  pages =        "152--157",
  month =        feb,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:42:25 1995",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2788.html",
  acknowledgement = ack-nhfb,
  keywords =     "documentation; human factors; measurement",
  review =       "ACM CR 8508-0741",
  subject =      "{\bf H.1.1}: Information Systems, MODELS AND
                 PRINCIPLES, Systems and Information Theory, Value of
                 information. {\bf K.3.m}: Computing Milieux, COMPUTERS
                 AND EDUCATION, Miscellaneous. {\bf K.7.m}: Computing
                 Milieux, THE COMPUTING PROFESSION, Miscellaneous.",
}

@Article{Wirth:1985:PLD,
  author =       "Niklaus Wirth",
  title =        "From programming language design to computer
                 construction",
  journal =      j-CACM,
  volume =       "28",
  number =       "2",
  pages =        "160--164",
  month =        feb,
  year =         "1985",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/2786.2789",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2789.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; languages",
  remark =       "This is the 1984 Turing Award Lecture.",
  subject =      "{\bf K.2}: Computing Milieux, HISTORY OF COMPUTING,
                 Software. {\bf D.3.2}: Software, PROGRAMMING LANGUAGES,
                 Language Classifications.",
}

@Article{Reimann:1985:UOC,
  author =       "Bernard C. Reimann and Allan D. Waren",
  title =        "User-oriented criteria for the selection of {DSS}
                 software",
  journal =      j-CACM,
  volume =       "28",
  number =       "2",
  pages =        "166--179",
  month =        feb,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2790.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; languages; management; performance",
  review =       "ACM CR 8507-0677",
  subject =      "{\bf K.6.3}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Software Management,
                 Software selection. {\bf H.4.2}: Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Types of Systems,
                 Decision support.",
}

@Article{Hanson:1985:PPP,
  author =       "Stephen Jos{\'e} Hanson and Richard R. Rosinski",
  title =        "Programmer perceptions of productivity and programming
                 tools",
  journal =      j-CACM,
  volume =       "28",
  number =       "2",
  pages =        "180--189",
  month =        feb,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2791.html",
  acknowledgement = ack-nhfb,
  keywords =     "experimentation; human factors; measurement;
                 performance",
  review =       "ACM CR 8507-0605",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques. {\bf D.1.0}: Software, PROGRAMMING
                 TECHNIQUES, General. {\bf D.2.2}: Software, SOFTWARE
                 ENGINEERING, Tools and Techniques, Programmer
                 workbench. {\bf D.2.2}: Software, SOFTWARE ENGINEERING,
                 Tools and Techniques, Software libraries. {\bf D.2.3}:
                 Software, SOFTWARE ENGINEERING, Coding, Pretty
                 printers. {\bf D.2.3}: Software, SOFTWARE ENGINEERING,
                 Coding, Program editors. {\bf D.2.5}: Software,
                 SOFTWARE ENGINEERING, Testing and Debugging, Test data
                 generators. {\bf D.2.5}: Software, SOFTWARE
                 ENGINEERING, Testing and Debugging, Debugging aids.
                 {\bf D.2.6}: Software, SOFTWARE ENGINEERING,
                 Programming Environments. {\bf D.2.8}: Software,
                 SOFTWARE ENGINEERING, Metrics. {\bf H.1.2}: Information
                 Systems, MODELS AND PRINCIPLES, User/Machine Systems,
                 Human information processing.",
}

@Article{Overstreet:1985:SLA,
  author =       "C. Michael Overstreet and Richard E. Nance",
  title =        "A specification language to assist in analysis of
                 discrete event simulation models",
  journal =      j-CACM,
  volume =       "28",
  number =       "2",
  pages =        "190--201",
  month =        feb,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1985.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2792.html",
  acknowledgement = ack-nhfb,
  annote =       "Effective development environments for discrete event
                 simulation models should reduce development costs and
                 improve model performance. A model specification
                 language used in a model development environment is
                 defined. This approach is intended to reduce mode costs
                 by interposing an intermediate form between a
                 conceptual $m$ (the model as it exists in the mind of
                 the modeler) and an executable representation of that
                 model. As a model specification is \ldots{}.",
  country =      "USA",
  descriptors =  "Specification language; discrete event simulation;
                 primitives; modeling",
  enum =         "2352",
  keywords =     "design; languages",
  references =   "56",
  subject =      "{\bf I.6.2}: Computing Methodologies, SIMULATION AND
                 MODELING, Simulation Languages. {\bf D.2.1}: Software,
                 SOFTWARE ENGINEERING, Requirements/Specifications,
                 Languages. {\bf D.2.1}: Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications, Methodologies. {\bf
                 D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques.",
}

@Article{Sleator:1985:AEL,
  author =       "Daniel D. Sleator and Robert E. Tarjan",
  title =        "Amortized Efficiency of List Update and Paging Rules",
  journal =      j-CACM,
  volume =       "28",
  number =       "2",
  pages =        "202--208",
  month =        feb,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P05 (68Q25)",
  MRnumber =     "86h:68018",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/2793.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance; theory; verification",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Lists. {\bf D.4.2}:
                 Software, OPERATING SYSTEMS, Storage Management,
                 Swapping. {\bf E.1}: Data, DATA STRUCTURES, Tables.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 D.4.8}: Software, OPERATING SYSTEMS, Performance.",
}

@Article{Bentley:1985:PPTb,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Thanks, Heaps",
  journal =      j-CACM,
  volume =       "28",
  number =       "3",
  pages =        "245--250",
  month =        mar,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:11 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Bentley85a",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley85a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley85a",
}

@Article{Martin:1985:CSE,
  author =       "James Martin and Philip A. Bernstein and Peter J.
                 Denning and Michael L. Dertouzos and Leonard
                 Kleinrock",
  title =        "Computer Science Education Today: {A} Dialogue",
  journal =      j-CACM,
  volume =       "28",
  number =       "3",
  pages =        "251--262",
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:02:00 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#MartinBDDK85",
  acknowledgement = ack-nhfb,
  oldlabel =     "MartinBDDK85",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/MartinBDDK85",
}

@Article{Martin:1985:EIS,
  author =       "James Martin and Leonard Kleinrock",
  title =        "Excerpts from: {An Information Systems Manifesto}",
  journal =      j-CACM,
  volume =       "28",
  number =       "3",
  pages =        "252--255",
  month =        mar,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214926.html",
  acknowledgement = ack-nhfb,
  keywords =     "documentation; human factors",
  subject =      "{\bf H.0}: Information Systems, GENERAL.",
}

@Article{Butcher:1985:PPI,
  author =       "D. F. Butcher and W. A. Muth",
  title =        "Predicting performance in an introductory computer
                 science course",
  journal =      j-CACM,
  volume =       "28",
  number =       "3",
  pages =        "263--268",
  month =        mar,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3167.html",
  acknowledgement = ack-nhfb,
  keywords =     "measurement; performance",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Self-assessment. {\bf K.3.m}: Computing Milieux,
                 COMPUTERS AND EDUCATION, Miscellaneous,
                 Accreditation.",
}

@Article{Turner:1985:CSS,
  author =       "A. J. Turner",
  title =        "Computer science in secondary schools: curriculum and
                 teacher certification",
  journal =      j-CACM,
  volume =       "28",
  number =       "3",
  pages =        "269--279",
  month =        mar,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3168.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; measurement",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Curriculum. {\bf K.3.2}: Computing Milieux, COMPUTERS
                 AND EDUCATION, Computer and Information Science
                 Education, Computer science education.",
}

@Article{Witten:1985:SIV,
  author =       "Ian H. Witten and Bob Bramwell",
  title =        "A system for interactive viewing of structured
                 documents",
  journal =      j-CACM,
  volume =       "28",
  number =       "3",
  pages =        "280--288",
  month =        mar,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3169.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; human factors; languages",
  subject =      "{\bf I.7.2}: Computing Methodologies, TEXT PROCESSING,
                 Document Preparation. {\bf D.2.2}: Software, SOFTWARE
                 ENGINEERING, Tools and Techniques, User interfaces.
                 {\bf I.7.2}: Computing Methodologies, TEXT PROCESSING,
                 Document Preparation, Format and notation.",
}

@Article{Blair:1985:ERE,
  author =       "David C. Blair and M. E. Maron",
  title =        "An Evaluation of Retrieval Effectiveness for a
                 Full-Text Document-Retrieval System",
  journal =      j-CACM,
  volume =       "28",
  number =       "3",
  pages =        "285--299",
  month =        mar,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3197.html",
  acknowledgement = ack-nhfb,
  annote =       "Experiments using STAIRS for 40000 documents gave
                 recall of less than 20pct, precision of 79pct.",
  keywords =     "design; experimentation; human factors; IBM STAIRS
                 legal case references bibliography CACM; measurement;
                 performance; theory",
  subject =      "{\bf H.3.3}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Information Search and Retrieval, Search
                 process. {\bf H.3.3}: Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Information Search and
                 Retrieval, Query formulation. {\bf H.3.3}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Information
                 Search and Retrieval, Selection process.",
}

@Article{Gould:1985:DUK,
  author =       "John D. Gould and Clayton Lewis",
  title =        "Designing for usability: key principles and what
                 designers think",
  journal =      j-CACM,
  volume =       "28",
  number =       "3",
  pages =        "300--311",
  month =        mar,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3170.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; human factors; measurement;
                 theory",
  subject =      "{\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors. {\bf
                 D.2.9}: Software, SOFTWARE ENGINEERING, Management,
                 Software quality assurance (SQA). {\bf D.2.9}:
                 Software, SOFTWARE ENGINEERING, Management, Life cycle.
                 {\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces.",
}

@Article{Mendelson:1985:PCS,
  author =       "Haim Mendelson",
  title =        "Pricing computer services: queueing effects",
  journal =      j-CACM,
  volume =       "28",
  number =       "3",
  pages =        "312--321",
  month =        mar,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3171.html",
  acknowledgement = ack-nhfb,
  keywords =     "economics; management; performance; theory",
  subject =      "{\bf K.6.2}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Installation
                 Management, Pricing and resource allocation. {\bf G.m}:
                 Mathematics of Computing, MISCELLANEOUS, Queueing
                 theory. {\bf D.4.8}: Software, OPERATING SYSTEMS,
                 Performance, Queueing theory. {\bf C.4}: Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS,
                 Measurement techniques.",
}

@Article{Arnett:1985:CA,
  author =       "W. D. Arnett",
  title =        "Computational astrophysics",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "354--357",
  month =        apr,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3342.html",
  acknowledgement = ack-nhfb,
  keywords =     "theory",
  subject =      "{\bf J.2}: Computer Applications, PHYSICAL SCIENCES
                 AND ENGINEERING, Physics. {\bf J.2}: Computer
                 Applications, PHYSICAL SCIENCES AND ENGINEERING,
                 Astronomy. {\bf I.6.3}: Computing Methodologies,
                 SIMULATION AND MODELING, Applications.",
}

@Article{Lautrup:1985:MCM,
  author =       "B. Lautrup",
  title =        "{Monte Carlo} methods in theoretical high-energy
                 physics",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "358--362",
  month =        apr,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3343.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance; theory",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf J.2}: Computer Applications, PHYSICAL
                 SCIENCES AND ENGINEERING, Physics. {\bf G.1.3}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, Numerical
                 Linear Algebra, Determinants. {\bf G.1.3}: Mathematics
                 of Computing, NUMERICAL ANALYSIS, Numerical Linear
                 Algebra, Matrix inversion. {\bf G.1.3}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Numerical Linear
                 Algebra, Sparse and very large systems.",
}

@Article{Kirkpatrick:1985:SMD,
  author =       "Scott Kirkpatrick and Robert H. Swendsen",
  title =        "Statistical Mechanics and Disordered Systems",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "363--373",
  month =        apr,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "82-04 82A25 82A57",
  MRnumber =     "86g:82004",
  MRreviewer =   "W. Th. F. den Hollander",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3344.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; theory",
  subject =      "{\bf I.6.3}: Computing Methodologies, SIMULATION AND
                 MODELING, Applications. {\bf J.2}: Computer
                 Applications, PHYSICAL SCIENCES AND ENGINEERING,
                 Physics. {\bf J.6}: Computer Applications,
                 COMPUTER-AIDED ENGINEERING. {\bf G.3}: Mathematics of
                 Computing, PROBABILITY AND STATISTICS. {\bf G.1.6}:
                 Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization.",
}

@Article{Campbell:1985:EMR,
  author =       "David Campbell and Jim Crutchfield and Doyne Farmer
                 and Erica Jen",
  title =        "Experimental mathematics: the role of computation in
                 nonlinear science",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "374--384",
  month =        apr,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "58F13 (00A69 58-04 70K50)",
  MRnumber =     "87f:58099",
  MRreviewer =   "J. S. Joel",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3345.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; theory",
  subject =      "{\bf J.2}: Computer Applications, PHYSICAL SCIENCES
                 AND ENGINEERING, Mathematics and statistics. {\bf J.2}:
                 Computer Applications, PHYSICAL SCIENCES AND
                 ENGINEERING, Physics. {\bf K.2}: Computing Milieux,
                 HISTORY OF COMPUTING. {\bf C.3}: Computer Systems
                 Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
                 SYSTEMS. {\bf D.2.6}: Software, SOFTWARE ENGINEERING,
                 Programming Environments. {\bf G.1.7}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Ordinary Differential
                 Equations. {\bf G.1.8}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, Partial Differential Equations.
                 {\bf G.1.7}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Ordinary Differential Equations. {\bf G.1.8}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, Partial
                 Differential Equations.",
}

@Article{Pearson:1985:SPP,
  author =       "Robert B. Pearson and John L. Richardson and Doug
                 Toussaint",
  title =        "Special-purpose processors in theoretical physics",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "385--389",
  month =        apr,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3346.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; performance",
  subject =      "{\bf C.1.3}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Other Architecture Styles. {\bf C.3}:
                 Computer Systems Organization, SPECIAL-PURPOSE AND
                 APPLICATION-BASED SYSTEMS. {\bf J.2}: Computer
                 Applications, PHYSICAL SCIENCES AND ENGINEERING,
                 Physics.",
}

@Article{Wolfram:1985:SMC,
  author =       "Stephen Wolfram",
  title =        "Symbolic Mathematical Computation",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "390--394",
  month =        apr,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68Q40",
  MRnumber =     "789 994",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3347.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; languages",
  subject =      "{\bf I.1.3}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Languages and Systems, SMP. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Very high-level languages. {\bf J.2}:
                 Computer Applications, PHYSICAL SCIENCES AND
                 ENGINEERING. {\bf I.1.4}: Computing Methodologies,
                 ALGEBRAIC MANIPULATION, Applications.",
}

@Article{Wainwright:1985:CSA,
  author =       "Roger L. Wainwright",
  title =        "A class of sorting algorithms based on {Quicksort}",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "396--402",
  month =        apr,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3348.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; measurement; performance; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching.",
}

@Article{Bentley:1985:AAS,
  author =       "Jon L. Bentley and Catherine C. McGeoch",
  title =        "Amortized analyses of self-organizing sequential
                 search heuristics",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "404--411",
  month =        apr,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3349.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; measurement; performance; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 E.1}: Data, DATA STRUCTURES, Lists. {\bf E.1}: Data,
                 DATA STRUCTURES, Tables. {\bf I.2.8}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search, Heuristic
                 methods.",
}

@Article{Kubale:1985:GIE,
  author =       "Marek Kubale and Boguslaw Jackowski",
  title =        "A generalized implicit enumeration algorithm for graph
                 coloring",
  journal =      j-CACM,
  volume =       "28",
  number =       "4",
  pages =        "412--418",
  month =        apr,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/clique.color.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3350.html",
  acknowledgement = ack-nhfb,
  annote =       "Presents algorithm and gives experimental comparison
                 to approaches of
                 \cite{Brown:1972:CSC,Jones:1986:ECP,Brelaz:1979:NMC,Korman:1970:CO}.",
  keywords =     "algorithms; measurement; performance; theory",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Graph algorithms. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Computations on discrete structures. {\bf
                 I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Backtracking.",
}

@Article{Bentley:1985:PPSa,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: {A} Spelling Checker",
  journal =      j-CACM,
  volume =       "28",
  number =       "5",
  pages =        "456--462",
  month =        may,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:12 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Bentley85b",
  acknowledgement = ack-nhfb,
  keywords =     "languages; programming pearls",
  oldlabel =     "Bentley85b",
  subject =      "I.7.1 Computing Methodologies, TEXT PROCESSING, Text
                 Editing, Spelling",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley85b",
}

@Article{Conrad:1985:DPM,
  author =       "Michael Conrad",
  title =        "On design principles for a molecular computer",
  journal =      j-CACM,
  volume =       "28",
  number =       "5",
  pages =        "464--480",
  month =        may,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3533.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; theory",
  subject =      "{\bf C.1.3}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Other Architecture Styles, Adaptable
                 architectures. {\bf F.1.1}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Models of Computation.
                 {\bf I.2.m}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Miscellaneous. {\bf B.m}: Hardware,
                 MISCELLANEOUS.",
}

@Article{Devlin:1985:SAP,
  author =       "Jane P. Devlin and William A. Lowell and Anne E.
                 Alger",
  title =        "{Self-Assessment Procedure XIV}: a self-assessment
                 procedure dealing with the legal issues of computing",
  journal =      j-CACM,
  volume =       "28",
  number =       "5",
  pages =        "481--488",
  month =        may,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214928.html",
  acknowledgement = ack-nhfb,
  keywords =     "legal aspects",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Self-assessment. {\bf K.5.0}: Computing Milieux, LEGAL
                 ASPECTS OF COMPUTING, General. {\bf K.7.0}: Computing
                 Milieux, THE COMPUTING PROFESSION, General.",
}

@Article{Tartar:1985:SRF,
  author =       "John Tartar and Bruce Arden and Taylor Booth and Peter
                 Denning and Ray Miller and Andries van Dam",
  title =        "The 1984 {Snowbird Report}: future issues in computer
                 science",
  journal =      j-CACM,
  volume =       "28",
  number =       "5",
  pages =        "490--493",
  month =        may,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214931.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Computer science education. {\bf K.3.2}: Computing
                 Milieux, COMPUTERS AND EDUCATION, Computer and
                 Information Science Education, Curriculum.",
}

@Article{Guimaraes:1985:SAP,
  author =       "Tor Guimaraes",
  title =        "A study of application program development
                 techniques",
  journal =      j-CACM,
  volume =       "28",
  number =       "5",
  pages =        "494--499",
  month =        may,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3534.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; management; measurement",
  subject =      "{\bf H.4.2}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Types of Systems, Decision support. {\bf
                 D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques. {\bf K.6.3}: Computing Milieux, MANAGEMENT
                 OF COMPUTING AND INFORMATION SYSTEMS, Software
                 Management. {\bf K.6.1}: Computing Milieux, MANAGEMENT
                 OF COMPUTING AND INFORMATION SYSTEMS, Project and
                 People Management, Systems development.",
}

@Article{Gostl:1985:AQT,
  author =       "Jack Gostl and Irwin Greenberg",
  title =        "An application of queueing theory to the design of a
                 message-switching computer system",
  journal =      j-CACM,
  volume =       "28",
  number =       "5",
  pages =        "500--505",
  month =        may,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3535.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; performance",
  review =       "ACM CR 8511-1038",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance.
                 {\bf D.4.4}: Software, OPERATING SYSTEMS,
                 Communications Management. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Queueing theory.",
}

@Article{Oldehoeft:1985:AEF,
  author =       "Rodney R. Oldehoeft and Stephen J. Allan",
  title =        "Adaptive exact-fit storage management",
  journal =      j-CACM,
  volume =       "28",
  number =       "5",
  pages =        "506--511",
  month =        may,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3536.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance",
  subject =      "{\bf D.4.2}: Software, OPERATING SYSTEMS, Storage
                 Management, Allocation/deallocation strategies. {\bf
                 C.4}: Computer Systems Organization, PERFORMANCE OF
                 SYSTEMS.",
}

@Article{Vitalari:1985:CHS,
  author =       "Nicholas P. Vitalari and Alladi Venkatesh and Kjell
                 Gronhaug",
  title =        "Computing in the home: shifts in the time allocation
                 patterns of households",
  journal =      j-CACM,
  volume =       "28",
  number =       "5",
  pages =        "512--522",
  month =        may,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3537.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; measurement",
  subject =      "{\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Social Issues. {\bf K.4.3}: Computing Milieux,
                 COMPUTERS AND SOCIETY, Organizational Impacts. {\bf
                 K.8}: Computing Milieux, PERSONAL COMPUTING. {\bf
                 K.4.m}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Miscellaneous.",
}

@Article{Sager:1985:PTG,
  author =       "Thomas J. Sager",
  title =        "A Polynomial Time Generator for Minimal Perfect Hash
                 Functions",
  journal =      j-CACM,
  volume =       "28",
  number =       "5",
  pages =        "523--532",
  month =        may,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P10",
  MRnumber =     "788 585",
  bibdate =      "Thu Apr 29 18:36:46 1999",
  bibsource =    "http://www.acm.org/pubs/toc/",
  note =         "See \cite{Cichelli:1980:MPH}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3538.html",
  acknowledgement = ack-nhfb,
  annote =       "Expected cost n**b if n=m. Tested up to n=256.
                 Includes algorithms and measurements. Extends work of
                 Cichelli \cite{Cichelli:1980:CMP}.",
  keywords =     "algorithms; measurement; performance",
  subject =      "{\bf E.2}: Data, DATA STORAGE REPRESENTATIONS,
                 Hash-table representations.",
}

@Article{Bentley:1985:PPA,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Associative Arrays",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  pages =        "570--576",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:13 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Bentley85c",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley85c",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley85c",
}

@Article{Frenkel:1985:TAS,
  author =       "Karen A. Frenkel",
  title =        "Toward automating the software-development cycle",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  pages =        "578--589",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3813.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; management; verification",
  subject =      "{\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems. {\bf
                 K.6.3}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Software Management, Software
                 development. {\bf I.2.2}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Automatic Programming. {\bf
                 D.1.2}: Software, PROGRAMMING TECHNIQUES, Automatic
                 Programming. {\bf D.3.4}: Software, PROGRAMMING
                 LANGUAGES, Processors, Compilers. {\bf D.2.9}:
                 Software, SOFTWARE ENGINEERING, Management,
                 Productivity.",
}

@Article{Courtois:1985:TSD,
  author =       "P.-J. Courtois",
  title =        "On time and space decomposition of complex
                 structures",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  pages =        "590--603",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1985.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3814.html",
  acknowledgement = ack-nhfb,
  descriptors =  "Decomposition; stochastic system",
  keywords =     "design; performance; theory",
  subject =      "{\bf H.1.1}: Information Systems, MODELS AND
                 PRINCIPLES, Systems and Information Theory, General
                 systems theory. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Design studies.
                 {\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Modeling techniques. {\bf G.1.3}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, Numerical
                 Linear Algebra, Sparse and very large systems.",
}

@Article{Beidler:1985:CPS,
  author =       "John Beidler and Richard H. Austing and Lillian N.
                 Cassel",
  title =        "Computing programs in small colleges",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  pages =        "605--611",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214933.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; standardization",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Curriculum. {\bf K.3.2}: Computing Milieux, COMPUTERS
                 AND EDUCATION, Computer and Information Science
                 Education, Computer science education.",
}

@Article{McIntyre:1985:DCU,
  author =       "David R. McIntyre and Michael A. Pechura",
  title =        "Data compression using static {Huffman} code-decode
                 tables",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  institution =  "Cleveland St U",
  pages =        "612--616",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/rosenfeld/1985.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3815.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; experimentation; image information;
                 measurement; performance; statistics",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY, Data
                 compaction and compression. {\bf D.3.m}: Software,
                 PROGRAMMING LANGUAGES, Miscellaneous.",
}

@Article{Bass:1985:GUI,
  author =       "Leonard J. Bass",
  title =        "A generalized user interface for applications programs
                 {(II)}",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  pages =        "617--627",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3816.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; human factors",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces. {\bf H.1.2}: Information
                 Systems, MODELS AND PRINCIPLES, User/Machine Systems.
                 {\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Report writers.",
}

@Article{Biermann:1985:NLD,
  author =       "Alan W. Biermann and Robert D. Rodman and David C.
                 Rubin and J. Francis Heidlage",
  title =        "Natural language with discrete speech as a mode for
                 human-to-machine",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  pages =        "628--636",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3817.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; human factors; languages;
                 measurement",
  review =       "ACM CR 8511-1072",
  subject =      "{\bf I.2.7}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Natural Language Processing, Speech
                 recognition and synthesis. {\bf B.4.2}: Hardware,
                 INPUT/OUTPUT AND DATA COMMUNICATIONS, Input/Output
                 Devices, Voice. {\bf D.2.2}: Software, SOFTWARE
                 ENGINEERING, Tools and Techniques, User interfaces.
                 {\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors.",
}

@Article{Even:1985:RPS,
  author =       "Shimon Even and Oded Goldreich and Abraham Lempel",
  title =        "A randomized protocol for signing contracts",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  pages =        "637--647",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P25",
  MRnumber =     "800 680",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3818.html",
  acknowledgement = ack-nhfb,
  keywords =     "security; theory; verification",
  review =       "ACM CR 8512-1137",
  subject =      "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption
                 standard (DES). {\bf E.3}: Data, DATA ENCRYPTION,
                 Public key cryptosystems. {\bf C.2.2}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Protocols. {\bf H.4.3}: Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Communications
                 Applications, Electronic mail. {\bf J.1}: Computer
                 Applications, ADMINISTRATIVE DATA PROCESSING,
                 Financial.",
}

@Article{Bentley:1985:PPC,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Confessions of a Coder",
  journal =      j-CACM,
  volume =       "28",
  number =       "7",
  pages =        "671--679",
  month =        jul,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:14 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Bentley85d",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley85d",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley85d",
}

@Article{Hiltz:1985:SCM,
  author =       "Starr Roxanne Hiltz and Murray Turoff",
  title =        "Structuring Computer-Mediated Communication Systems to
                 Avoid Information Overload",
  journal =      j-CACM,
  volume =       "28",
  number =       "7",
  pages =        "680--689",
  month =        jul,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/hypertext.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3895.html",
  abstract =     "``Unless computer-mediated communication systems are
                 structured, users will be overloaded with information.
                 But structure should be imposed by individuals and user
                 groups according to their needs and abilities, rather
                 than through general software features.'' -- synopsis
                 Outline OVERVIEW PERCEPTIONS OF INFORMATION OVERLOAD
                 INFORMATION OVERLOAD VERSUS UNANTICIPATED SYNERGY
                 STRUCTURES AND PROCESSES FOR MINIMIZING OVERLOAD
                 Routine Information via a Conference Structure
                 Filtering and Scanning Features Length Limitations
                 Delphi and Other Voting Structures Leaders or
                 Moderators Pen Names and Anonymity Other Features for
                 Minimizing Overload Purges and discouraged sending
                 Alarms and reminders Notifications Costs CONCLUSIONS:
                 SUPERCONNECTIVITY AND THE ELECTROPOLIS Acknowledgments
                 References (31 citations) Highlights: CMCS =
                 Computer-Mediated Communication System Electronic junk:
                 Frequent CMCS users can expect to be imposed on by
                 unwanted and useless messages. This problem is becoming
                 worse as more systems, and therefore more users, are
                 interconnected by networks like CSNET, USENET, and
                 MAILNET. Perceptions of information overload peak at
                 intermediate levels of CMCS use, when communications
                 volume has built up but users have not had a chance to
                 develop screening skills [p. 681]. The secret of
                 designing CMCSs is sticking with process options --
                 nothing should be content dependent. Designers should
                 not try to impose specific organizational structures,
                 but should give individuals options for filtering out
                 material. Users will use process options to control
                 content as they see fit. [p. 684] Quoting David Morris
                 of IBM, ``An effective method of presenting each user
                 with an overview of what is available and letting them
                 pick what is of interest to pursue further is the
                 single most important capability a CMCS can provide.''
                 [p. 686] Controlled experiments with problem-solving
                 discussions have demonstrated that a designated
                 moderator can help a group to accomplish its task [p.
                 687]. ``The most fundamental impact of a CMCS is to
                 increase the social connectivity of users (i.e., the
                 number of people in regular communication) by about
                 tenfold. We use the term superconnectivity to capture
                 the essence of this order-of-magnitude change. Joining
                 the `electropolis' of an active CMCS can be stressful
                 in the short term, but should also significantly
                 increase opportunities for fruitful interaction. [p.
                 688]'' ``Overload, within the context of an
                 organization, is essentially a behavioral phenomenon.
                 It makes more sense to address inappropriate behavior
                 through social norms and sanctions than to obscure the
                 problems with software. \ldots{} [p. 689]''
                 [dh:88-02-26]",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors",
  review =       "ACM CR 8606-0547",
  subject =      "H.4 Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Communications Applications \\ K.4
                 Computing Milieux, COMPUTERS AND SOCIETY,
                 Organizational Impacts",
}

@Article{Stefik:1985:SCD,
  author =       "Mark Stefik",
  title =        "Strategic computing at {DARPA}: overview and
                 assessment",
  journal =      j-CACM,
  volume =       "28",
  number =       "7",
  pages =        "690--704",
  month =        jul,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:24:04 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Stefik85;
                 http://www.acm.org/pubs/toc/",
  note =         "See corrigendum \cite{Stefik:1985:CSC}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3896.html",
  acknowledgement = ack-nhfb,
  keywords =     "economics; management",
  oldlabel =     "Stefik85",
  subject =      "{\bf J.7}: Computer Applications, COMPUTERS IN OTHER
                 SYSTEMS, Real time. {\bf K.6.4}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, System
                 Management. {\bf K.4.0}: Computing Milieux, COMPUTERS
                 AND SOCIETY, General.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Stefik85",
}

@Article{Papsdorf:1985:PCA,
  author =       "Robert Papsdorf",
  title =        "A Prescription for Computer Anxiety --- Review of
                 {John Shore}'s ``{The Sachertorte Algorithm}''",
  journal =      j-CACM,
  volume =       "28",
  number =       "7",
  pages =        "704--706",
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:11:15 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Papsdorf85",
  acknowledgement = ack-nhfb,
  oldlabel =     "Papsdorf85",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Papsdorf85",
}

@Article{Mills:1985:PVS,
  author =       "John A. Mills",
  title =        "A pragmatic view of the system architect",
  journal =      j-CACM,
  volume =       "28",
  number =       "7",
  pages =        "708--717",
  month =        jul,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3897.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; management",
  review =       "ACM CR 8601-0028",
  subject =      "{\bf D.2.9}: Software, SOFTWARE ENGINEERING,
                 Management. {\bf K.7.1}: Computing Milieux, THE
                 COMPUTING PROFESSION, Occupations. {\bf K.6.1}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Project and People Management,
                 Systems analysis and design. {\bf K.6.4}: Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, System Management.",
}

@Article{Rajlich:1985:PDI,
  author =       "V{\'a}clav Rajlich",
  title =        "Paradigms for design and implementation in {ADA}",
  journal =      j-CACM,
  volume =       "28",
  number =       "7",
  pages =        "718--727",
  month =        jul,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3898.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Ada. {\bf D.2.9}: Software, SOFTWARE
                 ENGINEERING, Management, Life cycle. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features, Modules, packages. {\bf D.2.2}: Software,
                 SOFTWARE ENGINEERING, Tools and Techniques, Modules and
                 interfaces. {\bf D.2.2}: Software, SOFTWARE
                 ENGINEERING, Tools and Techniques, Top-down
                 programming.",
}

@Article{Laudon:1985:EIM,
  author =       "Kenneth C. Laudon",
  title =        "Environmental and institutional models of system
                 development: a national criminal history system",
  journal =      j-CACM,
  volume =       "28",
  number =       "7",
  pages =        "728--740",
  month =        jul,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3899.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; management; measurement; theory",
  subject =      "{\bf K.6.1}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Project and People
                 Management, Systems development. {\bf K.4.1}: Computing
                 Milieux, COMPUTERS AND SOCIETY, Public Policy Issues.
                 {\bf K.4.3}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Organizational Impacts. {\bf J.1}: Computer
                 Applications, ADMINISTRATIVE DATA PROCESSING,
                 Government.",
}

@Article{Kelton:1985:TEE,
  author =       "W. David Kelton",
  title =        "Transient {exponential-Erlang} queues and steady-state
                 simulation",
  journal =      j-CACM,
  volume =       "28",
  number =       "7",
  pages =        "741--749",
  month =        jul,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "60K25 (68M20 68U20)",
  MRnumber =     "86k:60159",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1985.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3900.html",
  acknowledgement = ack-nhfb,
  descriptors =  "Queueing theory; in stationary process; simulation",
  keywords =     "experimentation; performance; theory",
  subject =      "{\bf G.m}: Mathematics of Computing, MISCELLANEOUS,
                 Queueing theory. {\bf I.6.1}: Computing Methodologies,
                 SIMULATION AND MODELING, Simulation Theory. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Probabilistic algorithms (including Monte Carlo).",
}

@Article{Stefik:1985:CSC,
  author =       "Mark Stefik",
  title =        "Corrigendum: {``Strategic Computing at {DARPA}:
                 Overview and Assessment''}",
  journal =      j-CACM,
  volume =       "28",
  number =       "8",
  pages =        "788--788",
  month =        aug,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 18:54:40 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/networking.bib",
  note =         "See \cite{Stefik:1985:SCA}.",
  acknowledgement = ack-nhfb,
}

@Article{Gifford:1985:CBN,
  author =       "David Gifford and Alfred Spector",
  title =        "The {CIRRUS} banking network",
  journal =      j-CACM,
  volume =       "28",
  number =       "8",
  pages =        "798--807",
  month =        aug,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/networking.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4022.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; management; performance; reliability;
                 security; verification",
  review =       "ACM CR 8605-0472",
  subject =      "{\bf J.1}: Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Financial. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Reliability,
                 availability, and serviceability. {\bf C.2.1}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Network Architecture and Design, Distributed networks.
                 {\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection.",
}

@Article{Frenkel:1985:RMC,
  author =       "Karen A. Frenkel",
  title =        "Report on the microelectronics and computer technology
                 corporation conference",
  journal =      j-CACM,
  volume =       "28",
  number =       "8",
  pages =        "808--813",
  month =        aug,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214934.html",
  acknowledgement = ack-nhfb,
  keywords =     "documentation",
  subject =      "{\bf B.0}: Hardware, GENERAL. {\bf C.0}: Computer
                 Systems Organization, GENERAL.",
}

@Article{Koffman:1985:RCC,
  author =       "Elliot B. Koffman and David Stemple and Caroline E.
                 Wardle",
  title =        "Recommended curriculum for {CS2}, 1984: a report of
                 the {ACM} curriculum task force for {CS2}",
  journal =      j-CACM,
  volume =       "28",
  number =       "8",
  pages =        "815--818",
  month =        aug,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214936.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; standardization",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Curriculum. {\bf K.3.2}: Computing Milieux, COMPUTERS
                 AND EDUCATION, Computer and Information Science
                 Education, Computer science education.",
}

@Article{Shearer:1985:ASS,
  author =       "J. M. Shearer and M. A. Wolfe",
  title =        "{ALGLIB}, a simple symbol-manipulation package",
  journal =      j-CACM,
  volume =       "28",
  number =       "8",
  pages =        "820--825",
  month =        aug,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Tue Dec 26 16:42:34 1995",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/sigsam.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4023.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; human factors; languages;
                 performance; reliability",
  review =       "ACM CR 8604-0366",
  subject =      "{\bf I.1.3}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Languages and Systems, ALGLIB. {\bf
                 D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, Software libraries. {\bf E.2}: Data, DATA
                 STORAGE REPRESENTATIONS, Composite structures. {\bf
                 I.1.1}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Expressions and Their Representation,
                 Representations (general and polynomial). {\bf I.1.3}:
                 Computing Methodologies, ALGEBRAIC MANIPULATION,
                 Languages and Systems.",
}

@Article{Smith:1985:DDC,
  author =       "Henry C. Smith",
  title =        "Database design: composing fully normalized tables
                 from a rigorous dependency diagram",
  journal =      j-CACM,
  volume =       "28",
  number =       "8",
  pages =        "826--838",
  month =        aug,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4024.html",
  acknowledgement = ack-nhfb,
  annote =       "Well written, nicely illustrated examples, mentions
                 overnormalization. Much related to Kent, some unusual
                 terms.",
  keywords =     "design",
  review =       "ACM CR 8601-0051",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Schema
                 and subschema. {\bf H.2.1}: Information Systems,
                 DATABASE MANAGEMENT, Logical Design, Normal forms.",
}

@Article{OLeary:1985:DFA,
  author =       "Dianne P. O'Leary and G. W. Stewart",
  title =        "Data-flow algorithms for parallel matrix computation",
  journal =      j-CACM,
  volume =       "28",
  number =       "8",
  pages =        "840--853",
  month =        aug,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "65W05 (65Fxx)",
  MRnumber =     "86j:65197",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4025.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms, nla, prll, eig, Sylvester equation,
                 Cholesky decomposition, matrix equation",
  subject =      "{\bf G.1.0}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, General, Parallel algorithms. {\bf G.1.3}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, Numerical
                 Linear Algebra, Linear systems (direct and iterative
                 methods). {\bf C.1.2}: Computer Systems Organization,
                 PROCESSOR ARCHITECTURES, Multiple Data Stream
                 Architectures (Multiprocessors), Parallel processors.",
}

@Article{Larmore:1985:EOP,
  author =       "L. L. Larmore and D. S. Hirschberg",
  title =        "Efficient optimal pagination of scrolls",
  journal =      j-CACM,
  volume =       "28",
  number =       "8",
  pages =        "854--856",
  month =        aug,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4026.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance; theory; verification",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 E.1}: Data, DATA STRUCTURES, Arrays. {\bf E.1}: Data,
                 DATA STRUCTURES, Tables.",
}

@Article{Bentley:1985:PPB,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Bumper-Sticker Computer Science",
  journal =      j-CACM,
  volume =       "28",
  number =       "9",
  pages =        "896--901",
  month =        sep,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:15 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Bentley85e",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley85e",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley85e",
}

@Article{Friedland:1985:SSA,
  author =       "Peter Friedland",
  title =        "Special section on architectures for knowledge-based
                 systems",
  journal =      j-CACM,
  volume =       "28",
  number =       "9",
  pages =        "902--903",
  month =        sep,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214937.html",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "{\bf C.0}: Computer Systems Organization, GENERAL,
                 System architectures. {\bf I.2.4}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Knowledge
                 Representation Formalisms and Methods. {\bf I.2.1}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Applications and Expert Systems.",
}

@Article{Fikes:1985:RFB,
  author =       "Richard Fikes and Tom Kehler",
  title =        "The Role of Frame-Based Representation in Reasoning",
  journal =      j-CACM,
  volume =       "28",
  number =       "9",
  pages =        "904--920",
  month =        sep,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/ai.misc.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/gesturing.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4285.html",
  abstract =     "describes STAR-PLAN which uses alarms to wake certain
                 parts of an expert system when conditions require its
                 analysis. Also discusses frames in general and KEE.",
  acknowledgement = ack-nhfb,
  annote =       "Research on frame-based representations has
                 concentrated on the structural issue, i.e.,
                 representing taxonomies of objects. This paper
                 discussed how to integrate frame with production rules
                 to provide reasoning capability with a frame-based
                 system.",
  keywords =     "design; languages; STAR\_PLAN satellite alarms KEE",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods, Frames and scripts. {\bf I.2.1}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Applications
                 and Expert Systems. {\bf I.2.8}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search.",
}

@Article{Hayes-Roth:1985:RBS,
  author =       "Frederick Hayes-Roth",
  title =        "Rule-based systems",
  journal =      j-CACM,
  volume =       "28",
  number =       "9",
  pages =        "921--932",
  month =        sep,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/ai.misc.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4286.html",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods, Representations (procedural and rule-based).
                 {\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems.",
}

@Article{Genesereth:1985:LP,
  author =       "Michael R. Genesereth and Matthew L. Ginsberg",
  title =        "Logic programming",
  journal =      j-CACM,
  volume =       "28",
  number =       "9",
  pages =        "933--941",
  month =        sep,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68T25",
  MRnumber =     "806 436",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/prolog.1.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4287.html",
  acknowledgement = ack-nhfb,
  keywords =     "languages; prolog; theory",
  subject =      "{\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Logic programming. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving. {\bf D.3.2}: Software, PROGRAMMING
                 LANGUAGES, Language Classifications, Prolog.",
}

@Article{Gutknecht:1985:CTE,
  author =       "J. Gutknecht",
  title =        "Concepts of the text editor {Lara}",
  journal =      j-CACM,
  volume =       "28",
  number =       "9",
  pages =        "942--960",
  month =        sep,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4288.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors",
  subject =      "{\bf I.7.1}: Computing Methodologies, TEXT PROCESSING,
                 Text Editing. {\bf I.7.2}: Computing Methodologies,
                 TEXT PROCESSING, Document Preparation. {\bf I.7.1}:
                 Computing Methodologies, TEXT PROCESSING, Text Editing,
                 Lara.",
}

@Article{Finn:1985:EUN,
  author =       "Gerard D. Finn",
  title =        "Extended use of null productions in {LR(1)} parser
                 applications",
  journal =      j-CACM,
  volume =       "28",
  number =       "9",
  pages =        "961--972",
  month =        sep,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1985.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4289.html",
  acknowledgement = ack-nhfb,
  annote =       "Applications programmed using LR(1) parsers should be
                 designed to that as many functions as possible are
                 controlled by the driving parsing machine through
                 conveniently staged reductions and associated primitive
                 actions; in this paper this is achieved by making
                 extensive use of null productions and nullable
                 nonterminal symbols.",
  country =      "USA",
  descriptors =  "Method; survey; compiler; parsing method; Backus-Naur
                 form",
  enum =         "934",
  keywords =     "design; languages",
  references =   "8",
  subject =      "{\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Parsing.",
}

@Article{Samet:1985:DSQ,
  author =       "Hanan Samet",
  title =        "Data structures for quadtree approximation and
                 compression",
  journal =      j-CACM,
  volume =       "28",
  number =       "9",
  institution =  "U Md",
  pages =        "973--993",
  month =        sep,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:21:19 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/rosenfeld/1985.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/84.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4290.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; image approximation; theory",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf E.4}:
                 Data, CODING AND INFORMATION THEORY, Data compaction
                 and compression. {\bf I.2.10}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Vision and Scene
                 Understanding, Representations, data structures, and
                 transforms. {\bf I.4.2}: Computing Methodologies, IMAGE
                 PROCESSING, Compression (Coding), Approximate methods.
                 {\bf I.4.2}: Computing Methodologies, IMAGE PROCESSING,
                 Compression (Coding), Exact coding.",
}

@Article{Slagle:1985:ESR,
  author =       "James R. Slagle and Henry Hamburger",
  title =        "An expert system for a resource allocation problem",
  journal =      j-CACM,
  volume =       "28",
  number =       "9",
  pages =        "994--1004",
  month =        sep,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/ai.misc.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4291.html",
  abstract =     "describes a system for deciding how to allocate
                 weapons. Goes into detail on its variation of A* to
                 come up with a good approximation to the optimum
                 configuration and how values are propagated through the
                 network. The techniques described could be used in such
                 applications as allocating advertising time in dealing
                 with competitors in the marketplace.",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; Battle; design; performance",
  subject =      "{\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems. {\bf
                 J.7}: Computer Applications, COMPUTERS IN OTHER
                 SYSTEMS, Military.",
}

@Article{Chaum:1985:SIT,
  author =       "David Chaum",
  title =        "Security without identification: transaction systems
                 to make big brother obsolete",
  journal =      j-CACM,
  volume =       "28",
  number =       "10",
  pages =        "1030--1044",
  month =        oct,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4373.html",
  abstract =     "The large-scale automated transaction systems of the
                 near future can be designed to protect the privacy and
                 maintain the security of both individuals and
                 organizations.",
  acknowledgement = ack-nhfb,
  annote =       "Extensive article on use of random, transient personal
                 id's. A digital pseudonym with each organization.",
  keywords =     "design; human factors; security",
  review =       "ACM CR 8608-0693",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection. {\bf E.3}: Data, DATA ENCRYPTION. {\bf
                 J.1}: Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Financial. {\bf K.4.1}: Computing Milieux,
                 COMPUTERS AND SOCIETY, Public Policy Issues, Privacy.
                 {\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Social Issues, Abuse and crime involving computers.",
}

@Article{Ariav:1985:DDS,
  author =       "Gad Ariav and Michael J. Ginzberg",
  title =        "{DSS} design: a systemic view of decision support",
  journal =      j-CACM,
  volume =       "28",
  number =       "10",
  pages =        "1045--1052",
  month =        oct,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4374.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; management",
  subject =      "{\bf H.4.2}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Types of Systems, Decision support. {\bf
                 D.2.1}: Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications, Methodologies. {\bf J.1}:
                 Computer Applications, ADMINISTRATIVE DATA PROCESSING,
                 Business. {\bf H.1.1}: Information Systems, MODELS AND
                 PRINCIPLES, Systems and Information Theory, General
                 systems theory.",
}

@Article{Mandl:1985:OLS,
  author =       "Robert Mandl",
  title =        "Orthogonal {Latin} squares: an application of
                 experiment design to compiler testing",
  journal =      j-CACM,
  volume =       "28",
  number =       "10",
  pages =        "1054--1058",
  month =        oct,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4375.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; experimentation; reliability;
                 verification",
  subject =      "{\bf D.2.5}: Software, SOFTWARE ENGINEERING, Testing
                 and Debugging. {\bf D.2.4}: Software, SOFTWARE
                 ENGINEERING, Program Verification, Validation.",
}

@Article{Sanden:1985:SPJ,
  author =       "Bo Sanden",
  title =        "Systems programming with {JSP}: example --- a {VDU}
                 controller",
  journal =      j-CACM,
  volume =       "28",
  number =       "10",
  pages =        "1059--1067",
  month =        oct,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4376.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages; management",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, JSP. {\bf D.2.1}: Software, SOFTWARE
                 ENGINEERING, Requirements/Specifications. {\bf K.6.1}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Project and People Management,
                 Systems analysis and design. {\bf K.6.3}: Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, Software Management, Software development.
                 {\bf C.3}: Computer Systems Organization,
                 SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS,
                 Microprocessor/microcomputer applications.",
}

@Article{Norton:1985:PMO,
  author =       "R. M. Norton and D. P. Yeager",
  title =        "A Probability Model for Overflow Sufficiency in Small
                 Hash Tables",
  journal =      j-CACM,
  volume =       "28",
  number =       "10",
  pages =        "1068--1075",
  month =        oct,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P05",
  MRnumber =     "806 437",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4377.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; performance",
  subject =      "{\bf E.2}: Data, DATA STORAGE REPRESENTATIONS,
                 Hash-table representations. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sorting and searching. {\bf D.2.8}: Software, SOFTWARE
                 ENGINEERING, Metrics, Performance measures. {\bf
                 H.3.2}: Information Systems, INFORMATION STORAGE AND
                 RETRIEVAL, Information Storage, File organization. {\bf
                 D.4.2}: Software, OPERATING SYSTEMS, Storage
                 Management, Allocation/deallocation strategies.",
}

@Article{Jain:1985:ADC,
  author =       "Raj Jain and Imrich Chlamtac",
  title =        "The {$P^2$} Algorithm for Dynamic Calculation of
                 Quantiles and Histograms Without Storing Observations",
  journal =      j-CACM,
  volume =       "28",
  number =       "10",
  pages =        "1076--1085",
  month =        oct,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:52:29 MST 2001",
  bibsource =    "and
                 ftp://ftp.ira.uka.de/pub/bibliography/Graphics/rosenfeld/1985.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1985.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#JainC85;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4378.html",
  acknowledgement = ack-nhfb,
  descriptors =  "Statistics; time series analysis",
  keywords =     "algorithms; image processing; measurement; quality",
  oldlabel =     "JainC85",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Statistical computing. {\bf I.6.m}:
                 Computing Methodologies, SIMULATION AND MODELING,
                 Miscellaneous. {\bf J.7}: Computer Applications,
                 COMPUTERS IN OTHER SYSTEMS, Real time.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/JainC85",
}

@Article{Bentley:1985:PPSb,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Selection",
  journal =      j-CACM,
  volume =       "28",
  number =       "11",
  pages =        "1121--1127",
  month =        nov,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:16 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#Bentley85f",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley85f",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley85f",
}

@Article{Denning:1985:CFS,
  author =       "Peter J. Denning and Michael C. Mulder",
  title =        "Computing in the Frontiers of Science and Engineering
                 --- Introduction",
  journal =      j-CACM,
  volume =       "28",
  number =       "11",
  pages =        "1128--1129",
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:35:32 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm28.html#DenningM85",
  acknowledgement = ack-nhfb,
  oldlabel =     "DenningM85",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/DenningM85",
}

@Article{Raugh:1985:MCE,
  author =       "Michael R. Raugh",
  title =        "Modeling {California} earthquakes and earth
                 structures",
  journal =      j-CACM,
  volume =       "28",
  number =       "11",
  pages =        "1130--1150",
  month =        nov,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4548.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; theory",
  subject =      "{\bf J.2}: Computer Applications, PHYSICAL SCIENCES
                 AND ENGINEERING, Earth and atmospheric sciences. {\bf
                 I.6.3}: Computing Methodologies, SIMULATION AND
                 MODELING, Applications. {\bf I.6.4}: Computing
                 Methodologies, SIMULATION AND MODELING, Model
                 Validation and Analysis.",
}

@Article{Cullers:1985:SPS,
  author =       "D. K. Cullers and Ivan R. Linscott and Bernard M.
                 Oliver",
  title =        "Signal processing in {SETI}",
  journal =      j-CACM,
  volume =       "28",
  number =       "11",
  pages =        "1151--1163",
  month =        nov,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4549.html",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "{\bf J.2}: Computer Applications, PHYSICAL SCIENCES
                 AND ENGINEERING, Astronomy. {\bf C.3}: Computer Systems
                 Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
                 SYSTEMS, Signal processing systems. {\bf I.5.4}:
                 Computing Methodologies, PATTERN RECOGNITION,
                 Applications, Signal processing.",
}

@Article{Friedland:1985:DSD,
  author =       "Peter Friedland and Laurence H. Kedes",
  title =        "Discovering the secrets of {DNA}",
  journal =      j-CACM,
  volume =       "28",
  number =       "11",
  pages =        "1164--1186",
  month =        nov,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4550.html",
  acknowledgement = ack-nhfb,
  comment =      "A very general introduction of the terms of genetic
                 sequencing for CS people. Very little of specific
                 interest, but good coverage of the general questions
                 biochemists might have. Very heavy on MOLGEN and AI
                 techniques to solve some of these questions.",
  keywords =     "design; theory",
  subject =      "{\bf J.3}: Computer Applications, LIFE AND MEDICAL
                 SCIENCES, Biology. {\bf I.2.1}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Applications
                 and Expert Systems, Medicine and science. {\bf I.5.4}:
                 Computing Methodologies, PATTERN RECOGNITION,
                 Applications.",
}

@Article{Chambers:1985:PFH,
  author =       "Alan B. Chambers and David C. Nagel",
  title =        "Pilots of the future: human or computer?",
  journal =      j-CACM,
  volume =       "28",
  number =       "11",
  pages =        "1187--1199",
  month =        nov,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4551.html",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "{\bf J.2}: Computer Applications, PHYSICAL SCIENCES
                 AND ENGINEERING, Aerospace. {\bf J.7}: Computer
                 Applications, COMPUTERS IN OTHER SYSTEMS, Command and
                 control. {\bf I.2.1}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Applications and Expert
                 Systems.",
}

@Article{Kleinrock:1985:DS,
  author =       "Leonard Kleinrock",
  title =        "Distributed systems",
  journal =      j-CACM,
  volume =       "28",
  number =       "11",
  pages =        "1200--1213",
  month =        nov,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1985.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4552.html",
  abstract =     "Growth of distributed systems has attained unstoppable
                 momentum. If we better understood how to think about,
                 analyze, and design distributed systems, we could
                 direct their implementation with more confidence.",
  acknowledgement = ack-nhfb,
  descriptors =  "Parallel computing; distributed simulation",
  keywords =     "algorithms; design; performance",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS.",
}

@Article{Balkovich:1985:CHE,
  author =       "Edward Balkovich and Steven Lerman and Richard P.
                 Parmelee",
  title =        "Computing in higher education: the {Athena}
                 experience",
  journal =      j-CACM,
  volume =       "28",
  number =       "11",
  pages =        "1214--1224",
  month =        nov,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4553.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; management",
  review =       "ACM CR 8605-0477",
  subject =      "{\bf K.3.0}: Computing Milieux, COMPUTERS AND
                 EDUCATION, General. {\bf K.8}: Computing Milieux,
                 PERSONAL COMPUTING.",
}

@Article{Birnbaum:1985:TDM,
  author =       "Joel S. Birnbaum",
  title =        "Toward the domestication of microelectronics",
  journal =      j-CACM,
  volume =       "28",
  number =       "11",
  pages =        "1225--1235",
  month =        nov,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4554.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors",
  review =       "ACM CR 8605-0478",
  subject =      "{\bf B.7.2}: Hardware, INTEGRATED CIRCUITS, Design
                 Aids, Simulation. B Hardware, Hardware \\ B.7 Hardware,
                 INTEGRATED CIRCUITS, Types and Design Styles \\ C.5
                 Computer Systems Organization, COMPUTER SYSTEM
                 IMPLEMENTATION, Microcomputers \\ C.5 Computer Systems
                 Organization, COMPUTER SYSTEM IMPLEMENTATION, VLSI
                 Systems \\ D.2 Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications \\ I.2 Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Applications
                 and Expert Systems \\ I.3 Computing Methodologies,
                 COMPUTER GRAPHICS, Picture/Image Generation \\ K.4
                 Computing Milieux, COMPUTERS AND SOCIETY, General K
                 Computing Milieux, PERSONAL COMPUTING",
}

@Article{Colmerauer:1985:PF,
  author =       "Alain Colmerauer",
  title =        "{Prolog} in 10 figures",
  journal =      j-CACM,
  volume =       "28",
  number =       "12",
  pages =        "1296--1310",
  month =        dec,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214958.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  subject =      "{\bf I.2.5}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Programming Languages and Software,
                 Prolog. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic.",
}

@Article{Cohen:1985:DPI,
  author =       "Jacques Cohen",
  title =        "Describing {Prolog} by its interpretation and
                 compilation",
  journal =      j-CACM,
  volume =       "28",
  number =       "12",
  pages =        "1311--1324",
  month =        dec,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214960.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Prolog. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features.",
}

@Article{Parnas:1985:SAS,
  author =       "David Lorge Parnas",
  title =        "Software aspects of strategic defense systems",
  journal =      j-CACM,
  volume =       "28",
  number =       "12",
  pages =        "1326--1335",
  month =        dec,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/networking.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214961.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; management",
  subject =      "{\bf J.1}: Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Military. {\bf K.6.3}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
                 Software Management.",
}

@Article{Cormack:1985:DCD,
  author =       "Gordon V. Cormack",
  title =        "Data compression on a database system",
  journal =      j-CACM,
  volume =       "28",
  number =       "12",
  pages =        "1336--1342",
  month =        dec,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214963.html",
  acknowledgement = ack-nhfb,
  annote =       "first partition into IMS based types, then Huffman.
                 Gives factor two space, adds 17pct time.",
  keywords =     "design; IMS compression one (entire) record at a
                 time.; management; performance",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY, Data
                 compaction and compression. {\bf H.2.0}: Information
                 Systems, DATABASE MANAGEMENT, General.",
}

@Article{McKeen:1985:SMP,
  author =       "J. D. McKeen and Tor Guimaraes",
  title =        "Selecting {MIS} projects by steering committee",
  journal =      j-CACM,
  volume =       "28",
  number =       "12",
  pages =        "1344--1352",
  month =        dec,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214965.html",
  acknowledgement = ack-nhfb,
  keywords =     "management",
  subject =      "{\bf H.4.2}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Types of Systems, Decision support. {\bf
                 K.6.4}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, System Management.",
}

@Article{Hewitt:1986:OOS,
  author =       "Carl Hewitt",
  title =        "Offices are Open Systems",
  journal =      j-CACM,
  volume =       "4",
  number =       "3",
  pages =        "271--287",
  month =        Jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sun Sep 18 22:14:40 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/dai.bib",
  note =         "(Also published in {\em Readings in Distributed
                 Artificial Intelligence}, Alan H. Bond and Les Gasser,
                 editors, pages 321--330, Morgan Kaufmann, 1988.)",
  acknowledgement = ack-nhfb,
}

@Article{Laudon:1986:DQD,
  author =       "Kenneth C. Laudon",
  title =        "Data quality and due process in large
                 interorganizational record systems",
  journal =      j-CACM,
  volume =       "29",
  number =       "1",
  pages =        "4--11",
  month =        jan,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5466.html",
  acknowledgement = ack-nhfb,
  annote =       "Quality of Data in the criminal-record system.
                 Problems found in 50-83 pct of the records. Some errors
                 rates exceed 50pct.",
  keywords =     "human factors; legal aspects; management; theory",
  subject =      "{\bf K.4.1}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Public Policy Issues. {\bf K.4.3}: Computing Milieux,
                 COMPUTERS AND SOCIETY, Organizational Impacts. {\bf
                 K.6.4}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, System Management. {\bf H.3.4}:
                 Information Systems, INFORMATION STORAGE AND RETRIEVAL,
                 Systems and Software, Information networks. {\bf H.0}:
                 Information Systems, GENERAL. {\bf J.4}: Computer
                 Applications, SOCIAL AND BEHAVIORAL SCIENCES. {\bf
                 J.1}: Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Law.",
}

@Article{Frand:1986:SSA,
  author =       "Jason L. Frand and Ephraim R. McLean",
  title =        "Summary of the second annual {UCLA} survey of business
                 school computer usage",
  journal =      j-CACM,
  volume =       "29",
  number =       "1",
  pages =        "12--18",
  month =        jan,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6040.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; management",
  subject =      "{\bf J.1}: Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Business. {\bf K.3.1}: Computing Milieux,
                 COMPUTERS AND EDUCATION, Computer Uses in Education.",
}

@Article{Banatre:1986:DBE,
  author =       "Jean-Pierre Ban{\^a}tre and Michel Ban{\^a}tre and Guy
                 Lapalme and Florimond Ployette",
  title =        "The design and building of {Ench{\`e}re}, a
                 distributed electronic marketing system",
  journal =      j-CACM,
  volume =       "29",
  number =       "1",
  pages =        "19--29",
  month =        jan,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5467.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; management; reliability",
  review =       "ACM CR 8609-0805",
  subject =      "{\bf D.4.0}: Software, OPERATING SYSTEMS, General,
                 Ench{\`e}re. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed applications. {\bf
                 H.4.3}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Communications Applications. {\bf J.1}:
                 Computer Applications, ADMINISTRATIVE DATA PROCESSING,
                 Business. {\bf D.4.0}: Software, OPERATING SYSTEMS,
                 General. {\bf B.3.2}: Hardware, MEMORY STRUCTURES,
                 Design Styles. {\bf D.4.7}: Software, OPERATING
                 SYSTEMS, Organization and Design, Distributed
                 systems.",
}

@Article{Heck:1986:WMI,
  author =       "Mike Heck and Martin Plaehn",
  title =        "A workstation model for an interactive graphics
                 system",
  journal =      j-CACM,
  volume =       "29",
  number =       "1",
  pages =        "30--37",
  month =        jan,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5468.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; performance",
  review =       "ACM CR 8611-1046",
  subject =      "{\bf I.3.4}: Computing Methodologies, COMPUTER
                 GRAPHICS, Graphics Utilities, TEMPLATE. {\bf I.3.2}:
                 Computing Methodologies, COMPUTER GRAPHICS, Graphics
                 Systems. {\bf I.3.6}: Computing Methodologies, COMPUTER
                 GRAPHICS, Methodology and Techniques. {\bf I.3.4}:
                 Computing Methodologies, COMPUTER GRAPHICS, Graphics
                 Utilities, Graphics packages.",
}

@Article{Davis:1986:SPS,
  author =       "Gordon B. Davis",
  title =        "Selected papers from the sixth international
                 conference on information systems",
  journal =      j-CACM,
  volume =       "29",
  number =       "1",
  pages =        "39--39",
  month =        jan,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214903.html",
  acknowledgement = ack-nhfb,
  keywords =     "documentation",
  subject =      "{\bf H.0}: Information Systems, GENERAL.",
}

@Article{Dickson:1986:UEC,
  author =       "Gary W. Dickson and Gerardine DeSanctis and D. J.
                 McBride",
  title =        "Understanding the effectiveness of computer graphics
                 for decision support: a cumulative experimental
                 approach",
  journal =      j-CACM,
  volume =       "29",
  number =       "1",
  pages =        "40--47",
  month =        jan,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5469.html",
  acknowledgement = ack-nhfb,
  keywords =     "experimentation; human factors; management",
  review =       "ACM CR 8705-0397",
  subject =      "{\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors. {\bf
                 H.4.2}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Types of Systems, Decision support. {\bf
                 I.3.0}: Computing Methodologies, COMPUTER GRAPHICS,
                 General.",
}

@Article{Vessey:1986:STC,
  author =       "Iris Vessey and Ron Weber",
  title =        "Structured tools and conditional logic: an empirical
                 investigation",
  journal =      j-CACM,
  volume =       "29",
  number =       "1",
  pages =        "48--57",
  month =        jan,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5470.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; human factors; measurement;
                 performance",
  review =       "ACM CR 8610-0915",
  subject =      "{\bf D.m}: Software, MISCELLANEOUS, Software
                 psychology. {\bf D.2.1}: Software, SOFTWARE
                 ENGINEERING, Requirements/Specifications, Tools. {\bf
                 D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, Decision tables.",
}

@Article{Bentley:1986:PPC,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Cutting the {Gordian} Knot",
  journal =      j-CACM,
  volume =       "29",
  number =       "2",
  pages =        "92--96",
  month =        feb,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:17 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Bentley86",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley86",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley86",
}

@Article{Karp:1986:CCR,
  author =       "Richard M. Karp",
  title =        "Combinatorics, complexity, and randomness",
  journal =      j-CACM,
  volume =       "29",
  number =       "2",
  pages =        "98--109",
  month =        feb,
  year =         "1986",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/5657.5658",
  ISSN =         "0001-0782",
  MRclass =      "68Q15 (68Q25 68R05 68R10 90B10)",
  MRnumber =     "824 352",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 http://www.acm.org/pubs/toc/",
  note =         "This is the 1985 ACM Turing Award Lecture. It traces
                 the development of combinatorial optimization and
                 computational complexity theory. It discusses
                 probabilistic algorithms and probabilistic analysis of
                 approximation algorithms for {\em NP}-complete
                 optimization problems.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5658.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance; theory",
  review =       "ACM CR 8610-0921",
  subject =      "{\bf F.1.0}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, General. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics. {\bf
                 K.2}: Computing Milieux, HISTORY OF COMPUTING, People.
                 {\bf F.0}: Theory of Computation, GENERAL. {\bf F.2.0}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, General. {\bf G.2.2}: Mathematics
                 of Computing, DISCRETE MATHEMATICS, Graph Theory. {\bf
                 F.1.3}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Complexity Classes, Reducibility and
                 completeness. {\bf F.1.3}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Complexity Classes,
                 Relations among complexity classes. {\bf K.2}:
                 Computing Milieux, HISTORY OF COMPUTING.",
}

@Article{Frenkel:1986:PTC,
  author =       "Karen Frenkel",
  title =        "Piecing together complexity",
  journal =      j-CACM,
  volume =       "29",
  number =       "2",
  pages =        "110--111",
  month =        feb,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214905.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes. {\bf F.2.0}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, General.",
}

@Article{Frenkel:1986:CPP,
  author =       "Karen A. Frenkel",
  title =        "Complexity and parallel processing: an interview with
                 {Richard Karp}",
  journal =      j-CACM,
  volume =       "29",
  number =       "2",
  pages =        "112--117",
  month =        feb,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6326.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; performance; theory",
  subject =      "{\bf K.2}: Computing Milieux, HISTORY OF COMPUTING.
                 {\bf G.2.1}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Combinatorics. {\bf F.0}: Theory of
                 Computation, GENERAL. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Computability theory. {\bf F.1.2}: Theory
                 of Computation, COMPUTATION BY ABSTRACT DEVICES, Modes
                 of Computation, Parallelism and concurrency. {\bf
                 F.2.0}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, General. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory. {\bf F.1.2}: Theory of Computation, COMPUTATION
                 BY ABSTRACT DEVICES, Modes of Computation,
                 Probabilistic computation. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Reducibility and completeness. {\bf
                 F.1.3}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Complexity Classes, Relations among complexity
                 classes.",
}

@Article{PeytonJones:1986:PDO,
  author =       "Simon L. {Peyton Jones}",
  title =        "Parsing Distfix Operators",
  journal =      j-CACM,
  volume =       "29",
  number =       "2",
  pages =        "118--122",
  month =        feb,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:53:05 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Jones86;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5659.html",
  abstract =     "The advantages of user-defined distfix operators -- a
                 syntactic convenience that enhances the readability of
                 programs -- can be obtained as an extension of almost
                 any programming language without requiring dynamic
                 changes to the parser.",
  acknowledgement = ack-nhfb,
  keywords =     "design; functional; languages; lex; yacc",
  oldlabel =     "Jones86",
  review =       "ACM CR 8609-0803",
  subject =      "{\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Parsing. {\bf D.3.2}: Software, PROGRAMMING
                 LANGUAGES, Language Classifications, SASL.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Jones86",
}

@Article{Harrison:1986:NBM,
  author =       "Warren Harrison and Curtis R. Cook",
  title =        "A note on the {Berry-Meekings} style metric",
  journal =      j-CACM,
  volume =       "29",
  number =       "2",
  pages =        "123--125",
  month =        feb,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5660.html",
  acknowledgement = ack-nhfb,
  keywords =     "experimentation; measurement",
  review =       "ACM CR 8609-0794",
  subject =      "{\bf D.2.8}: Software, SOFTWARE ENGINEERING, Metrics,
                 Complexity measures. {\bf D.2.9}: Software, SOFTWARE
                 ENGINEERING, Management, Software quality assurance
                 (SQA).",
}

@Article{Redish:1986:PSA,
  author =       "K. A. Redish and W. F. Smyth",
  title =        "Program style analysis: a natural by-product of
                 program compilation",
  journal =      j-CACM,
  volume =       "29",
  number =       "2",
  pages =        "126--133",
  month =        feb,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5661.html",
  acknowledgement = ack-nhfb,
  keywords =     "languages; measurement; standardization",
  review =       "ACM CR 8610-0906",
  subject =      "{\bf D.2.8}: Software, SOFTWARE ENGINEERING, Metrics.
                 {\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Computer science education. {\bf D.m}: Software,
                 MISCELLANEOUS, Software psychology. {\bf D.1.m}:
                 Software, PROGRAMMING TECHNIQUES, Miscellaneous.",
}

@Article{Yeh:1986:DIA,
  author =       "D. Yun Yeh and Toshinori Munakata",
  title =        "Dynamic initial allocation and local reallocation
                 procedures for multiple stacks",
  journal =      j-CACM,
  volume =       "29",
  number =       "2",
  pages =        "134--141",
  month =        feb,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5662.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Lists. {\bf D.4.2}:
                 Software, OPERATING SYSTEMS, Storage Management,
                 Allocation/deallocation strategies.",
}

@Article{Saunders:1986:OPI,
  author =       "Carol S. Saunders and Richard W. Scamell",
  title =        "Organizational power and the information services
                 department: a reexamination",
  journal =      j-CACM,
  volume =       "29",
  number =       "2",
  pages =        "142--147",
  month =        feb,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5663.html",
  acknowledgement = ack-nhfb,
  keywords =     "management; measurement; theory",
  subject =      "{\bf K.4.3}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Organizational Impacts. {\bf K.6.0}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
                 General. {\bf H.m}: Information Systems,
                 MISCELLANEOUS.",
}

@Article{Bentley:1986:PPE,
  author =       "J. L. Bentley",
  title =        "Programming Pearls: The Envelope is Back",
  journal =      j-CACM,
  volume =       "29",
  number =       "3",
  pages =        "176--182",
  month =        mar,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  acknowledgement = ack-nhfb,
}

@Article{Morris:1986:ADP,
  author =       "James H. Morris and Mahadev Satyanarayanan and Michael
                 H. Conner and John H. Howard and David S. Rosenthal and
                 F. Donelson Smith",
  title =        "{Andrew}: {A} Distributed Personal Computing
                 Environment",
  journal =      j-CACM,
  volume =       "29",
  number =       "3",
  pages =        "184--201",
  month =        mar,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Apr 06 08:06:13 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5671.html",
  abstract =     "The Information Technology Center (ITC), a
                 collaborative effort between IBM and Carnegie-Mellon
                 University, is in process of creating Andrew, a
                 prototype computing and communication system for
                 universities. This article traces the origins of
                 Andrew, discusses its goals and strategies, and gives
                 an overview of the current status of its implementation
                 and usage.",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; security",
  review =       "ACM CR 8612-1076",
  subject =      "{\bf C.0}: Computer Systems Organization, GENERAL,
                 Andrew. {\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design. {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf C.2.5}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Local Networks. {\bf
                 H.1.2}: Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems. {\bf C.0}: Computer Systems
                 Organization, GENERAL, System architectures. {\bf K.8}:
                 Computing Milieux, PERSONAL COMPUTING. {\bf K.3.1}:
                 Computing Milieux, COMPUTERS AND EDUCATION, Computer
                 Uses in Education. {\bf E.5}: Data, FILES. {\bf D.4.3}:
                 Software, OPERATING SYSTEMS, File Systems Management.
                 {\bf D.4.0}: Software, OPERATING SYSTEMS, General,
                 VICE.",
}

@Article{Gibbs:1986:MCL,
  author =       "Norman E. Gibbs and Allen B. Tucker",
  title =        "A Model Curriculum for a Liberal Arts Degree in
                 Computer Science",
  journal =      j-CACM,
  volume =       "29",
  number =       "3",
  pages =        "202--210",
  month =        mar,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5667.html",
  acknowledgement = ack-nhfb,
  review =       "ACM CR 8610-0966",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Curriculum. {\bf K.3.2}: Computing Milieux, COMPUTERS
                 AND EDUCATION, Computer and Information Science
                 Education, Computer science education.",
}

@Article{Sircar:1986:RBB,
  author =       "Sumit Sircar and Dinesh Dave",
  title =        "The relationship between benchmark tests and
                 microcomputer price",
  journal =      j-CACM,
  volume =       "29",
  number =       "3",
  pages =        "212--217",
  month =        mar,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5672.html",
  acknowledgement = ack-nhfb,
  keywords =     "economics; measurement; performance",
  review =       "ACM CR 8611-1000",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS. {\bf K.6.2}: Computing Milieux, MANAGEMENT
                 OF COMPUTING AND INFORMATION SYSTEMS, Installation
                 Management, Benchmarks. {\bf K.6.2}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
                 Installation Management, Pricing and resource
                 allocation. {\bf K.6.2}: Computing Milieux, MANAGEMENT
                 OF COMPUTING AND INFORMATION SYSTEMS, Installation
                 Management, Performance and usage measurement.",
}

@Article{Fleming:1986:HLS,
  author =       "Philip J. Fleming and John J. Wallace",
  title =        "How not to lie with statistics: the correct way to
                 summarize benchmark results",
  journal =      j-CACM,
  volume =       "29",
  number =       "3",
  pages =        "218--221",
  month =        mar,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1986.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5673.html",
  acknowledgement = ack-nhfb,
  annote =       "Using the arithmetic mean leads to mistakes that can
                 be avoided by using the geometric mean.",
  descriptors =  "Measurement; Statistics; Benchmark; Geometric
                 Distribution",
  keywords =     "measurement; performance",
  review =       "ACM CR 8701-0015",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Measurement techniques. {\bf C.4}: Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS,
                 Performance attributes. {\bf G.3}: Mathematics of
                 Computing, PROBABILITY AND STATISTICS.",
}

@Article{Golden:1986:SMF,
  author =       "Donald Golden and Michael Pechura",
  title =        "The structure of microcomputer file systems",
  journal =      j-CACM,
  volume =       "29",
  number =       "3",
  pages =        "222--230",
  month =        mar,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5668.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; standardization",
  review =       "ACM CR 8610-0913",
  subject =      "{\bf D.4.3}: Software, OPERATING SYSTEMS, File Systems
                 Management, Directory structures. {\bf D.4.3}:
                 Software, OPERATING SYSTEMS, File Systems Management,
                 File organization. {\bf E.5}: Data, FILES,
                 Organization/structure.",
}

@Article{Lindstrom:1986:EO,
  author =       "Gary Lindstrom",
  title =        "{Elliott I. Organick} (1925--1985)",
  journal =      j-CACM,
  volume =       "29",
  number =       "3",
  pages =        "231--231",
  month =        mar,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "01A70",
  MRnumber =     "828 334",
  bibdate =      "Sat Apr 06 08:04:52 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6325.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  subject =      "{\bf A.0}: General Literature, GENERAL,
                 Biographies/autobiographies.",
}

@Article{Baroudi:1986:ESI,
  author =       "Jack J. Baroudi and Margrethe H. Olson and Blake
                 Ives",
  title =        "An empirical study of the impact of user involvement
                 on system usage and information satisfaction",
  journal =      j-CACM,
  volume =       "29",
  number =       "3",
  pages =        "232--238",
  month =        mar,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5669.html",
  acknowledgement = ack-nhfb,
  keywords =     "experimentation; human factors; management;
                 measurement; performance",
  review =       "ACM CR 8704-0328",
  subject =      "{\bf K.6.3}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Software Management,
                 Software development. {\bf D.2.9}: Software, SOFTWARE
                 ENGINEERING, Management. {\bf H.1.2}: Information
                 Systems, MODELS AND PRINCIPLES, User/Machine Systems,
                 Human factors. {\bf K.6.1}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
                 Project and People Management, Systems development.",
}

@Article{Lu:1986:CFP,
  author =       "H. E. L{\"u} and P. S. P. Wang",
  title =        "A Comment on {``A Fast Parallel Algorithm for Thinning
                 Digital Patterns''}",
  journal =      j-CACM,
  volume =       "29",
  number =       "3",
  institution =  "NEU",
  pages =        "239--242",
  month =        mar,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:24:20 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/rosenfeld/1986.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5670.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; image part processing; performance;
                 theory",
  review =       "ACM CR 8701-0032",
  subject =      "I.4.7 Computing Methodologies, IMAGE PROCESSING,
                 Feature Measurement, Invariants \\ I.5.2 Computing
                 Methodologies, PATTERN RECOGNITION, Design Methodology,
                 Pattern analysis \\ I.5.4 Computing Methodologies,
                 PATTERN RECOGNITION, Applications, Computer vision \\
                 I.4 Computing Methodologies, IMAGE PROCESSING \\ I.4.7
                 Computing Methodologies, IMAGE PROCESSING, Feature
                 Measurement, Size and shape \\ I.4.1 Computing
                 Methodologies, IMAGE PROCESSING, Digitization",
}

@Article{Spector:1986:CSP,
  author =       "Alfred Spector and David Gifford",
  title =        "A computer science perspective of bridge design",
  journal =      j-CACM,
  volume =       "29",
  number =       "4",
  pages =        "267--283",
  month =        apr,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:24:52 1997",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6327.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; standardization",
  subject =      "{\bf D.2.9}: Software, SOFTWARE ENGINEERING,
                 Management. {\bf J.2}: Computer Applications, PHYSICAL
                 SCIENCES AND ENGINEERING. {\bf J.6}: Computer
                 Applications, COMPUTER-AIDED ENGINEERING,
                 Computer-aided design (CAD). {\bf K.6.1}: Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, Project and People Management. {\bf K.6.3}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Software Management.",
}

@Article{Frenkel:1986:CCS,
  author =       "Karen A. Frenkel",
  title =        "Computers, complexity, and the {Statue} of {Liberty}
                 restoration",
  journal =      j-CACM,
  volume =       "29",
  number =       "4",
  pages =        "284--296",
  month =        apr,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5685.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; measurement",
  review =       "ACM CR 8611-1051",
  subject =      "{\bf J.2}: Computer Applications, PHYSICAL SCIENCES
                 AND ENGINEERING, Engineering. {\bf I.3.3}: Computing
                 Methodologies, COMPUTER GRAPHICS, Picture/Image
                 Generation, Digitizing and scanning. {\bf I.3.5}:
                 Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling. {\bf
                 I.3.7}: Computing Methodologies, COMPUTER GRAPHICS,
                 Three-Dimensional Graphics and Realism. {\bf I.4.1}:
                 Computing Methodologies, IMAGE PROCESSING,
                 Digitization. {\bf I.6.3}: Computing Methodologies,
                 SIMULATION AND MODELING, Applications. {\bf J.6}:
                 Computer Applications, COMPUTER-AIDED ENGINEERING,
                 Computer-aided design (CAD).",
}

@Article{Lee:1986:PAR,
  author =       "John A. Lee and Gerald Segal and Rosalie Steier",
  title =        "Positive alternatives: a report on an {ACM} panel on
                 hacking",
  journal =      j-CACM,
  volume =       "29",
  number =       "4",
  pages =        "297--299",
  month =        apr,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6377.html",
  acknowledgement = ack-nhfb,
  keywords =     "security",
  subject =      "{\bf K.4.1}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Public Policy Issues. {\bf K.4.2}: Computing Milieux,
                 COMPUTERS AND SOCIETY, Social Issues. {\bf K.5.1}:
                 Computing Milieux, LEGAL ASPECTS OF COMPUTING, Software
                 Protection. {\bf K.6.m}: Computing Milieux, MANAGEMENT
                 OF COMPUTING AND INFORMATION SYSTEMS, Miscellaneous.
                 {\bf K.7.m}: Computing Milieux, THE COMPUTING
                 PROFESSION, Miscellaneous.",
}

@Article{Jones:1986:ECP,
  author =       "Douglas W. Jones",
  title =        "An empirical comparison of priority-queue and
                 event-set implementations",
  journal =      j-CACM,
  volume =       "29",
  number =       "4",
  pages =        "300--311",
  month =        apr,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu Apr 29 17:35:40 1999",
  bibsource =    "http://www.acm.org/pubs/toc/",
  note =         "See \cite{Kubale:1985:GIE}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5686.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; measurement; performance",
  review =       "ACM CR 8701-0018",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES. {\bf E.2}: Data,
                 DATA STORAGE REPRESENTATIONS, Linked representations.
                 {\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf I.6.1}:
                 Computing Methodologies, SIMULATION AND MODELING,
                 Simulation Theory, Types of simulation (continuous and
                 discrete)*.",
}

@Article{Koved:1986:EMS,
  author =       "Larry Koved and Ben Scneiderman",
  title =        "Embedded menus: selecting items in context",
  journal =      j-CACM,
  volume =       "29",
  number =       "4",
  pages =        "312--318",
  month =        apr,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5687.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  subject =      "{\bf H.3.3}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Information Search and Retrieval, Search
                 process. {\bf D.2.2}: Software, SOFTWARE ENGINEERING,
                 Tools and Techniques, User interfaces. {\bf H.1.2}:
                 Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human factors. {\bf D.2.2}:
                 Software, SOFTWARE ENGINEERING, Tools and Techniques,
                 User interfaces. {\bf D.2.3}: Software, SOFTWARE
                 ENGINEERING, Coding, Program editors. {\bf I.3.2}:
                 Computing Methodologies, COMPUTER GRAPHICS, Graphics
                 Systems. {\bf I.3.6}: Computing Methodologies, COMPUTER
                 GRAPHICS, Methodology and Techniques, Interaction
                 techniques. {\bf H.3.3}: Information Systems,
                 INFORMATION STORAGE AND RETRIEVAL, Information Search
                 and Retrieval, Selection process.",
}

@Article{Bentley:1986:LAD,
  author =       "Jon Louis Bentley and Daniel D. Sleator and Robert E.
                 Tarjan and Victor K. Wei",
  title =        "A locally adaptive data compression scheme",
  journal =      j-CACM,
  volume =       "29",
  number =       "4",
  pages =        "320--330",
  month =        apr,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P99 (94A24)",
  MRnumber =     "87e:68020",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5688.html",
  acknowledgement = ack-nhfb,
  annote =       "Exploits locality of reference when words are used
                 frequently over short intervals; is based on a
                 self-organizing search and on variable-length encodings
                 of integers. Its performance is close to that of
                 Huffman coding. Requires only one pass over the data.",
  keywords =     "algorithms; experimentation; image information;
                 measurement; performance; statistics; theory",
  review =       "ACM CR 8610-0918",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY, Data
                 compaction and compression. {\bf E.1}: Data, DATA
                 STRUCTURES, Lists.",
}

@Article{Stark:1986:CLP,
  author =       "W. Richard Stark",
  title =        "Comment on: {``Logic programming'' [Comm. ACM, 28,
                 1985, 9, 933--941] by M. R. Genesereth and M. L.
                 Ginsberg}. With a reply by the authors",
  journal =      j-CACM,
  volume =       "29",
  number =       "4",
  pages =        "331--331",
  month =        apr,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68T25",
  MRnumber =     "835 045",
  bibdate =      "Tue Dec 03 18:18:33 1996",
  acknowledgement = ack-nhfb,
}

@Article{Bentley:1986:PPLa,
  author =       "Jon Bentley and {with Special Guest Oyster, Donald} E.
                 Knuth",
  title =        "Programming Pearls: Literate Programming: {A \tt WEB}
                 program for sampling",
  journal =      j-CACM,
  volume =       "29",
  number =       "5",
  pages =        "364--369",
  month =        may,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:18 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Bentley86a",
  note =         "Reprinted in \cite[pp.~137--149]{Knuth:1992:LP}.",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley86a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley86a",
}

@Article{Sergot:1986:BNA,
  author =       "M. J. Sergot and F. Sadri and R. A. Kowalski and F.
                 Kriwaczek and P. Hammond and H. T. Cory",
  title =        "The {British Nationality Act} as a logic program",
  journal =      j-CACM,
  volume =       "29",
  number =       "5",
  pages =        "370--386",
  month =        may,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5920.html",
  acknowledgement = ack-nhfb,
  keywords =     "experimentation; human factors; languages; theory",
  review =       "ACM CR 8701-0030",
  subject =      "{\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems, Law.
                 {\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Logic
                 programming. {\bf I.2.4}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Knowledge Representation
                 Formalisms and Methods, Predicate logic. {\bf I.2.5}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Programming Languages and Software, Prolog. {\bf J.1}:
                 Computer Applications, ADMINISTRATIVE DATA PROCESSING,
                 Law.",
}

@Article{Gourlay:1986:LMP,
  author =       "John S. Gourlay",
  title =        "A language for music printing",
  journal =      j-CACM,
  volume =       "29",
  number =       "5",
  pages =        "388--401",
  month =        may,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5690.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; languages",
  review =       "ACM CR 8612-1130",
  subject =      "{\bf J.5}: Computer Applications, ARTS AND HUMANITIES,
                 Music. {\bf I.7.2}: Computing Methodologies, TEXT
                 PROCESSING, Document Preparation, Format and notation.
                 {\bf I.7.2}: Computing Methodologies, TEXT PROCESSING,
                 Document Preparation, Languages and systems.",
}

@Article{Berzins:1986:ABS,
  author =       "Valdis Berzins and Michael Gray and David Naumann",
  title =        "Abstraction-based software development",
  journal =      j-CACM,
  volume =       "29",
  number =       "5",
  pages =        "402--415",
  month =        may,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5691.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; management",
  review =       "ACM CR 8703-0171",
  subject =      "{\bf D.2.m}: Software, SOFTWARE ENGINEERING,
                 Miscellaneous. {\bf K.3.2}: Computing Milieux,
                 COMPUTERS AND EDUCATION, Computer and Information
                 Science Education, Computer science education.",
}

@Article{Botting:1986:NST,
  author =       "Richard Botting",
  title =        "Novel security techniques for online systems",
  journal =      j-CACM,
  volume =       "29",
  number =       "5",
  pages =        "416--417",
  month =        may,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5921.html",
  acknowledgement = ack-nhfb,
  keywords =     "security",
  subject =      "{\bf D.4.6}: Software, OPERATING SYSTEMS, Security and
                 Protection.",
}

@Article{Scott:1986:TTI,
  author =       "David S. Scott and S. Sitharama Iyengar",
  title =        "{TID} --- {A} Translation Invariant Data Structure for
                 Storing Images",
  journal =      j-CACM,
  volume =       "29",
  number =       "5",
  pages =        "418--429",
  month =        may,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:20:14 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.86.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#ScottI86;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5692.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; I35 data structures; IMAGE PART FORM;
                 theory; translation invariant; verification",
  oldlabel =     "ScottI86",
  subject =      "{\bf I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding,
                 Representations, data structures, and transforms. {\bf
                 E.1}: Data, DATA STRUCTURES, Trees. {\bf E.1}: Data,
                 DATA STRUCTURES. {\bf I.4.6}: Computing Methodologies,
                 IMAGE PROCESSING, Segmentation, Region growing,
                 partitioning.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/ScottI86",
}

@Article{Bentley:1986:PPLb,
  author =       "Jon Bentley and Donald E. Knuth and M. Douglas
                 McIlroy",
  title =        "Programming Pearls: {A} Literate Program: {A \tt WEB}
                 program for common words",
  journal =      j-CACM,
  volume =       "29",
  number =       "6",
  pages =        "471--483",
  month =        jun,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 03 15:15:45 2003",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Bentley86b",
  note =         "See another solution to the problem of printing the
                 $k$ most common words of a text file in
                 \cite{Hanson:1987:LPP}. Reprinted in
                 \cite[151--177]{Knuth:1992:LP}.",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley86b",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley86b",
}

@Article{Bernstein:1986:SSF,
  author =       "Herbert J. Bernstein",
  title =        "Special Section on Factory Automation and Robotics",
  journal =      j-CACM,
  volume =       "29",
  number =       "6",
  pages =        "484--485",
  month =        jun,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:58 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Bernstein86;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214907.html",
  acknowledgement = ack-nhfb,
  keywords =     "performance; reliability",
  oldlabel =     "Bernstein86",
  subject =      "{\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems,
                 Industrial automation. {\bf J.7}: Computer
                 Applications, COMPUTERS IN OTHER SYSTEMS. {\bf I.2.9}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Robotics.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bernstein86",
}

@Article{Hopcroft:1986:IRC,
  author =       "John E. Hopcroft",
  title =        "The impact of robotics on computer science",
  journal =      j-CACM,
  volume =       "29",
  number =       "6",
  pages =        "486--498",
  month =        jun,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5949.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; image part form; large
                 dimensionality; performance; theory; verification",
  review =       "ACM CR 8611-1042",
  subject =      "{\bf I.2.9}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Robotics. {\bf I.3.3}: Computing
                 Methodologies, COMPUTER GRAPHICS, Picture/Image
                 Generation, Display algorithms. {\bf I.3.5}: Computing
                 Methodologies, COMPUTER GRAPHICS, Computational
                 Geometry and Object Modeling. {\bf I.6.m}: Computing
                 Methodologies, SIMULATION AND MODELING, Miscellaneous.
                 {\bf J.6}: Computer Applications, COMPUTER-AIDED
                 ENGINEERING, Computer-aided design (CAD). {\bf K.3.2}:
                 Computing Milieux, COMPUTERS AND EDUCATION, Computer
                 and Information Science Education, Curriculum. {\bf
                 G.m}: Mathematics of Computing, MISCELLANEOUS.",
}

@Article{Raibert:1986:LR,
  author =       "Marc H. Raibert",
  title =        "Legged robots",
  journal =      j-CACM,
  volume =       "29",
  number =       "6",
  pages =        "499--514",
  month =        jun,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5950.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation",
  review =       "ACM CR 8611-1043",
  subject =      "{\bf I.2.9}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Robotics, Propelling mechanisms.",
}

@Article{Grossman:1986:ORN,
  author =       "David D. Grossman",
  title =        "Opportunities for research on numerical control
                 machining",
  journal =      j-CACM,
  volume =       "29",
  number =       "6",
  pages =        "515--522",
  month =        jun,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5951.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; languages; standardization",
  subject =      "{\bf C.3}: Computer Systems Organization,
                 SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS, Process
                 control systems. {\bf C.3}: Computer Systems
                 Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
                 SYSTEMS, Signal processing systems. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features. {\bf H.4.m}: Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Miscellaneous. {\bf
                 I.2.9}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Robotics. {\bf I.3.5}: Computing
                 Methodologies, COMPUTER GRAPHICS, Computational
                 Geometry and Object Modeling. {\bf J.6}: Computer
                 Applications, COMPUTER-AIDED ENGINEERING. {\bf J.7}:
                 Computer Applications, COMPUTERS IN OTHER SYSTEMS,
                 Industrial control. {\bf J.7}: Computer Applications,
                 COMPUTERS IN OTHER SYSTEMS, Real time. {\bf K.8}:
                 Computing Milieux, PERSONAL COMPUTING.",
}

@Article{Ceri:1986:NRP,
  author =       "S. Ceri and G. Gottlob",
  title =        "Normalization of relations and {PROLOG}",
  journal =      j-CACM,
  volume =       "29",
  number =       "6",
  pages =        "524--544",
  month =        jun,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  note =         "Also published in/as: Polit. Milano, Dep. Elettronica,
                 Lab. d. Calc. TR., July 1985.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5952.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  review =       "ACM CR 8612-1113",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Normal forms. {\bf D.3.2}: Software,
                 PROGRAMMING LANGUAGES, Language Classifications,
                 Prolog.",
}

@Article{Baroudi:1986:ITE,
  author =       "Jack J. Baroudi and Michael J. Ginzberg",
  title =        "Impact of the technological environment on
                 programmer\slash analyst job outcomes",
  journal =      j-CACM,
  volume =       "29",
  number =       "6",
  pages =        "546--555",
  month =        jun,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/5953.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; management; measurement",
  review =       "ACM CR 8612-1142",
  subject =      "{\bf K.6.1}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Project and People
                 Management. {\bf K.7.1}: Computing Milieux, THE
                 COMPUTING PROFESSION, Occupations.",
}

@Article{Thompson:1986:MDA,
  author =       "Clark Thompson",
  title =        "Military direction of academic {CS} research",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "583--585",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6139.html",
  acknowledgement = ack-nhfb,
  keywords =     "economics; experimentation",
  subject =      "{\bf J.7}: Computer Applications, COMPUTERS IN OTHER
                 SYSTEMS, Military. {\bf K.4.3}: Computing Milieux,
                 COMPUTERS AND SOCIETY, Organizational Impacts. {\bf
                 K.5.2}: Computing Milieux, LEGAL ASPECTS OF COMPUTING,
                 Governmental Issues. {\bf K.7.2}: Computing Milieux,
                 THE COMPUTING PROFESSION, Organizations.",
}

@Article{Ledgard:1986:SSH,
  author =       "Henry F. Ledgard",
  title =        "Special Section on The Human Aspects of Computing: {A}
                 Note on This Collection",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "593--593",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:58:07 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Ledgard86;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214911.html",
  acknowledgement = ack-nhfb,
  keywords =     "experimentation; human factors; performance",
  oldlabel =     "Ledgard86",
  subject =      "{\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Ledgard86",
}

@Article{Rushinek:1986:WMU,
  author =       "Avi Rushinek and Sara F. Rushinek",
  title =        "What makes users happy?",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "594--598",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6140.html",
  acknowledgement = ack-nhfb,
  keywords =     "economics; human factors; measurement; performance",
  review =       "ACM CR 8702-0133",
  subject =      "{\bf K.1}: Computing Milieux, THE COMPUTER INDUSTRY,
                 Markets. {\bf C.4}: Computer Systems Organization,
                 PERFORMANCE OF SYSTEMS, Performance attributes. {\bf
                 H.1.2}: Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human factors.",
}

@Article{Slator:1986:PI,
  author =       "Brian M. Slator and Matthew P. Anderson and Walt
                 Conley",
  title =        "{Pygmalion} at the Interface",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "599--604",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:22:25 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#SlatorAC86;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6141.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; human factors; languages;
                 performance; standardization",
  oldlabel =     "SlatorAC86",
  review =       "ACM CR 8704-0310",
  subject =      "{\bf I.2.7}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Natural Language Processing, Language
                 parsing and understanding. {\bf H.1.2}: Information
                 Systems, MODELS AND PRINCIPLES, User/Machine Systems.
                 {\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems, Natural
                 language interfaces. {\bf D.2.2}: Software, SOFTWARE
                 ENGINEERING, Tools and Techniques, User interfaces.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/SlatorAC86",
}

@Article{Mayer:1986:LPL,
  author =       "Richard E. Mayer and Jennifer L. Dyck and William
                 Vilberg",
  title =        "Learning to program and learning to think: what's the
                 connection?",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "605--610",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6142.html",
  acknowledgement = ack-nhfb,
  keywords =     "experimentation; human factors; measurement",
  review =       "ACM CR 8701-0035",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Information systems education. {\bf K.3.m}: Computing
                 Milieux, COMPUTERS AND EDUCATION, Miscellaneous.",
}

@Article{Howard:1986:CAM,
  author =       "Geoffry S. Howard and Robert D. Smith",
  title =        "Computer anxiety in management: myth or reality?",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "611--615",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6143.html",
  acknowledgement = ack-nhfb,
  keywords =     "experimentation; human factors; management;
                 measurement",
  review =       "ACM CR 8702-0101",
  subject =      "{\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors. {\bf
                 K.3.2}: Computing Milieux, COMPUTERS AND EDUCATION,
                 Computer and Information Science Education, Information
                 systems education. {\bf K.6.1}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
                 Project and People Management, Training. {\bf K.4.3}:
                 Computing Milieux, COMPUTERS AND SOCIETY,
                 Organizational Impacts.",
}

@Article{Gannon:1986:MAP,
  author =       "J. D. Gannon and E. E. Katz and V. R. Basili",
  title =        "Metrics for {Ada} packages: an initial study",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "616--623",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6144.html",
  acknowledgement = ack-nhfb,
  keywords =     "experimentation; human factors; languages;
                 measurement",
  review =       "ACM CR 8702-0072",
  subject =      "{\bf D.2.8}: Software, SOFTWARE ENGINEERING, Metrics.
                 {\bf D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Abstract data types. {\bf
                 D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Modules, packages. {\bf
                 K.6.1}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Project and People Management,
                 Training. {\bf D.3.2}: Software, PROGRAMMING LANGUAGES,
                 Language Classifications, Ada.",
}

@Article{Spohrer:1986:NMF,
  author =       "James C. Spohrer and Elliot Soloway",
  title =        "Novice mistakes: are the folk wisdoms correct?",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "624--632",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6145.html",
  acknowledgement = ack-nhfb,
  keywords =     "documentation; experimentation; measurement",
  review =       "ACM CR 8612-1095",
  subject =      "{\bf D.m}: Software, MISCELLANEOUS, Software
                 psychology. {\bf K.3.2}: Computing Milieux, COMPUTERS
                 AND EDUCATION, Computer and Information Science
                 Education, Computer science education. {\bf D.2.5}:
                 Software, SOFTWARE ENGINEERING, Testing and Debugging,
                 Debugging aids. {\bf D.2.5}: Software, SOFTWARE
                 ENGINEERING, Testing and Debugging, Diagnostics.",
}

@Article{Peterson:1986:NUT,
  author =       "James L. Peterson",
  title =        "A note on undetected typing errors",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "633--637",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6146.html",
  acknowledgement = ack-nhfb,
  keywords =     "documentation; human factors; measurement",
  review =       "ACM CR 8702-0126",
  subject =      "{\bf I.7.1}: Computing Methodologies, TEXT PROCESSING,
                 Text Editing, Spelling. {\bf H.4.1}: Information
                 Systems, INFORMATION SYSTEMS APPLICATIONS, Office
                 Automation, Word processing. {\bf H.1.2}: Information
                 Systems, MODELS AND PRINCIPLES, User/Machine Systems,
                 Human factors.",
}

@Article{LeMay:1986:OWL,
  author =       "Moira LeMay and Eric Hird",
  title =        "Operator work load: when is enough enough?",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "638--642",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6147.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; management; measurement",
  review =       "ACM CR 8706-0505",
  subject =      "{\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors. {\bf
                 K.6.0}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, General.",
}

@Article{Coulter:1986:CIS,
  author =       "Neal S. Coulter and Norman H. Kelly",
  title =        "Computer instruction set usage by programmers: an
                 empirical investigation",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "643--647",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6148.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; human factors; measurement",
  subject =      "{\bf C.0}: Computer Systems Organization, GENERAL,
                 Instruction set design. {\bf D.2.9}: Software, SOFTWARE
                 ENGINEERING, Management, Productivity. {\bf D.2.9}:
                 Software, SOFTWARE ENGINEERING, Management, Programming
                 teams.",
}

@Article{Salton:1986:ALA,
  author =       "Gerard Salton",
  title =        "Another look at automatic text-retrieval systems",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "648--656",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6149.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; measurement; performance;
                 theory",
  review =       "ACM CR 8702-0107",
  subject =      "{\bf H.3.1}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Content Analysis and Indexing. {\bf
                 H.3.1}: Information Systems, INFORMATION STORAGE AND
                 RETRIEVAL, Content Analysis and Indexing, Indexing
                 methods. {\bf H.3.1}: Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Content Analysis and Indexing,
                 Thesauruses. {\bf H.3.3}: Information Systems,
                 INFORMATION STORAGE AND RETRIEVAL, Information Search
                 and Retrieval, Retrieval models. {\bf H.3.3}:
                 Information Systems, INFORMATION STORAGE AND RETRIEVAL,
                 Information Search and Retrieval, Search process. {\bf
                 H.3.5}: Information Systems, INFORMATION STORAGE AND
                 RETRIEVAL, Online Information Services.",
}

@Article{Gomaa:1986:SDR,
  author =       "Hassan Gomaa",
  title =        "Software development of real-time systems",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "657--668",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6150.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; management; measurement;
                 reliability; standardization",
  review =       "ACM CR 8704-0268",
  subject =      "{\bf C.3}: Computer Systems Organization,
                 SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS,
                 Real-time systems. {\bf C.3}: Computer Systems
                 Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
                 SYSTEMS, Microprocessor/microcomputer applications.
                 {\bf D.2.5}: Software, SOFTWARE ENGINEERING, Testing
                 and Debugging. {\bf D.4.7}: Software, OPERATING
                 SYSTEMS, Organization and Design, Real-time and
                 embedded systems.",
}

@Article{Sarnak:1986:PPL,
  author =       "Neil Sarnak and Robert E. Tarjan",
  title =        "Planar point location using persistent search trees",
  journal =      j-CACM,
  volume =       "29",
  number =       "7",
  pages =        "669--679",
  month =        jul,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68U05 (68P05)",
  MRnumber =     "848 411",
  bibdate =      "Sat Apr 06 08:06:18 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6151.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; image part pattern; theory",
  review =       "ACM CR 8702-0085",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf E.1}: Data, DATA STRUCTURES, Trees.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures.",
}

@Article{Bentley:1986:PPLc,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Little Languages",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "711--721",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:20 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Typesetting/texgraph.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Bentley86c",
  note =         "Description of the {\em pic\/} language.",
  abstract =     "Discusses the design of {\em ad hoc} languages for
                 specialist tasks, such as {\GRAP}.",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley86c",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley86c",
}

@Article{Sammet:1986:WAJ,
  author =       "Jean E. Sammet",
  title =        "Why {Ada} is Not Just Another Programming Language",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "722--732",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:18:24 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Sammet86;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6425.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages; management; standardization;
                 verification",
  oldlabel =     "Sammet86",
  review =       "ACM CR 8702-0075",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Ada. {\bf D.2.4}: Software, SOFTWARE
                 ENGINEERING, Program Verification, Validation. {\bf
                 D.2.6}: Software, SOFTWARE ENGINEERING, Programming
                 Environments. {\bf D.2.m}: Software, SOFTWARE
                 ENGINEERING, Miscellaneous. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features. {\bf K.2}: Computing Milieux, HISTORY OF
                 COMPUTING, Software.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Sammet86",
}

@Article{Lieblein:1986:DDS,
  author =       "Edward Lieblein",
  title =        "The {Department of Defense} software initiative --- a
                 status report",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "734--744",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6426.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; languages; management;
                 performance; reliability; standardization",
  review =       "ACM CR 8707-0616",
  subject =      "{\bf J.7}: Computer Applications, COMPUTERS IN OTHER
                 SYSTEMS, Military. {\bf D.2.0}: Software, SOFTWARE
                 ENGINEERING, General. {\bf D.2.2}: Software, SOFTWARE
                 ENGINEERING, Tools and Techniques. {\bf D.2.6}:
                 Software, SOFTWARE ENGINEERING, Programming
                 Environments. {\bf D.2.9}: Software, SOFTWARE
                 ENGINEERING, Management. {\bf D.3.2}: Software,
                 PROGRAMMING LANGUAGES, Language Classifications, Ada.
                 {\bf J.7}: Computer Applications, COMPUTERS IN OTHER
                 SYSTEMS, Command and control. {\bf K.6.3}: Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, Software Management.",
}

@Article{Solomon:1986:SAP,
  author =       "Martin K. Solomon and Riva Wenig Bickel",
  title =        "Self-assessment procedure {XV}: a self-assessment
                 procedure dealing with file processing",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "745--751",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Apr 06 08:06:18 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6440.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; measurement; performance",
  subject =      "D.4.0 Software, OPERATING SYSTEMS, General, UNIX \\
                 D.4.3 Software, OPERATING SYSTEMS, File Systems
                 Management, File organization \\ E.5 Data, FILES,
                 Organization/structure \\ H.3.2 Information Systems,
                 INFORMATION STORAGE AND RETRIEVAL, Information
                 Storage",
}

@Article{Frenkel:1986:ETM,
  author =       "Karen A. Frenkel",
  title =        "Evaluating two massively parallel machines",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "752--758",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6427.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; evaluation; languages; multiprocessors;
                 performance",
  review =       "ACM CR 8702-0062",
  subject =      "{\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Parallel processors. {\bf C.5.1}:
                 Computer Systems Organization, COMPUTER SYSTEM
                 IMPLEMENTATION, Large and Medium (``Mainframe'')
                 Computers, Super (very large) computers. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, OCCAM.",
}

@Article{Clapp:1986:TRT,
  author =       "Russell M. Clapp and Louis Duchesneau and Richard A.
                 Volz and Trevor N. Mudge and Timothy Schultze",
  title =        "Toward real-time performance benchmarks for {Ada}",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "760--778",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6428.html",
  acknowledgement = ack-nhfb,
  keywords =     "languages; management; measurement; performance;
                 verification",
  review =       "ACM CR 8705-0372",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS. {\bf D.2.8}: Software, SOFTWARE
                 ENGINEERING, Metrics, Performance measures. {\bf
                 D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Measurements. {\bf J.7}: Computer Applications,
                 COMPUTERS IN OTHER SYSTEMS, Real time. {\bf K.6.2}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Installation Management,
                 Benchmarks.",
}

@Article{Kang:1986:CGL,
  author =       "Young Moo Kang and Robert B. Miller and Roger Alan
                 Pick",
  title =        "Comments on ``{Grosch}'s law re-revisited: {CPU} power
                 and the cost of computation''",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "779--781",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:53:37 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#KangMP86;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6441.html",
  acknowledgement = ack-nhfb,
  keywords =     "economics; performance",
  oldlabel =     "KangMP86",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS. {\bf K.1}: Computing Milieux, THE COMPUTER
                 INDUSTRY. {\bf K.6.0}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, General.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/KangMP86",
}

@Article{Bentley:1986:GLT,
  author =       "Jon Louis Bentley and Brian W. Kernighan",
  title =        "{GRAP} --- {A} Language for Typesetting Graphs",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "782--792",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6429.html",
  acknowledgement = ack-nhfb,
  keywords =     "I34 typesetting graphs; I3m electronic publishing;
                 languages",
  subject =      "{\bf I.3.4}: Computing Methodologies, COMPUTER
                 GRAPHICS, Graphics Utilities, Picture description
                 languages. {\bf I.7.2}: Computing Methodologies, TEXT
                 PROCESSING, Document Preparation, Languages and
                 systems.",
}

@Article{Irving:1986:CPM,
  author =       "R. H. Irving and C. A. Higgins and F. R. Safayeni",
  title =        "Computerized performance monitoring systems: use and
                 abuse",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "794--801",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6430.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; management; measurement",
  review =       "ACM CR 8702-0112",
  subject =      "{\bf H.4.1}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Office Automation. {\bf K.4.2}: Computing
                 Milieux, COMPUTERS AND SOCIETY, Social Issues,
                 Employment. {\bf K.6.1}: Computing Milieux, MANAGEMENT
                 OF COMPUTING AND INFORMATION SYSTEMS, Project and
                 People Management. {\bf K.6.2}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
                 Installation Management.",
}

@Article{Koopman:1986:OES,
  author =       "Raymond F. Koopman",
  title =        "The orders of equidistribution of subsequences of some
                 asymptotically random sequences",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "802--806",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6431.html",
  acknowledgement = ack-nhfb,
  review =       "ACM CR 8704-0294",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics. {\bf F.2.1}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Numerical Algorithms and Problems. {\bf E.3}: Data,
                 DATA ENCRYPTION.",
}

@Article{Bentley:1986:PPD,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Document Design",
  journal =      j-CACM,
  volume =       "29",
  number =       "9",
  pages =        "832--839",
  month =        sep,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:21 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Bentley86d",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley86d",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley86d",
}

@Article{Sleeman:1986:SSC,
  author =       "Derek H. Sleeman",
  title =        "Special Section on The Challenges of Teaching Computer
                 Programming",
  journal =      j-CACM,
  volume =       "29",
  number =       "9",
  pages =        "840--841",
  month =        sep,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:22:29 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Sleeman86;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214913.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; theory",
  oldlabel =     "Sleeman86",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education.
                 {\bf D.1.0}: Software, PROGRAMMING TECHNIQUES, General.
                 {\bf D.2.0}: Software, SOFTWARE ENGINEERING, General.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Sleeman86",
}

@Article{Anderson:1986:ATI,
  author =       "J. R. Anderson and E. Skwarecki",
  title =        "The automated tutoring of introductory computer
                 programming",
  journal =      j-CACM,
  volume =       "29",
  number =       "9",
  pages =        "842--849",
  month =        sep,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6593.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors",
  review =       "ACM CR 8704-0321",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Computer science education. {\bf K.3.1}: Computing
                 Milieux, COMPUTERS AND EDUCATION, Computer Uses in
                 Education, Computer-assisted instruction (CAI). {\bf
                 J.4}: Computer Applications, SOCIAL AND BEHAVIORAL
                 SCIENCES, Psychology. {\bf H.1.2}: Information Systems,
                 MODELS AND PRINCIPLES, User/Machine Systems, Human
                 factors. {\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human information
                 processing. {\bf I.2.4}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Knowledge Representation
                 Formalisms and Methods, Representations (procedural and
                 rule-based).",
}

@Article{Soloway:1986:LPL,
  author =       "E. Soloway",
  title =        "Learning to program = learning to construct mechanisms
                 and explanations",
  journal =      j-CACM,
  volume =       "29",
  number =       "9",
  pages =        "850--858",
  month =        sep,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6594.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors",
  review =       "ACM CR 8705-0432",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Curriculum. {\bf D.m}: Software, MISCELLANEOUS,
                 Software psychology.",
}

@Article{diSessa:1986:BRC,
  author =       "Andrea di Sessa and Harold Abelson",
  title =        "{Boxer}: a reconstructible computational medium",
  journal =      j-CACM,
  volume =       "29",
  number =       "9",
  pages =        "859--868",
  month =        sep,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/hypertext.1.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6595.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; hypertext; languages",
  review =       "ACM CR 8704-0271",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces. {\bf D.2.6}: Software,
                 SOFTWARE ENGINEERING, Programming Environments. {\bf
                 D.3.0}: Software, PROGRAMMING LANGUAGES, General. {\bf
                 H.1.2}: Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human factors. {\bf K.3.0}:
                 Computing Milieux, COMPUTERS AND EDUCATION, General.",
}

@Article{Gries:1986:IBG,
  author =       "D. Gries and R. Miller and R. Ritchie and P. Young",
  title =        "Imbalance between Growth and Funding in Academic
                 Computer Science: Two Trends Colliding",
  journal =      j-CACM,
  volume =       "29",
  number =       "9",
  pages =        "870--878",
  month =        sep,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6596.html",
  acknowledgement = ack-nhfb,
  subject =      "{\bf K.0}: Computing Milieux, GENERAL. {\bf K.3.2}:
                 Computing Milieux, COMPUTERS AND EDUCATION, Computer
                 and Information Science Education. {\bf K.4.0}:
                 Computing Milieux, COMPUTERS AND SOCIETY, General.",
}

@Article{Bobrow:1986:ESP,
  author =       "Daniel G. Bobrow and Sanjay Mittal and Mark J.
                 Stefik",
  title =        "Expert systems: perils and promise",
  journal =      j-CACM,
  volume =       "29",
  number =       "9",
  pages =        "880--894",
  month =        sep,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6597.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages; management",
  review =       "ACM CR 8804-0290",
  subject =      "{\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems.",
}

@Article{Janssens:1986:AUM,
  author =       "M. D. Janssens and J. K. Annot and A. J. {Van De
                 Goor}",
  title =        "Adapting {UNIX} for a multiprocessor environment",
  journal =      j-CACM,
  volume =       "29",
  number =       "9",
  pages =        "895--901",
  month =        sep,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6598.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; languages",
  review =       "ACM CR 8703-0175",
  subject =      "{\bf D.4.0}: Software, OPERATING SYSTEMS, General,
                 UNIX. {\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Multiprocessing/multiprogramming.",
}

@Article{Stout:1986:TRO,
  author =       "Q. F. Stout and B. L. Warren",
  title =        "Tree rebalancing in optimal time and space",
  journal =      j-CACM,
  volume =       "29",
  number =       "9",
  pages =        "902--908",
  month =        sep,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6599.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance",
  review =       "ACM CR 8703-0180",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf E.5}:
                 Data, FILES, Sorting/searching.",
}

@Article{Quarterman:1986:NCN,
  author =       "John S. Quarterman and Josiah C. Hoskins",
  title =        "Notable Computer Networks",
  journal =      j-CACM,
  volume =       "29",
  number =       "10",
  pages =        "932--971",
  month =        oct,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6618.html",
  acknowledgement = ack-nhfb,
  keywords =     "management; performance; reliability;
                 standardization",
  review =       "ACM CR 8704-0267",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Data
                 communications. {\bf C.2.1}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Architecture and Design.",
}

@Article{Gries:1986:TS,
  author =       "David Gries",
  title =        "The 1984--1985 {Taulbee} survey",
  journal =      j-CACM,
  volume =       "29",
  number =       "10",
  pages =        "972--977",
  month =        oct,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6631.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; measurement",
  subject =      "{\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Social Issues, Employment. {\bf K.3.m}: Computing
                 Milieux, COMPUTERS AND EDUCATION, Miscellaneous. {\bf
                 J.2}: Computer Applications, PHYSICAL SCIENCES AND
                 ENGINEERING, Engineering.",
}

@Article{Wirth:1986:MAC,
  author =       "Niklaus Wirth",
  title =        "Microprocessor architectures: a comparison based on
                 code generation by compiler",
  journal =      j-CACM,
  volume =       "29",
  number =       "10",
  pages =        "978--990",
  month =        oct,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6619.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; performance",
  review =       "ACM CR 8803-0181",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Performance attributes. {\bf C.1.0}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 General. {\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Code generation. {\bf D.3.4}: Software,
                 PROGRAMMING LANGUAGES, Processors, Compilers. {\bf
                 C.5.3}: Computer Systems Organization, COMPUTER SYSTEM
                 IMPLEMENTATION, Microcomputers, Microprocessors.",
}

@Article{Hayes:1986:ABF,
  author =       "Manny Hayes",
  title =        "Accessing bit fields in {FORTRAN}-77",
  journal =      j-CACM,
  volume =       "29",
  number =       "10",
  pages =        "991--995",
  month =        oct,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6620.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; languages",
  subject =      "{\bf D.1.1}: Software, PROGRAMMING TECHNIQUES,
                 Applicative (Functional) Programming. {\bf D.2.2}:
                 Software, SOFTWARE ENGINEERING, Tools and Techniques.
                 {\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, FORTRAN 77. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features, Data types and structures. {\bf E.1}: Data,
                 DATA STRUCTURES, Arrays. {\bf E.2}: Data, DATA STORAGE
                 REPRESENTATIONS, Composite structures. {\bf I.1.3}:
                 Computing Methodologies, ALGEBRAIC MANIPULATION,
                 Languages and Systems, Substitution mechanisms.",
}

@Article{Atkinson:1986:MMH,
  author =       "M. D. Atkinson and J.-R. Sack and B. Santoro and T.
                 Strothotte",
  title =        "Min-max heaps and generalized priority queues",
  journal =      j-CACM,
  volume =       "29",
  number =       "10",
  pages =        "996--1000",
  month =        oct,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6621.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; theory",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems.",
}

@Article{McHenry:1986:MSI,
  author =       "William K. McHenry and Seymour E. Goodman",
  title =        "{MIS} in {Soviet} industrial enterprise: the limits of
                 reform from above",
  journal =      j-CACM,
  volume =       "29",
  number =       "11",
  pages =        "1034--1043",
  month =        nov,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7539.html",
  acknowledgement = ack-nhfb,
  keywords =     "management",
  subject =      "{\bf J.1}: Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Business. {\bf J.1}: Computer Applications,
                 ADMINISTRATIVE DATA PROCESSING, Government. {\bf
                 K.4.3}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Organizational Impacts. {\bf K.6.0}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
                 General. {\bf H.4.2}: Information Systems, INFORMATION
                 SYSTEMS APPLICATIONS, Types of Systems, Decision
                 support.",
}

@Article{Kearney:1986:SCM,
  author =       "Joseph P. Kearney and Robert L. Sedlmeyer and William
                 B. Thompson and Michael A. Gray and Michael A. Adler",
  title =        "Software complexity measurement",
  journal =      j-CACM,
  volume =       "29",
  number =       "11",
  pages =        "1044--1050",
  month =        nov,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7540.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; human factors; management;
                 measurement",
  subject =      "{\bf D.2.8}: Software, SOFTWARE ENGINEERING, Metrics,
                 Complexity measures. {\bf D.m}: Software,
                 MISCELLANEOUS, Software psychology. {\bf K.6.3}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Software Management.",
}

@Article{Langdon:1986:SAP,
  author =       "Glen G. {Langdon, Jr.}",
  title =        "Self-assessment procedure {XVI}: a self-assessment
                 procedure dealing with computer organization and logic
                 design",
  journal =      j-CACM,
  volume =       "29",
  number =       "11",
  pages =        "1051--1060",
  month =        nov,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7543.html",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Self-assessment. {\bf C.0}: Computer Systems
                 Organization, GENERAL. {\bf B.6.0}: Hardware, LOGIC
                 DESIGN, General.",
}

@Article{Deringer:1986:RAL,
  author =       "Dorothy Deringer and David Brandin and Dexter Fletcher
                 and Neil Jacobstein",
  title =        "The report of the {ACM Long-Range Planning Committee}:
                 a summary",
  journal =      j-CACM,
  volume =       "29",
  number =       "11",
  pages =        "1061--1071",
  month =        nov,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7544.html",
  acknowledgement = ack-nhfb,
  subject =      "{\bf K.7.2}: Computing Milieux, THE COMPUTING
                 PROFESSION, Organizations.",
}

@Article{Robillard:1986:SPP,
  author =       "Pierre N. Robillard",
  title =        "Schematic pseudocode for program constructs and its
                 computer automation by {SCHEMACODE}",
  journal =      j-CACM,
  volume =       "29",
  number =       "11",
  pages =        "1072--1089",
  month =        nov,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7541.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; languages",
  review =       "ACM CR 8707-0568",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, Structured programming. {\bf D.2.2}:
                 Software, SOFTWARE ENGINEERING, Tools and Techniques,
                 Top-down programming. {\bf D.2.3}: Software, SOFTWARE
                 ENGINEERING, Coding, Program editors. {\bf D.2.7}:
                 Software, SOFTWARE ENGINEERING, Distribution and
                 Maintenance, Documentation. {\bf D.3.2}: Software,
                 PROGRAMMING LANGUAGES, Language Classifications, Design
                 languages. {\bf D.2.2}: Software, SOFTWARE ENGINEERING,
                 Tools and Techniques. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features, Control structures. {\bf D.3.4}: Software,
                 PROGRAMMING LANGUAGES, Processors, Preprocessors.",
}

@Article{Landram:1986:SCP,
  author =       "Frank G. Landram and James R. Cook and Marvin
                 Johnston",
  title =        "Spreadsheet calculations of probabilities from the
                 {$F$}, {$t$}, {$\chi^2$}, and normal distribution",
  journal =      j-CACM,
  volume =       "29",
  number =       "11",
  pages =        "1090--1092",
  month =        nov,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7542.html",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  review =       "ACM CR 8707-0593",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Statistical computing.",
}

@Article{Benbasat:1986:EPI,
  author =       "Izak Benbasat and Albert S. Dexter and Peter Todd",
  title =        "An experimental program investigating color-enhanced
                 and graphical information presentation: an integration
                 of the findings",
  journal =      j-CACM,
  volume =       "29",
  number =       "11",
  pages =        "1094--1105",
  month =        nov,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7545.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  review =       "ACM CR 8706-0504",
  subject =      "{\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems. {\bf H.4.2}:
                 Information Systems, INFORMATION SYSTEMS APPLICATIONS,
                 Types of Systems, Decision support. {\bf I.3.0}:
                 Computing Methodologies, COMPUTER GRAPHICS, General.",
}

@Article{Bentley:1986:PPB,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Birth of a Cruncher",
  journal =      j-CACM,
  volume =       "29",
  number =       "12",
  pages =        "1155--1161",
  month =        dec,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:22 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Bentley86e",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley86e",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley86e",
}

@Article{Denning:1986:EPC,
  author =       "P. J. Denning",
  title =        "Editorial: Parallel Computing and Its Evolution",
  journal =      j-CACM,
  volume =       "29",
  number =       "12",
  pages =        "1163--1166",
  month =        dec,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:24:41 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/adapt.sys.bib",
  acknowledgement = ack-nhfb,
}

@Article{Frenkel:1986:ISI,
  author =       "Karen A. Frenkel",
  title =        "Introduction to the Special Issue on Parallelism",
  journal =      j-CACM,
  volume =       "29",
  number =       "12",
  pages =        "1168--1169",
  month =        dec,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:41:55 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#Frenkel86d;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214916.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; performance; theory",
  oldlabel =     "Frenkel86d",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Frenkel86d",
}

@Article{Hillis:1986:DPA,
  author =       "W. Daniel Hillis and Guy L. {Steele, Jr.}",
  title =        "Data parallel algorithms",
  journal =      j-CACM,
  volume =       "29",
  number =       "12",
  pages =        "1170--1183",
  month =        dec,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib;
                 http://www.acm.org/pubs/toc/",
  note =         "HILLIS86",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7903.html",
  abstract =     "This section describes how the parallel prefix
                 algorithm can be used to recognize a regular language.
                 Therefore, each symbol of the string is associated with
                 a set of state transitions in the deterministic finite
                 automaton, that corresponds to the regular language.
                 Then, these sets are pairwisely combined, thus yielding
                 for every symbol, the state the automaton would have
                 been in after reading that symbol.",
  abstract2 =    "Parallel computers with tens of thousands of
                 processors are typically programmed in data parallel
                 style, as opposed to the control parallel style used in
                 multiprocessing. The success of data parallel
                 algorithms -- even on problems that at first glance
                 seem inherently serial-suggests that this style of
                 programming has much wider applicability than was
                 previously thought.",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms",
  review =       "ACM CR 8707-0565",
  subject =      "{\bf D.1.3}: Software, PROGRAMMING TECHNIQUES,
                 Concurrent Programming. {\bf C.1.2}: Computer Systems
                 Organization, PROCESSOR ARCHITECTURES, Multiple Data
                 Stream Architectures (Multiprocessors), Parallel
                 processors. {\bf F.2.0}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY, General.
                 {\bf D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Concurrent programming
                 structures. {\bf E.2}: Data, DATA STORAGE
                 REPRESENTATIONS, Linked representations. {\bf B.2.1}:
                 Hardware, ARITHMETIC AND LOGIC STRUCTURES, Design
                 Styles, Parallel. {\bf G.1.0}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, General, Parallel
                 algorithms.",
}

@Article{Padua:1986:ACO,
  author =       "David A. Padua and Michael J. Wolfe",
  title =        "Advanced Compiler Optimization for Supercomputers",
  journal =      j-CACM,
  volume =       "29",
  number =       "12",
  pages =        "1184--1201",
  month =        dec,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7904.html",
  acknowledgement = ack-nhfb,
  keywords =     "languages; performance",
  review =       "ACM CR 8708-0669",
  subject =      "{\bf C.5.1}: Computer Systems Organization, COMPUTER
                 SYSTEM IMPLEMENTATION, Large and Medium (``Mainframe'')
                 Computers, Super (very large) computers. {\bf C.1.2}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors),
                 Parallel processors. {\bf D.3.3}: Software, PROGRAMMING
                 LANGUAGES, Language Constructs and Features, Concurrent
                 programming structures. {\bf D.3.4}: Software,
                 PROGRAMMING LANGUAGES, Processors, Code generation.
                 {\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Compilers. {\bf D.3.4}: Software,
                 PROGRAMMING LANGUAGES, Processors, Optimization.",
}

@Article{Rettberg:1986:CNO,
  author =       "Randall Rettberg and Robert Thomas",
  title =        "Contention is no obstacle to shared-memory
                 multiprocessing",
  journal =      j-CACM,
  volume =       "29",
  number =       "12",
  pages =        "1202--1212",
  month =        dec,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:15:37 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm29.html#RettbergT86;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7905.html",
  abstract =     "Contention in large-scale shared-memory systems is
                 less of a concern than generally believed. Through
                 careful engineering of a parallel system, the effects
                 of contention can be controlled.",
  acknowledgement = ack-nhfb,
  keywords =     "design; performance",
  oldlabel =     "RettbergT86",
  review =       "ACM CR 8707-0556",
  subject =      "{\bf B.3.2}: Hardware, MEMORY STRUCTURES, Design
                 Styles. {\bf C.1.2}: Computer Systems Organization,
                 PROCESSOR ARCHITECTURES, Multiple Data Stream
                 Architectures (Multiprocessors).",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/RettbergT86",
}

@Article{Stanfill:1986:TMB,
  author =       "Craig Stanfill and David Waltz",
  title =        "Toward memory-based reasoning",
  journal =      j-CACM,
  volume =       "29",
  number =       "12",
  pages =        "1213--1228",
  month =        dec,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7906.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; theory",
  review =       "ACM CR 8708-0700",
  subject =      "{\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Induction. {\bf I.2.0}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 General. {\bf I.2.7}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Natural Language Processing.
                 {\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Single-instruction-stream,
                 multiple-data-stream processors (SIMD).",
}

@Article{Stanfill:1986:PFT,
  author =       "Craig Stanfill and Brewster Kahle",
  title =        "Parallel Free Text Search on the {Connection Machine}
                 System",
  journal =      j-CACM,
  volume =       "29",
  number =       "12",
  pages =        "1229--1239",
  month =        dec,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7907.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; performance",
  review =       "ACM CR 8708-0663",
  subject =      "{\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Single-instruction-stream,
                 multiple-data-stream processors (SIMD). {\bf H.3.2}:
                 Information Systems, INFORMATION STORAGE AND RETRIEVAL,
                 Information Storage. {\bf H.3.3}: Information Systems,
                 INFORMATION STORAGE AND RETRIEVAL, Information Search
                 and Retrieval. {\bf C.1.2}: Computer Systems
                 Organization, PROCESSOR ARCHITECTURES, Multiple Data
                 Stream Architectures (Multiprocessors), Parallel
                 processors.",
}

@Article{McCracken:1987:VRC,
  author =       "Daniel D. McCracken",
  title =        "Viewpoint: Ruminations on Computer Science Curricula",
  journal =      j-CACM,
  volume =       "30",
  number =       "1",
  pages =        "3--5",
  month =        jan,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:29:39 1997",
  acknowledgement = ack-nhfb,
}

@Article{Carroll:1987:IDI,
  author =       "John M. Carroll and Jean McKendree",
  title =        "Interface design issues for advice-giving expert
                 systems",
  journal =      j-CACM,
  volume =       "30",
  number =       "1",
  pages =        "14--32",
  month =        jan,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7886.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; human factors",
  subject =      "{\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors. {\bf
                 I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems. {\bf
                 D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces.",
}

@Article{Stefik:1987:BCC,
  author =       "Mark Stefik and Gregg Foster and Daniel G. Bobrow and
                 Kenneth Kahn and Stan Lanning and Lucy Suchman",
  title =        "Beyond the chalkboard: computer support for
                 collaboration and problem solving in meetings",
  journal =      j-CACM,
  volume =       "30",
  number =       "1",
  pages =        "32--47",
  month =        jan,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7887.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; human factors",
  review =       "ACM CR 8707-0600",
  subject =      "{\bf H.4.3}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Communications Applications, Computer
                 conferencing and teleconferencing. {\bf H.1.2}:
                 Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human factors. {\bf D.2.2}:
                 Software, SOFTWARE ENGINEERING, Tools and Techniques,
                 User interfaces. {\bf H.1.2}: Information Systems,
                 MODELS AND PRINCIPLES, User/Machine Systems, Human
                 information processing. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Distributed
                 systems. {\bf H.4.m}: Information Systems, INFORMATION
                 SYSTEMS APPLICATIONS, Miscellaneous.",
}

@Article{Dolk:1987:RIR,
  author =       "Daniel R. Dolk and Robert A. {Kirsch, II}",
  title =        "A relational information resource dictionary system",
  journal =      j-CACM,
  volume =       "30",
  number =       "1",
  pages =        "48--61",
  month =        jan,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7888.html",
  acknowledgement = ack-nhfb,
  annote =       "IRDS is a centralized depository of data about all
                 relevant information resources within an organization.
                 Implements close to proposed standards, uses SQL
                 ORACLE.",
  keywords =     "design; documentation; languages; management;
                 standardization",
  review =       "ACM CR 8712-1007",
  subject =      "{\bf H.2.7}: Information Systems, DATABASE MANAGEMENT,
                 Database Administration, Data dictionary/directory.
                 {\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, SQL. {\bf H.4.2}: Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Types of Systems,
                 Decision support. {\bf H.2.1}: Information Systems,
                 DATABASE MANAGEMENT, Logical Design.",
}

@Article{Held:1987:MNH,
  author =       "James P. Held and John V. Carlis",
  title =        "{MATCH}: a new high-level relational operator for
                 pattern matching",
  journal =      j-CACM,
  volume =       "30",
  number =       "1",
  pages =        "62--75",
  month =        jan,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Apr 06 08:06:22 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7889.html",
  acknowledgement = ack-nhfb,
  annote =       "MATCH is used to do pattern matching for complex
                 stored patterns. This is a high level language
                 expansion of HAS, which is Carlis' extension of the
                 DIVIDE operator. MATCH requires a change in the data on
                 which it operates, in that it incorporates the
                 operators of relational algebra into the relations.",
  keywords =     "algorithms; design; languages; theory",
  review =       "ACM CR 8707-0595",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.2.3}: Information
                 Systems, DATABASE MANAGEMENT, Languages, MATCH. {\bf
                 I.5.m}: Computing Methodologies, PATTERN RECOGNITION,
                 Miscellaneous. {\bf I.2.5}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Programming Languages and
                 Software. {\bf I.2.1}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Applications and Expert
                 Systems. {\bf H.3.3}: Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Information Search and
                 Retrieval.",
}

@Article{Hillis:1987:UPA,
  author =       "W. Daniel Hillis and Guy L. {Steele, Jr.}",
  title =        "Update to ``Data Parallel Algorithms''",
  journal =      j-CACM,
  volume =       "30",
  number =       "1",
  pages =        "78--78",
  month =        jan,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/7890.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms",
  subject =      "{\bf B.2.1}: Hardware, ARITHMETIC AND LOGIC
                 STRUCTURES, Design Styles, Parallel. {\bf C.1.2}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors),
                 Parallel processors. {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features, Concurrent programming structures. {\bf
                 E.2}: Data, DATA STORAGE REPRESENTATIONS, Linked
                 representations. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency. {\bf G.1.0}: Mathematics
                 of Computing, NUMERICAL ANALYSIS, General, Parallel
                 algorithms.",
}

@Article{Borning:1987:CSR,
  author =       "Alan Borning",
  title =        "Computer system reliability and nuclear war",
  journal =      j-CACM,
  volume =       "30",
  number =       "2",
  pages =        "112--131",
  month =        feb,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/12528.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; reliability",
  review =       "ACM CR 8707-0615",
  subject =      "{\bf J.7}: Computer Applications, COMPUTERS IN OTHER
                 SYSTEMS, Command and control. {\bf J.7}: Computer
                 Applications, COMPUTERS IN OTHER SYSTEMS, Military.
                 {\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Social Issues. {\bf D.4.5}: Software, OPERATING
                 SYSTEMS, Reliability, Fault-tolerance.",
}

@Article{Notkin:1987:HCE,
  author =       "David Notkin and Norman Hutchinson and Jan Sanislo and
                 Michael Schwartz",
  title =        "Heterogeneous computing environments: report on the
                 {ACM SIGOPS} workshop on accommodating heterogeneity",
  journal =      j-CACM,
  volume =       "30",
  number =       "2",
  pages =        "132--140",
  month =        feb,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/12529.html",
  acknowledgement = ack-nhfb,
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General. {\bf D.4.0}:
                 Software, OPERATING SYSTEMS, General.",
}

@Article{Jalics:1987:CPN,
  author =       "Paul J. Jalics",
  title =        "{COBOL} on a {PC}: a new perspective on a language and
                 its performance",
  journal =      j-CACM,
  volume =       "30",
  number =       "2",
  pages =        "142--154",
  month =        feb,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/12530.html",
  acknowledgement = ack-nhfb,
  keywords =     "languages; performance",
  review =       "ACM CR 8709-0762",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, COBOL. {\bf C.5.3}: Computer Systems
                 Organization, COMPUTER SYSTEM IMPLEMENTATION,
                 Microcomputers, IBM PC. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Measurements.",
}

@Article{Holt:1987:IPT,
  author =       "Christopher M. Holt and Alan Stewart and Maurice Clint
                 and Ronald H. Perrott",
  title =        "An improved parallel thinning algorithm",
  journal =      j-CACM,
  volume =       "30",
  number =       "2",
  pages =        "156--160",
  month =        feb,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/12531.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; theory",
  review =       "ACM CR 8708-0670",
  subject =      "{\bf D.1.m}: Software, PROGRAMMING TECHNIQUES,
                 Miscellaneous. {\bf I.5.4}: Computing Methodologies,
                 PATTERN RECOGNITION, Applications, Computer vision.
                 {\bf I.5.2}: Computing Methodologies, PATTERN
                 RECOGNITION, Design Methodology, Pattern analysis.",
}

@Article{Shih:1987:SAE,
  author =       "Zen-Cheung Shih and Gen-Huey Chen and R. C. T. Lee",
  title =        "Systolic algorithms to examine all pairs of elements",
  journal =      j-CACM,
  volume =       "30",
  number =       "2",
  pages =        "161--167",
  month =        feb,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/12532.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms",
  review =       "ACM CR 8710-0864",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Combinatorial
                 algorithms. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Computations on
                 discrete structures.",
}

@Article{Hopcroft:1987:CSE,
  author =       "John E. Hopcroft",
  title =        "Computer Science: The Emergence of a Discipline",
  journal =      j-CACM,
  volume =       "30",
  number =       "3",
  pages =        "198--202",
  month =        mar,
  year =         "1987",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/214748.214750",
  ISSN =         "0001-0782",
  MRclass =      "68-00",
  MRnumber =     "886 124",
  bibdate =      "Sat Apr 06 08:06:23 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214750.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  remark =       "This is part one of the 1986 ACM Turing Award
                 Lecture.",
  subject =      "{\bf K.2}: Computing Milieux, HISTORY OF COMPUTING,
                 People. {\bf A.0}: General Literature, GENERAL,
                 Biographies/autobiographies. {\bf A.0}: General
                 Literature, GENERAL.",
}

@Article{Tarjan:1987:AD,
  author =       "Robert E. Tarjan",
  title =        "Algorithm Design",
  journal =      j-CACM,
  volume =       "30",
  number =       "3",
  pages =        "204--212",
  month =        mar,
  year =         "1987",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/214748.214752",
  ISSN =         "0001-0782",
  MRclass =      "68Q20 (68Q25)",
  MRnumber =     "886 125",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214752.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design",
  remark =       "This is part two of the 1986 ACM Turing Award
                 Lecture.",
  subject =      "{\bf F.2.0}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, General. {\bf K.2}:
                 Computing Milieux, HISTORY OF COMPUTING, People. {\bf
                 A.0}: General Literature, GENERAL,
                 Biographies/autobiographies.",
}

@Article{Frenkel:1987:IMT,
  author =       "Karen A. Frenkel",
  title =        "An interview with the {1986 A. M. Turing Award}
                 recipients --- {John E. Hopcroft} and {Robert E.
                 Tarjan}",
  journal =      j-CACM,
  volume =       "30",
  number =       "3",
  pages =        "214--222",
  month =        mar,
  year =         "1987",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/214748.214754",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214754.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  subject =      "{\bf K.2}: Computing Milieux, HISTORY OF COMPUTING,
                 People. {\bf A.0}: General Literature, GENERAL.",
}

@Article{Bickel:1987:ACM,
  author =       "Michael Allen Bickel",
  title =        "Automatic Correction to Misspelled Names: {A} Fourth
                 generation Approach",
  journal =      j-CACM,
  volume =       "30",
  number =       "3",
  pages =        "224--228",
  month =        mar,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Apr 06 08:06:20 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214756.html",
  acknowledgement = ack-nhfb,
  annote =       "Letters are assigned weights based on their
                 information value, and a minimum distance function is
                 used to locate their neighbors. 95pct success. Used for
                 NASA space shuttle data on NOMAD2, Distinct from
                 Soundex.",
  keywords =     "algorithms; design; performance; reliability",
  subject =      "{\bf H.3.1}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Content Analysis and Indexing. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems. {\bf I.2.1}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Applications and Expert
                 Systems.",
}

@Article{Goodwin:1987:FU,
  author =       "Nancy C. Goodwin",
  title =        "Functionality and usability",
  journal =      j-CACM,
  volume =       "30",
  number =       "3",
  pages =        "229--233",
  month =        mar,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214758.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors",
  subject =      "{\bf D.2.1}: Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications. {\bf H.1.2}: Information
                 Systems, MODELS AND PRINCIPLES, User/Machine Systems,
                 Human factors. {\bf H.5.3}: Information Systems,
                 INFORMATION INTERFACES AND PRESENTATION, Group and
                 Organization Interfaces, Evaluation/methodology.",
}

@Article{Stasko:1987:PHE,
  author =       "John T. Stasko and Jeffrey Scott Vitter",
  title =        "Pairing Heaps: Experiments and Analysis",
  journal =      j-CACM,
  volume =       "30",
  number =       "3",
  pages =        "234--249",
  month =        mar,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P05 (68Q25)",
  MRnumber =     "886 126",
  bibdate =      "Sat Apr 06 08:06:26 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214759.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; performance; theory",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf G.m}:
                 Mathematics of Computing, MISCELLANEOUS, Queueing
                 theory. {\bf E.5}: Data, FILES. {\bf E.2}: Data, DATA
                 STORAGE REPRESENTATIONS.",
}

@Article{Bastani:1987:EDS,
  author =       "Farokh B. Bastani and S. Sitharama Iyengar",
  title =        "The effect of data structures on the logical
                 complexity of programs",
  journal =      j-CACM,
  volume =       "30",
  number =       "3",
  pages =        "250--259",
  month =        mar,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214760.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; measurement; performance; theory",
  subject =      "{\bf F.3.3}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Studies of Program Constructs,
                 Program and recursion schemes. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features, Abstract data types. {\bf D.2.8}: Software,
                 SOFTWARE ENGINEERING, Metrics, Complexity measures.",
}

@Article{Bentley:1987:PPA,
  author =       "Jon L. Bentley and David Gries",
  title =        "Programming Pearls: Abstract data types",
  journal =      j-CACM,
  volume =       "30",
  number =       "4",
  pages =        "284--290",
  month =        apr,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/litprog.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gifford:1987:CSI,
  author =       "David Gifford and Alfred Spector",
  title =        "Case study: {IBM}'s system\slash 360--370
                 architecture",
  journal =      j-CACM,
  volume =       "30",
  number =       "4",
  pages =        "291--307",
  month =        apr,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/32233.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; performance",
  review =       "ACM CR 8805-0366",
  subject =      "{\bf K.2}: Computing Milieux, HISTORY OF COMPUTING,
                 IBM System 360/370. {\bf C.5.1}: Computer Systems
                 Organization, COMPUTER SYSTEM IMPLEMENTATION, Large and
                 Medium (``Mainframe'') Computers, IBM System/360. {\bf
                 C.5.1}: Computer Systems Organization, COMPUTER SYSTEM
                 IMPLEMENTATION, Large and Medium (``Mainframe'')
                 Computers. {\bf B.0}: Hardware, GENERAL. {\bf C.1.1}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Single Data Stream Architectures. {\bf C.1.2}: Computer
                 Systems Organization, PROCESSOR ARCHITECTURES, Multiple
                 Data Stream Architectures (Multiprocessors). {\bf K.1}:
                 Computing Milieux, THE COMPUTER INDUSTRY. {\bf K.7.2}:
                 Computing Milieux, THE COMPUTING PROFESSION,
                 Organizations.",
}

@Article{Ein-Dor:1987:APC,
  author =       "Phillip Ein-Dor and Jacob Feldmesser",
  title =        "Attributes of the Performance of Central Processing
                 Units: {A} Relative Performance Prediction Model",
  journal =      j-CACM,
  volume =       "30",
  number =       "4",
  pages =        "308--317",
  month =        apr,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Apr 06 08:06:21 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/simulan.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1987.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/32234.html",
  acknowledgement = ack-nhfb,
  annote =       "{Formeln zur Errechnung der Leistung aus den
                 technischen Daten einer CPU. Gro{\ss}e Liste von
                 (veralteten) Rechnertypen}",
  descriptors =  "Central Server; Performance Prediction",
  keywords =     "economics; management; measurement; performance",
  review =       "ACM CR 8807-0506",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Performance attributes. {\bf C.1.0}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 General. {\bf K.6.2}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Installation
                 Management, Computer selection. {\bf B.3.2}: Hardware,
                 MEMORY STRUCTURES, Design Styles, Cache memories. {\bf
                 B.4.2}: Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Input/Output Devices, Channels and controllers. {\bf
                 K.6.0}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, General, Economics. {\bf C.4}:
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS,
                 Performance attributes.",
}

@Article{Sanz:1987:CMC,
  author =       "Jorge L. C. Sanz and Its'hak Dinstein and Dragutin
                 Petkovic",
  title =        "Computing multi-colored polygonal masks in pipeline
                 architecture and its application to automated visual
                 inspection",
  journal =      j-CACM,
  volume =       "30",
  number =       "4",
  pages =        "318--329",
  month =        apr,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/32235.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance",
  subject =      "{\bf C.1.1}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Single Data Stream Architectures,
                 Pipeline processors. {\bf I.3.3}: Computing
                 Methodologies, COMPUTER GRAPHICS, Picture/Image
                 Generation, Display algorithms. {\bf J.7}: Computer
                 Applications, COMPUTERS IN OTHER SYSTEMS, Industrial
                 control. {\bf I.5.4}: Computing Methodologies, PATTERN
                 RECOGNITION, Applications, Computer vision. {\bf
                 I.4.3}: Computing Methodologies, IMAGE PROCESSING,
                 Enhancement.",
}

@Article{Berztiss:1987:MFC,
  author =       "Alfs Berztiss",
  title =        "A mathematically focused curriculum for computer
                 science",
  journal =      j-CACM,
  volume =       "30",
  number =       "5",
  pages =        "356--365",
  month =        may,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/22900.html",
  acknowledgement = ack-nhfb,
  annote =       "Level 2: CS3: Data Structures and Algorithms; Level 3:
                 CS6: Computer Systems; CS3 would introduce knowledge
                 representation, semantic nets and frames. in CS6,
                 students would study principles of operating systems
                 and database management systems. These are two large
                 topics, which means that neither could be studied in
                 depth. CS130: Theory of Processes CS231: Performance
                 Analysis CS232: Real-Time Systems CS233: Distributed
                 Systems CS234: File Systems and DB Organization CS160:
                 Artificial Intelligence CS261: Design of
                 Knowledge-Based Systems CS262: Natural Language
                 Processing CS263: Program Transformations",
  review =       "ACM CR 8711-0957",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Curriculum.",
}

@Article{VanDyke:1987:TCL,
  author =       "Carolynn {Van Dyke}",
  title =        "Taking ``{Computer Literacy}'' Literally",
  journal =      j-CACM,
  volume =       "30",
  number =       "5",
  pages =        "366--374",
  month =        may,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:37:08 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Dyke87;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/22901.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; languages; standardization",
  oldlabel =     "Dyke87",
  review =       "ACM CR 8710-0895",
  subject =      "{\bf K.3.m}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Miscellaneous, Computer literacy. {\bf
                 K.3.2}: Computing Milieux, COMPUTERS AND EDUCATION,
                 Computer and Information Science Education, Computer
                 science education.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Dyke87",
}

@Article{Booth:1987:CSP,
  author =       "Taylor Booth and Raymond E. Miller",
  title =        "{Computer Science Program Accreditation}: the
                 first-year activities of the computing sciences
                 accreditation board",
  journal =      j-CACM,
  volume =       "30",
  number =       "5",
  pages =        "376--388",
  month =        may,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:29:23 1997",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/22902.html",
  acknowledgement = ack-nhfb,
  keywords =     "standardization",
  subject =      "{\bf K.3.m}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Miscellaneous. {\bf K.3.2}: Computing
                 Milieux, COMPUTERS AND EDUCATION, Computer and
                 Information Science Education, Curriculum. {\bf K.7.0}:
                 Computing Milieux, THE COMPUTING PROFESSION, General.
                 {\bf K.7.3}: Computing Milieux, THE COMPUTING
                 PROFESSION, Testing, Certification, and Licensing.",
}

@Article{Malone:1987:IIS,
  author =       "Thomas W. Malone and Kenneth R. Grant and Franklyn A.
                 Turbak and Stephen A. Brobst and Michael D. Cohen",
  title =        "Intelligent information-sharing systems",
  journal =      j-CACM,
  volume =       "30",
  number =       "5",
  pages =        "390--402",
  month =        may,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/22903.html",
  acknowledgement = ack-nhfb,
  annote =       "The Information Lens system is a prototype intelligent
                 information-sharing system that is designed to include
                 not only good user interfaces for supporting the
                 problem-solving activity of individuals, but also good
                 organizational interfaces for supporting the
                 problem-solving activities of groups.",
  keywords =     "design; economics; human factors; management",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods, Frames and scripts. {\bf H.1.2}: Information
                 Systems, MODELS AND PRINCIPLES, User/Machine Systems.
                 {\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Schema
                 and subschema. {\bf H.2.3}: Information Systems,
                 DATABASE MANAGEMENT, Languages, Data description
                 languages (DDL). {\bf H.3.1}: Information Systems,
                 INFORMATION STORAGE AND RETRIEVAL, Content Analysis and
                 Indexing. {\bf H.3.4}: Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Systems and Software. {\bf
                 H.4.3}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Communications Applications. {\bf H.4.1}:
                 Information Systems, INFORMATION SYSTEMS APPLICATIONS,
                 Office Automation. {\bf I.2.1}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Applications
                 and Expert Systems, Office automation. {\bf I.2.4}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Knowledge Representation Formalisms and Methods,
                 Representations (procedural and rule-based).",
}

@Article{Dongarra:1987:DMS,
  author =       "Jack J. Dongarra and Eric Grosse",
  title =        "Distribution of mathematical software via electronic
                 mail",
  journal =      j-CACM,
  volume =       "30",
  number =       "5",
  pages =        "403--407",
  month =        may,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/22904.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; documentation",
  subject =      "{\bf G.4}: Mathematics of Computing, MATHEMATICAL
                 SOFTWARE. {\bf H.4.3}: Information Systems, INFORMATION
                 SYSTEMS APPLICATIONS, Communications Applications,
                 Electronic mail. {\bf C.2.3}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Operations. {\bf G.1.0}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, General, Numerical algorithms. {\bf
                 H.3.0}: Information Systems, INFORMATION STORAGE AND
                 RETRIEVAL, General. {\bf K.6.3}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
                 Software Management. {\bf C.2.3}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Operations, Public networks.",
}

@Article{Mamrak:1987:SAS,
  author =       "S. A. Mamrak and M. J. Kaelbling and C. K. Nicholas
                 and M. Share",
  title =        "A Software Architecture for Supporting the Exchange of
                 Electronic Manuscripts",
  journal =      j-CACM,
  volume =       "30",
  number =       "5",
  pages =        "408--414",
  month =        may,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Aug 10 19:00:18 MDT 1994",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/22905.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages; standardization",
  review =       "ACM CR 8710-0858",
  subject =      "{\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Translator writing systems and compiler
                 generators. {\bf H.4.1}: Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Office Automation,
                 Word processing. {\bf J.m}: Computer Applications,
                 MISCELLANEOUS. {\bf J.7}: Computer Applications,
                 COMPUTERS IN OTHER SYSTEMS, Publishing. {\bf J.7}:
                 Computer Applications, COMPUTERS IN OTHER SYSTEMS,
                 SGML.",
}

@Article{Kemerer:1987:EVS,
  author =       "Chris F. Kemerer",
  title =        "An empirical validation of software cost estimation
                 models",
  journal =      j-CACM,
  volume =       "30",
  number =       "5",
  pages =        "416--429",
  month =        may,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  note =         "See corrigendum \cite{Kemerer:1987:CEV}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/22906.html",
  acknowledgement = ack-nhfb,
  keywords =     "management; measurement; performance",
  review =       "ACM CR 8903-0136",
  subject =      "{\bf D.2.8}: Software, SOFTWARE ENGINEERING, Metrics,
                 Performance measures. {\bf D.2.9}: Software, SOFTWARE
                 ENGINEERING, Management, Cost estimation. {\bf K.6.1}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Project and People Management,
                 Management techniques. {\bf K.6.3}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
                 Software Management, Software development.",
}

@Article{Nance:1987:STC,
  author =       "Richard Nance and Robert Moose and Robert Foutz",
  title =        "A statistical technique for comparing heuristics: an
                 example from capacity assignment strategies in computer
                 network design",
  journal =      j-CACM,
  volume =       "30",
  number =       "5",
  pages =        "430--442",
  month =        may,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/22907.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation; performance; theory",
  review =       "ACM CR 8808-0591",
  subject =      "{\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network communications. {\bf C.2.5}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Local Networks. {\bf C.2.1}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Architecture and Design, Network topology. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS.",
}

@Article{Bentley:1987:PPSa,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: Self-Describing Data",
  journal =      j-CACM,
  volume =       "30",
  number =       "6",
  pages =        "479--483",
  month =        jun,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:23 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Bentley87",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley87",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley87",
}

@Article{Malone:1987:EME,
  author =       "Thomas W. Malone and Joanne Yates and Robert I.
                 Benjamin",
  title =        "Electronic markets and electronic hierarchies",
  journal =      j-CACM,
  volume =       "30",
  number =       "6",
  pages =        "484--497",
  month =        jun,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/dai.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214766.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; theory",
  subject =      "{\bf H.5.3}: Information Systems, INFORMATION
                 INTERFACES AND PRESENTATION, Group and Organization
                 Interfaces. {\bf K.1}: Computing Milieux, THE COMPUTER
                 INDUSTRY, Markets. {\bf H.1.1}: Information Systems,
                 MODELS AND PRINCIPLES, Systems and Information
                 Theory.",
}

@Article{Markus:1987:PUE,
  author =       "M. Lynne Markus and Niels Bj{\o}rn-Andersen",
  title =        "Power over users: its exercise by system
                 professionals",
  journal =      j-CACM,
  volume =       "30",
  number =       "6",
  pages =        "498--504",
  month =        jun,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214764.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; management",
  subject =      "{\bf K.6.1}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Project and People
                 Management. {\bf H.1.2}: Information Systems, MODELS
                 AND PRINCIPLES, User/Machine Systems, Human factors.
                 {\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human information
                 processing.",
}

@Article{Shemer:1987:SAS,
  author =       "Itzhak Shemer",
  title =        "Systems Analysis: {A} Systemic Analysis of a
                 Conceptual Model",
  journal =      j-CACM,
  volume =       "30",
  number =       "6",
  pages =        "506--512",
  month =        jun,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Apr 06 08:06:26 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214768.html",
  acknowledgement = ack-nhfb,
  keywords =     "management; theory",
  subject =      "{\bf K.1}: Computing Milieux, THE COMPUTER INDUSTRY,
                 Markets. {\bf K.6.3}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Software Management.
                 {\bf K.6.4}: Computing Milieux, MANAGEMENT OF COMPUTING
                 AND INFORMATION SYSTEMS, System Management.",
}

@Article{Ebert:1987:VDS,
  author =       "J{\"u}rgen Ebert",
  title =        "A versatile data structure for edge-oriented graph
                 algorithms",
  journal =      j-CACM,
  volume =       "30",
  number =       "6",
  pages =        "513--519",
  month =        jun,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214769.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; theory",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Graphs. {\bf G.2.2}:
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Graph algorithms.",
}

@Article{Witten:1987:ACD,
  author =       "Ian H. Witten and Radford M. Neal and John G. Cleary",
  title =        "Arithmetic coding for data compression",
  journal =      j-CACM,
  volume =       "30",
  number =       "6",
  pages =        "520--540",
  month =        jun,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214771.html",
  acknowledgement = ack-nhfb,
  annote =       "From an input string of symbols and a model, an
                 encoded string is produced. The decoder must have
                 access to the same model; the model may assign a
                 predetermined probability to each symbol in ASCII. Such
                 a fixed model is communicated in advance. Huffman
                 coding performs optimally if all symbol probabilities
                 are integral powers of 1/2. Arithmetic coding dispenses
                 with the restriction that each symbol must translate
                 into an integral number of bits, thereby coding more
                 efficiently.",
  keywords =     "design; performance",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY, Data
                 compaction and compression.",
}

@Article{Dhar:1987:RBV,
  author =       "Vasant Dhar and Harry E. Pople",
  title =        "Rule-based versus structure-based models for
                 explaining and generating expert behavior",
  journal =      j-CACM,
  volume =       "30",
  number =       "6",
  pages =        "542--555",
  month =        jun,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214773.html",
  acknowledgement = ack-nhfb,
  keywords =     "theory",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods, Representations (procedural and rule-based).
                 {\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems.",
}

@Article{Srinivasan:1987:RBS,
  author =       "Ananth Srinivasan and Kate M. Kaiser",
  title =        "Relationships between selected organizational factors
                 and systems development",
  journal =      j-CACM,
  volume =       "30",
  number =       "6",
  pages =        "556--562",
  month =        jun,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214775.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; economics; human factors; management",
  subject =      "{\bf K.6.1}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Project and People
                 Management. {\bf K.6.4}: Computing Milieux, MANAGEMENT
                 OF COMPUTING AND INFORMATION SYSTEMS, System
                 Management.",
}

@Article{Bentley:1987:PPP,
  author =       "J. L. Bentley",
  title =        "Programming Pearls: Profilers",
  journal =      j-CACM,
  volume =       "30",
  number =       "7",
  pages =        "587--592",
  month =        jul,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  acknowledgement = ack-nhfb,
}

@Article{Denning:1987:ALP,
  author =       "Peter J. Denning",
  title =        "Announcing Literate Programming, moderated by
                 {Christopher J. Van Wyk}",
  journal =      j-CACM,
  volume =       "30",
  number =       "7",
  pages =        "593--593",
  month =        jul,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/litprog.bib",
  acknowledgement = ack-nhfb,
}

@Article{VanWyk:1987:LPPa,
  author =       "Christopher J. {Van Wyk} and David R. Hanson and John
                 Gilbert",
  title =        "Literate Programming: Printing Common Words",
  journal =      j-CACM,
  volume =       "30",
  number =       "7",
  pages =        "594--599",
  month =        jul,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Feb 03 15:14:51 2003",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/litprog.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Wyk87",
  note =         "See another solution to the problem of printing the
                 $k$ most common words of a text file in
                 \cite{Bentley:1986:PPLb}.",
  URL =          "ftp://ftp.cs.princeton.edu/pub/packages/loom.tar.Z",
  acknowledgement = ack-nhfb,
  keywords =     "loom literate programming processor",
  oldlabel =     "Wyk87",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Wyk87",
}

@Article{Becker:1987:AWP,
  author =       "Joseph D. Becker",
  title =        "{Arabic} word processing",
  journal =      j-CACM,
  volume =       "30",
  number =       "7",
  pages =        "600--610",
  month =        jul,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/28570.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; documentation; human factors;
                 measurement",
  review =       "ACM CR 8902-0084",
  subject =      "{\bf H.4.1}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Office Automation, Word processing. {\bf
                 J.5}: Computer Applications, ARTS AND HUMANITIES,
                 Linguistics. {\bf I.7.1}: Computing Methodologies, TEXT
                 PROCESSING, Text Editing, Languages.",
}

@Article{Manas:1987:WDS,
  author =       "Jos{\'e} A. Ma{\~n}as",
  title =        "Word division in {Spanish}",
  journal =      j-CACM,
  volume =       "30",
  number =       "7",
  pages =        "612--616",
  month =        jul,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Apr 06 08:06:23 1996",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/28571.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance; standardization",
  subject =      "I.2.7 Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Natural Language Processing, Text
                 analysis \\ H.1.m Information Systems, MODELS AND
                 PRINCIPLES, Miscellaneous \\ I.7 Computing
                 Methodologies, TEXT PROCESSING \\ H.4.1 Information
                 Systems, INFORMATION SYSTEMS APPLICATIONS, Office
                 Automation, Word processing \\ I.5.4 Computing
                 Methodologies, PATTERN RECOGNITION, Applications, Text
                 processing",
}

@Article{Griffiths:1987:TLR,
  author =       "Georgia Griffiths and G. Carlyle Stones",
  title =        "The tea-leaf reader algorithm: an efficient
                 implementation of {CRC-16} and {CRC-32}",
  journal =      j-CACM,
  volume =       "30",
  number =       "7",
  pages =        "617--620",
  month =        jul,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/28572.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance",
  review =       "ACM CR 8804-0261",
  subject =      "{\bf B.4.5}: Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Reliability, Testing, and
                 Fault-Tolerance, Error-checking. {\bf E.4}: Data,
                 CODING AND INFORMATION THEORY.",
}

@Article{Li:1987:QA,
  author =       "Shu-Xiang Li and Murray H. Loew",
  title =        "The quadcode and its arithmetic",
  journal =      j-CACM,
  volume =       "30",
  number =       "7",
  pages =        "621--626",
  month =        jul,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/28573.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance; theory",
  review =       "ACM CR 8804-0276",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Trees. {\bf I.4.2}:
                 Computing Methodologies, IMAGE PROCESSING, Compression
                 (Coding), Exact coding. {\bf I.4.6}: Computing
                 Methodologies, IMAGE PROCESSING, Segmentation, Region
                 growing, partitioning. {\bf I.3.5}: Computing
                 Methodologies, COMPUTER GRAPHICS, Computational
                 Geometry and Object Modeling, Hierarchy and geometric
                 transformations. {\bf I.4.6}: Computing Methodologies,
                 IMAGE PROCESSING, Segmentation, Pixel classification.",
}

@Article{Li:1987:ADU,
  author =       "Shu-Xiang Li and Murray H. Loew",
  title =        "Adjacency Detection Using Quadcodes",
  journal =      j-CACM,
  volume =       "30",
  number =       "7",
  pages =        "627--631",
  month =        jul,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68U15 (68Q20)",
  MRnumber =     "899 611",
  bibdate =      "Sat Apr 06 08:06:23 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/28574.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; performance",
  review =       "ACM CR 8804-0273",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES. {\bf I.4.6}:
                 Computing Methodologies, IMAGE PROCESSING,
                 Segmentation, Pixel classification. {\bf I.4.6}:
                 Computing Methodologies, IMAGE PROCESSING,
                 Segmentation, Region growing, partitioning. {\bf
                 I.4.2}: Computing Methodologies, IMAGE PROCESSING,
                 Compression (Coding), Exact coding. {\bf I.5.4}:
                 Computing Methodologies, PATTERN RECOGNITION,
                 Applications, Computer vision.",
}

@Article{Abbott:1987:KA,
  author =       "Russell J. Abbott",
  title =        "Knowledge abstraction",
  journal =      j-CACM,
  volume =       "30",
  number =       "8",
  pages =        "664--671",
  month =        aug,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/27652.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  review =       "ACM CR 8804-0269",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications. {\bf D.2.m}: Software, SOFTWARE
                 ENGINEERING, Miscellaneous. {\bf I.2.4}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Knowledge
                 Representation Formalisms and Methods. {\bf K.2}:
                 Computing Milieux, HISTORY OF COMPUTING, Software.",
}

@Article{Hoare:1987:LP,
  author =       "C. A. R. Hoare and I. J. Hayes and He Jifeng and C. C.
                 Morgan and A. W. Roscoe and J. W. Sanders and I. H.
                 S{\o}rensen and J. M. Spivey and B. A. Sufrin",
  title =        "Laws of programming",
  journal =      j-CACM,
  volume =       "30",
  number =       "8",
  pages =        "672--686",
  month =        aug,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68N05",
  MRnumber =     "899 396",
  bibdate =      "Sat Apr 06 08:06:23 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/math.prog.construction.bib
                 and
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/procos-wg.bib;
                 http://www.acm.org/pubs/toc/",
  note =         "See corrigendum \cite{Hoare:1987:CLP}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/27653.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages; theory; verification",
  subject =      "{\bf D.1.4}: Software, PROGRAMMING TECHNIQUES,
                 Sequential Programming. {\bf D.3.1}: Software,
                 PROGRAMMING LANGUAGES, Formal Definitions and Theory,
                 Semantics. {\bf D.3.4}: Software, PROGRAMMING
                 LANGUAGES, Processors, Optimization. {\bf F.1.2}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Pre- and post-conditions. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Specification techniques. {\bf F.3.2}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS, Semantics
                 of Programming Languages, Algebraic approaches to
                 semantics. {\bf I.2.2}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Automatic Programming, Program
                 transformation.",
}

@Article{Gries:1987:TS,
  author =       "David Gries",
  title =        "The 1985--1986 {Taulbee} survey",
  journal =      j-CACM,
  volume =       "30",
  number =       "8",
  pages =        "688--694",
  month =        aug,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/27654.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  subject =      "{\bf K.0}: Computing Milieux, GENERAL. {\bf K.3.0}:
                 Computing Milieux, COMPUTERS AND EDUCATION, General.
                 {\bf K.7.0}: Computing Milieux, THE COMPUTING
                 PROFESSION, General. {\bf K.4.2}: Computing Milieux,
                 COMPUTERS AND SOCIETY, Social Issues, Employment.",
}

@Article{Nielsen:1987:DLR,
  author =       "Kjell W. Nielsen and Ken Shumate",
  title =        "Designing large real-time systems with {Ada}",
  journal =      j-CACM,
  volume =       "30",
  number =       "8",
  pages =        "695--715",
  month =        aug,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  note =         "See corrigenda \cite{Nielsen:1987:CLR}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/27655.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; languages",
  review =       "ACM CR 8804-0268",
  subject =      "{\bf D.2.10}: Software, SOFTWARE ENGINEERING, Design,
                 Methodologies. {\bf C.3}: Computer Systems
                 Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
                 SYSTEMS, Real-time systems. {\bf D.1.3}: Software,
                 PROGRAMMING TECHNIQUES, Concurrent Programming. {\bf
                 D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, Modules and interfaces. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Design languages. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features, Concurrent programming structures. {\bf
                 D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Modules, packages.",
}

@Article{Schruben:1987:EPS,
  author =       "Lee W. Schruben and V. James Cogliano",
  title =        "An experimental procedure for simulation response
                 surface model identification",
  journal =      j-CACM,
  volume =       "30",
  number =       "8",
  pages =        "716--730",
  month =        aug,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/27656.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; experimentation",
  review =       "ACM CR 8810-0809",
  subject =      "{\bf I.6.4}: Computing Methodologies, SIMULATION AND
                 MODELING, Model Validation and Analysis. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Probabilistic algorithms (including Monte Carlo).",
}

@Article{Tezuka:1987:WST,
  author =       "Shu Tezuka",
  title =        "{Walsh}-spectral test for {GFSR} pseudorandom
                 numbers",
  journal =      j-CACM,
  volume =       "30",
  number =       "8",
  pages =        "731--735",
  month =        aug,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "65C10",
  MRnumber =     "88f:65020",
  bibdate =      "Sat Apr 06 08:06:26 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/27657.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; experimentation; measurement; theory",
  review =       "ACM CR 8806-0438",
  subject =      "{\bf G.2.1}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Combinatorics. {\bf G.3}: Mathematics of
                 Computing, PROBABILITY AND STATISTICS, Random number
                 generation.",
}

@Article{Bentley:1987:PPSb,
  author =       "Jon Louis Bentley and R. W. Floyd",
  title =        "Programming Pearls: {A} Sample of Brilliance",
  journal =      j-CACM,
  volume =       "30",
  number =       "9",
  pages =        "754--757",
  month =        sep,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:24 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Bentley87a",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley87a",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley87a",
}

@Article{Gould:1987:OMS,
  author =       "John D. Gould and Stephen J. Boies and Stephen Levy
                 and John T. Richards and Jim Schoonard",
  title =        "The 1984 {Olympic Message System}: a test of
                 behavioral principles of system design",
  journal =      j-CACM,
  volume =       "30",
  number =       "9",
  pages =        "758--769",
  month =        sep,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30402.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; measurement; performance",
  review =       "ACM CR 8804-0267",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces. {\bf D.2.m}: Software,
                 SOFTWARE ENGINEERING, Miscellaneous, Rapid prototyping.
                 {\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems. {\bf H.4.0}:
                 Information Systems, INFORMATION SYSTEMS APPLICATIONS,
                 General. {\bf H.4.3}: Information Systems, INFORMATION
                 SYSTEMS APPLICATIONS, Communications Applications,
                 Electronic mail.",
}

@Article{Hoare:1987:CLP,
  author =       "C. A. R. Hoare and I. J. Hayes and Jifeng He and C. C.
                 Morgan and A. W. Roscoe and J. W. Sanders and I. H.
                 Sorensen and J. M. Spivey and B. A. Sufrin",
  title =        "Corrigenda: {``Laws of programming''}",
  journal =      j-CACM,
  volume =       "30",
  number =       "9",
  pages =        "770--770",
  month =        sep,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68N05",
  MRnumber =     "904 132",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  note =         "See \cite{Hoare:1987:LP}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30407.html",
  acknowledgement = ack-nhfb,
  keywords =     "languages",
  subject =      "{\bf D.2.0}: Software, SOFTWARE ENGINEERING,
                 General.",
}

@Article{Kemerer:1987:CEV,
  author =       "Chris F. Kemerer",
  title =        "Corrigenda: {``An Empirical Validation of Software
                 Cost Estimation Models''}",
  journal =      j-CACM,
  volume =       "30",
  number =       "9",
  pages =        "770--770",
  month =        sep,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Apr 06 08:06:23 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  note =         "See \cite{Kemerer:1987:EVS}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30406.html",
  acknowledgement = ack-nhfb,
  keywords =     "economics; management",
  subject =      "{\bf D.2.9}: Software, SOFTWARE ENGINEERING,
                 Management, Cost estimation.",
}

@Article{Jacky:1987:OOP,
  author =       "Jonathan P. Jacky and Ira J. Kalet",
  title =        "An object-oriented programming discipline for standard
                 {Pascal}",
  journal =      j-CACM,
  volume =       "30",
  number =       "9",
  pages =        "772--776",
  month =        sep,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30403.html",
  abstract =     "A successful application, using standard Pascal in a
                 large medical application program, demonstrates that
                 benefits similar to those of specialized languages are
                 possible in object-oriented programming.",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  review =       "ACM CR 8806-0423",
  subject =      "{\bf D.1.m}: Software, PROGRAMMING TECHNIQUES,
                 Miscellaneous. {\bf D.2.2}: Software, SOFTWARE
                 ENGINEERING, Tools and Techniques. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Pascal. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features, Data types and structures. {\bf E.1}: Data,
                 DATA STRUCTURES, Lists. {\bf E.1}: Data, DATA
                 STRUCTURES, Trees. {\bf E.2}: Data, DATA STORAGE
                 REPRESENTATIONS, Composite structures. {\bf I.6.m}:
                 Computing Methodologies, SIMULATION AND MODELING,
                 Miscellaneous. {\bf J.3}: Computer Applications, LIFE
                 AND MEDICAL SCIENCES.",
}

@Article{Ahituv:1987:PED,
  author =       "Niv Ahituv and Yeheskel Lapid and Seev Neumann",
  title =        "Processing encrypted data",
  journal =      j-CACM,
  volume =       "30",
  number =       "9",
  pages =        "777--780",
  month =        sep,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30404.html",
  acknowledgement = ack-nhfb,
  annote =       "Limit to operation is integer modular addition.",
  keywords =     "algorithms; security",
  review =       "ACM CR 8812-0933",
  subject =      "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption
                 standard (DES). {\bf E.3}: Data, DATA ENCRYPTION,
                 Public key cryptosystems.",
}

@Article{Ahituv:1987:MIF,
  author =       "Niv Ahituv",
  title =        "A metamodel of information flow: a tool to support
                 information systems theory",
  journal =      j-CACM,
  volume =       "30",
  number =       "9",
  pages =        "781--791",
  month =        sep,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30405.html",
  acknowledgement = ack-nhfb,
  annote =       "Basis for different data flow models. Is
                 set-theoretical. Illustrative examples. Data processing
                 is decomposed into selection, manipulation, and delay.
                 Value of data is obtained when data are perceived.",
  keywords =     "theory",
  review =       "ACM CR 8901-0028",
  subject =      "{\bf H.1.1}: Information Systems, MODELS AND
                 PRINCIPLES, Systems and Information Theory. {\bf
                 H.4.2}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Types of Systems, Decision support. {\bf
                 K.6.0}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, General.",
}

@Article{Ryabko:1987:CLA,
  author =       "B. Ya. Ryabko and R. Nigel Horspool and Gordon V.
                 Cormack",
  title =        "Comments to: {``A locally adaptive data compression
                 scheme'' [Comm. ACM {\bf 29}, 1986, 4, 320--330, MR
                 87e:68020] by J. L. Bentley, D. D. Sleator, R. E.
                 Tarjan and V. K. Wei}",
  journal =      j-CACM,
  volume =       "30",
  number =       "9",
  pages =        "792--794",
  month =        sep,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "68P99 (94A29)",
  MRnumber =     "89a:68045",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  acknowledgement = ack-nhfb,
}

@Article{Denning:1987:PC,
  author =       "Peter J. Denning",
  title =        "Paradigms crossed",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "808--809",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30409.html",
  acknowledgement = ack-nhfb,
  subject =      "{\bf A.0}: General Literature, GENERAL. {\bf K.0}:
                 Computing Milieux, GENERAL. {\bf K.7.2}: Computing
                 Milieux, THE COMPUTING PROFESSION, Organizations,
                 ACM.",
}

@Article{Crawford:1987:PPI,
  author =       "Diane Crawford",
  title =        "Public policy issues ripen with age",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "810--813",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30410.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  subject =      "{\bf K.4.1}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Public Policy Issues.",
}

@Article{Frenkel:1987:PCI,
  author =       "Karen A. Frenkel",
  title =        "Profiles in Computing --- Introduction",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "815--828",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:41:57 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Frenkel87a;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30411.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  oldlabel =     "Frenkel87a",
  review =       "ACM CR 8805-0370",
  subject =      "{\bf K.7.2}: Computing Milieux, THE COMPUTING
                 PROFESSION, Organizations. {\bf K.2}: Computing
                 Milieux, HISTORY OF COMPUTING. {\bf K.7.2}: Computing
                 Milieux, THE COMPUTING PROFESSION, Organizations,
                 ACM.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Frenkel87a",
}

@Article{Frenkel:1987:PCD,
  author =       "Karen A. Frenkel",
  title =        "Profiles in computing: {Donald E. Knuth}: scholar with
                 a passion for the particular",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "816--819",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "01A70",
  MRnumber =     "88j:01024",
  bibdate =      "Mon Jan 22 06:41:58 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Frenkel87b;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30412.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  oldlabel =     "Frenkel87b",
  review =       "ACM CR 8805-0370",
  subject =      "{\bf A.0}: General Literature, GENERAL. {\bf K.2}:
                 Computing Milieux, HISTORY OF COMPUTING.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Frenkel87b",
}

@Article{Frenkel:1987:PCB,
  author =       "Karen A. Frenkel",
  title =        "Profiles in computing: {Brian K. Reid}: a graphics
                 tale of a hacker tracker",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "820--823",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:41:59 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Frenkel87c;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30413.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  oldlabel =     "Frenkel87c",
  review =       "ACM CR 8805-0370",
  subject =      "{\bf A.0}: General Literature, GENERAL. {\bf K.2}:
                 Computing Milieux, HISTORY OF COMPUTING.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Frenkel87c",
}

@Article{Frenkel:1987:PCA,
  author =       "Karen A. Frenkel",
  title =        "Profiles in computing: {Allan L. Scherr} --- {Big
                 Blue}'s Time-Sharing Pioneer",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "824--828",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:42:00 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Frenkel87d;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30414.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  oldlabel =     "Frenkel87d",
  review =       "ACM CR 8805-0370",
  subject =      "{\bf A.0}: General Literature, GENERAL. {\bf K.2}:
                 Computing Milieux, HISTORY OF COMPUTING.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Frenkel87d",
}

@Article{Rees:1987:CPO,
  author =       "Mina Rees",
  title =        "The computing program of the {Office of Naval
                 Research}, 1946--1953",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "830--848",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "01A60 (01A74)",
  MRnumber =     "908 540",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30415.html",
  acknowledgement = ack-nhfb,
  review =       "ACM CR 8803-0226",
  subject =      "{\bf K.2}: Computing Milieux, HISTORY OF COMPUTING.
                 {\bf J.1}: Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Government. {\bf J.7}: Computer
                 Applications, COMPUTERS IN OTHER SYSTEMS, Military.",
}

@Article{Feczko:1987:AMC,
  author =       "Linda Feczko",
  title =        "{ACM} --- Making Computing History for 40 Years ---
                 Introduction",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "849--849",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:38:57 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Feczko87;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30416.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  oldlabel =     "Feczko87",
  review =       "ACM CR 8806-0463",
  subject =      "{\bf K.7.2}: Computing Milieux, THE COMPUTING
                 PROFESSION, Organizations, ACM. {\bf K.2}: Computing
                 Milieux, HISTORY OF COMPUTING.",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Feczko87",
}

@Article{Alt:1987:FYA,
  author =       "Franz L. Alt",
  title =        "Fifteen years {ACM}",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "850--857",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "01A74 (01A60)",
  MRnumber =     "908 541",
  bibdate =      "Sat Apr 06 08:06:20 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30417.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  review =       "ACM CR 8806-0463",
  subject =      "{\bf K.7.2}: Computing Milieux, THE COMPUTING
                 PROFESSION, Organizations, ACM. {\bf K.2}: Computing
                 Milieux, HISTORY OF COMPUTING.",
}

@Article{Revens:1987:FYA,
  author =       "Lee Revens",
  title =        "The first 25 years: {ACM} 1947--1962",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "860--865",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "01A74 (01A60)",
  MRnumber =     "908 542",
  bibdate =      "Sat Apr 06 08:06:25 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30418.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  review =       "ACM CR 8806-0463",
  subject =      "{\bf K.7.2}: Computing Milieux, THE COMPUTING
                 PROFESSION, Organizations, ACM. {\bf K.2}: Computing
                 Milieux, HISTORY OF COMPUTING.",
}

@Article{Cochran:1987:APY,
  author =       "Anita Cochran",
  title =        "{ACM}: the past 15 years: 1972--1987",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "866--872",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "01A74 (01A60)",
  MRnumber =     "908 543",
  bibdate =      "Sat Apr 06 08:06:20 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30419.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  review =       "ACM CR 8806-0463",
  subject =      "{\bf K.7.2}: Computing Milieux, THE COMPUTING
                 PROFESSION, Organizations, ACM. {\bf K.2}: Computing
                 Milieux, HISTORY OF COMPUTING.",
}

@Article{Weiss:1987:CPY,
  author =       "Eric A. Weiss",
  title =        "Commentaries on the past 15 years",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "880--883",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "01A74 (01A60)",
  MRnumber =     "908 544",
  bibdate =      "Sat Apr 06 08:06:26 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30420.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  review =       "ACM CR 8806-0463",
  subject =      "{\bf K.7.2}: Computing Milieux, THE COMPUTING
                 PROFESSION, Organizations, ACM. {\bf K.2}: Computing
                 Milieux, HISTORY OF COMPUTING.",
}

@Article{Weiss:1987:SAP,
  author =       "Eric A. Weiss",
  title =        "Self-assessment procedure {XVII}",
  journal =      j-CACM,
  volume =       "30",
  number =       "10",
  pages =        "886--891",
  month =        oct,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30421.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; measurement; performance",
  review =       "ACM CR 8806-0463",
  subject =      "{\bf K.7.2}: Computing Milieux, THE COMPUTING
                 PROFESSION, Organizations, ACM.",
}

@Article{Lathrop:1987:APD,
  author =       "Richard H. Lathrop and Teresa A. Webster and Temple F.
                 Smith",
  title =        "{ARIADNE}: pattern-directed inference and hierarchical
                 abstraction in protein structure recognition",
  journal =      j-CACM,
  volume =       "30",
  number =       "11",
  pages =        "909--921",
  month =        nov,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/32207.html",
  acknowledgement = ack-nhfb,
  comment =      "An AI blackboard type system is described that
                 generates possible 3-D protein structures from the tRNA
                 augmented with other sources of information. The
                 program has proposed a mononucleotide binding fold
                 alignment of Aminoacyl-tRNA synthetases.",
  keywords =     "experimentation",
  review =       "ACM CR 8809-0711",
  subject =      "{\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems, Medicine
                 and science. {\bf J.3}: Computer Applications, LIFE AND
                 MEDICAL SCIENCES, Biology. {\bf I.2.8}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search, Graph and tree
                 search strategies. {\bf I.5.1}: Computing
                 Methodologies, PATTERN RECOGNITION, Models, Structural.
                 {\bf I.5.0}: Computing Methodologies, PATTERN
                 RECOGNITION, General.",
}

@Article{Aguero:1987:PDA,
  author =       "Ulises Ag{\"u}ero and Subrata Sasgupta",
  title =        "A plausibility-driven approach to computer
                 architecture design",
  journal =      j-CACM,
  volume =       "30",
  number =       "11",
  pages =        "922--932",
  month =        nov,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/32208.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; theory; verification",
  subject =      "{\bf B.m}: Hardware, MISCELLANEOUS, Design management.
                 {\bf C.0}: Computer Systems Organization, GENERAL,
                 System architectures. {\bf C.0}: Computer Systems
                 Organization, GENERAL, Systems specification
                 methodology. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Nonmonotonic reasoning and belief revision. {\bf J.6}:
                 Computer Applications, COMPUTER-AIDED ENGINEERING,
                 Computer-aided design (CAD).",
}

@Article{Coombs:1987:MSF,
  author =       "James H. Coombs and Allen H. Renear and Steven J.
                 DeRose",
  title =        "Markup systems and the future of scholarly text
                 processing",
  journal =      j-CACM,
  volume =       "30",
  number =       "11",
  pages =        "933--947",
  month =        nov,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/32209.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; documentation; human factors; languages;
                 standardization",
  review =       "ACM CR 8809-0724",
  subject =      "{\bf I.7.2}: Computing Methodologies, TEXT PROCESSING,
                 Document Preparation. {\bf I.7.1}: Computing
                 Methodologies, TEXT PROCESSING, Text Editing. {\bf
                 K.6.4}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, System Management. {\bf K.1}:
                 Computing Milieux, THE COMPUTER INDUSTRY, Standards.
                 {\bf K.2}: Computing Milieux, HISTORY OF COMPUTING,
                 Software.",
}

@Article{Efe:1987:PSP,
  author =       "Kemal Efe",
  title =        "A proposed solution to the problem of levels in
                 error-message generation",
  journal =      j-CACM,
  volume =       "30",
  number =       "11",
  pages =        "948--955",
  month =        nov,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/32210.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; performance; reliability",
  review =       "ACM CR 8805-0342",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces. {\bf D.2.5}: Software,
                 SOFTWARE ENGINEERING, Testing and Debugging, Debugging
                 aids. {\bf D.2.5}: Software, SOFTWARE ENGINEERING,
                 Testing and Debugging, Error handling and recovery.
                 {\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors.",
}

@Article{Reynolds:1987:PMS,
  author =       "Robert G. Reynolds",
  title =        "The partial metrics system: modeling the stepwise
                 refinement process using partial metrics",
  journal =      j-CACM,
  volume =       "30",
  number =       "11",
  pages =        "956--963",
  month =        nov,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/32211.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; management; measurement",
  review =       "ACM CR 8807-0509",
  subject =      "{\bf D.2.0}: Software, SOFTWARE ENGINEERING, General.
                 {\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, Top-down programming. {\bf D.2.8}:
                 Software, SOFTWARE ENGINEERING, Metrics, Complexity
                 measures. {\bf D.2.8}: Software, SOFTWARE ENGINEERING,
                 Metrics, Software science. {\bf I.2.1}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Applications
                 and Expert Systems, Office automation. {\bf I.2.2}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Automatic Programming, Program synthesis. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Logic programming. {\bf
                 D.2.7}: Software, SOFTWARE ENGINEERING, Distribution
                 and Maintenance, Version control.",
}

@Article{Furnas:1987:VPH,
  author =       "G. W. Furnas and T. K. Landauer and L. M. Gomez and S.
                 T. Dumais",
  title =        "The vocabulary problem in human-system communication",
  journal =      j-CACM,
  volume =       "30",
  number =       "11",
  pages =        "964--971",
  month =        nov,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/32212.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; languages",
  review =       "ACM CR 8808-0624",
  subject =      "{\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors. {\bf
                 H.1.2}: Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human information processing.
                 {\bf H.3.1}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Content Analysis and Indexing. {\bf
                 D.m}: Software, MISCELLANEOUS, Software psychology.
                 {\bf I.2.7}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Natural Language Processing.",
}

@Article{Doll:1987:RMS,
  author =       "William J. Doll and Golamreza Torkzadeh",
  title =        "The relationship of {MIS} steering committees to size
                 of firm and formalization of {MIS} planning",
  journal =      j-CACM,
  volume =       "30",
  number =       "11",
  pages =        "972--978",
  month =        nov,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/32213.html",
  acknowledgement = ack-nhfb,
  keywords =     "management",
  review =       "ACM CR 8804-0289",
  subject =      "{\bf H.4.2}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Types of Systems, Decision support. {\bf
                 K.6.0}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, General. {\bf K.6.4}: Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, System Management.",
}

@Article{Bentley:1987:PPF,
  author =       "Jon Louis Bentley",
  title =        "Programming Pearls: The {Furbelow} Memorandum",
  journal =      j-CACM,
  volume =       "30",
  number =       "12",
  pages =        "998--999, 1010",
  month =        dec,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 06:25:25 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#Bentley87b",
  acknowledgement = ack-nhfb,
  keywords =     "programming pearls",
  oldlabel =     "Bentley87b",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Bentley87b",
}

@Article{VanWyk:1987:LPPb,
  author =       "Christopher J. {Van Wyk} and Michael Jackson and David
                 W. Wall",
  title =        "Literate Programming: Processing Transactions",
  journal =      j-CACM,
  volume =       "30",
  number =       "12",
  pages =        "1000--1010",
  month =        dec,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 22 07:31:03 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm30.html#WykJW87;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/litprog.bib",
  acknowledgement = ack-nhfb,
  oldlabel =     "WykJW87",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/WykJW87",
}

@Article{McCarthy:1987:GAI,
  author =       "John McCarthy",
  title =        "Generality in artificial intelligence",
  journal =      j-CACM,
  volume =       "30",
  number =       "12",
  pages =        "1030--1035",
  month =        dec,
  year =         "1987",
  CODEN =        "CACMA2",
  DOI =          "http://doi.acm.org/10.1145/33447.33448",
  ISSN =         "0001-0782",
  MRclass =      "68T01 (68T05 68T20 68T30)",
  MRnumber =     "89k:68128",
  MRreviewer =   "Alexander George",
  bibdate =      "Sat Apr 06 08:06:23 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/33448.html",
  abstract =     "My 1971 Turing Award Lecture was entitled ``Generality
                 in Artificial Intelligence.'' The topic turned out to
                 have been overambitious in that I discovered I was
                 unable to put my thoughts on the subject in a
                 satisfactory written form at that time. It would have
                 been better to have reviewed my previous work rather
                 than attempt something new, but such was not my custom
                 at that time. I am grateful to ACM for the opportunity
                 to try again. Unfortunately for our science, although
                 perhaps fortunately for this project, the problem of
                 generality in artificial intelligence (AI) is almost as
                 unsolved as ever, although we now have many ideas not
                 available in 1971. This paper relies heavily on such
                 ideas, but it is far from a full 1987 survey of
                 approaches for achieving generality. Ideas are
                 therefore discussed at a length proportional to my
                 familiarity with them rather than according to some
                 objective criterion. It was obvious in 1971 and even in
                 1958 that AI programs suffered from a lack of
                 generality. It is still obvious; there are many more
                 details. The first gross symptom is that a small
                 addition to the idea of a program often involves a
                 complete rewrite beginning with the data structures.
                 Some progress has been made in modularizing data
                 structures, but small modifications of the search
                 strategies are even less likely to be accomplished
                 without rewriting. Another symptom is no one knows how
                 to make a general database of commonsense knowledge
                 that could be used by any program that needed the
                 knowledge. Along with other information, such a
                 database would contain what a robot would need to know
                 about the effects of moving objects around, what a
                 person can be expected to know about his family, and
                 the facts about buying and selling. This does not
                 depend on whether the knowledge is to be expressed in a
                 logical language or in some other formalism. When we
                 take the logic approach to AI, lack of generality shows
                 up in that the axioms we devise to express commonsense
                 knowledge are too restricted in their applicability for
                 a general commonsense database. In my opinion, getting
                 a language for expressing general commonsense knowledge
                 for inclusion in a general database is the key problem
                 of generality in AI. Here are some ideas for achieving
                 generality proposed both before and after 1971. I
                 repeat my disclaimer of comprehensiveness.",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  remark =       "This is the 1971 Turing Award Lecture, sixteen years
                 late.",
  review =       "ACM CR 8807-0539",
  subject =      "{\bf I.2.0}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, General. {\bf K.2}: Computing Milieux,
                 HISTORY OF COMPUTING, Theory.",
}

@Article{Shrager:1987:IPQ,
  author =       "Jeff Shrager and Daniel S. Jordan and Thomas P. Moran
                 and Gregor Kiczales and Daniel M. Russell",
  title =        "Issues in the pragmatics of qualitative modeling:
                 lessons learned from a xerographics project",
  journal =      j-CACM,
  volume =       "30",
  number =       "12",
  pages =        "1036--1047",
  month =        dec,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/33449.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; economics; human factors; performance",
  review =       "ACM CR 8809-0723",
  subject =      "{\bf I.6.3}: Computing Methodologies, SIMULATION AND
                 MODELING, Applications. {\bf I.6.4}: Computing
                 Methodologies, SIMULATION AND MODELING, Model
                 Validation and Analysis. {\bf K.6.1}: Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, Project and People Management.",
}

@Article{Russell:1987:VUP,
  author =       "Channing H. Russell and Pamela J. Waterman",
  title =        "Variations on {UNIX} for parallel-processing
                 computers",
  journal =      j-CACM,
  volume =       "30",
  number =       "12",
  pages =        "1048--1055",
  month =        dec,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/33450.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; performance",
  review =       "ACM CR 8807-0519",
  subject =      "{\bf D.4.0}: Software, OPERATING SYSTEMS, General,
                 UNIX. {\bf D.4.0}: Software, OPERATING SYSTEMS,
                 General. {\bf C.1.2}: Computer Systems Organization,
                 PROCESSOR ARCHITECTURES, Multiple Data Stream
                 Architectures (Multiprocessors), Parallel processors.
                 {\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Circuit switching networks. {\bf D.4.1}:
                 Software, OPERATING SYSTEMS, Process Management. {\bf
                 D.4.2}: Software, OPERATING SYSTEMS, Storage
                 Management. {\bf D.4.3}: Software, OPERATING SYSTEMS,
                 File Systems Management. {\bf D.4.4}: Software,
                 OPERATING SYSTEMS, Communications Management.",
}

@Article{Gillenson:1987:DDS,
  author =       "Mark L. Gillenson",
  title =        "The duality of database structures and design
                 techniques",
  journal =      j-CACM,
  volume =       "30",
  number =       "12",
  pages =        "1056--1065",
  month =        dec,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/33451.html",
  acknowledgement = ack-nhfb,
  keywords =     "design",
  review =       "ACM CR 8806-0442",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Normal
                 forms.",
}

@Article{Mendelson:1987:ESC,
  author =       "Haim Mendelson",
  title =        "Economies of scale in computing: {Grosch}'s law
                 revisited",
  journal =      j-CACM,
  volume =       "30",
  number =       "12",
  pages =        "1066--1072",
  month =        dec,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/33452.html",
  acknowledgement = ack-nhfb,
  keywords =     "economics; management; performance",
  review =       "ACM CR 8808-0594",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS. {\bf K.1}: Computing Milieux, THE COMPUTER
                 INDUSTRY. {\bf K.6.0}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, General. {\bf
                 C.5.0}: Computer Systems Organization, COMPUTER SYSTEM
                 IMPLEMENTATION, General.",
}

@Article{Nielsen:1987:CLR,
  author =       "Kjell W. Nielsen and Ken Shumate",
  title =        "Corrigenda: {``Designing large real-time systems with
                 {Ada}''}",
  journal =      j-CACM,
  volume =       "30",
  number =       "12",
  pages =        "1073--1073",
  month =        dec,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Wed Aug 17 00:39:02 1994",
  bibsource =    "http://www.acm.org/pubs/toc/",
  note =         "See \cite{Nielsen:1987:DLR}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/33454.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; languages",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Ada. {\bf C.3}: Computer Systems
                 Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
                 SYSTEMS, Real-time systems.",
}

@Article{Hester:1987:SOS,
  author =       "J. H. Hester and D. H. Hirschberg",
  title =        "Self-organizing search lists using probabilistic
                 back-pointers",
  journal =      j-CACM,
  volume =       "30",
  number =       "12",
  pages =        "1074--1079",
  month =        dec,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/33453.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms",
  review =       "ACM CR 8810-0786",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Lists. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sorting and searching. {\bf G.3}: Mathematics
                 of Computing, PROBABILITY AND STATISTICS, Probabilistic
                 algorithms (including Monte Carlo).",
}

@Article{Ringwood:1988:PDL,
  author =       "G. A. Ringwood",
  title =        "{Parlog86} and the dining logicians",
  journal =      j-CACM,
  volume =       "31",
  number =       "1",
  pages =        "10--25",
  month =        jan,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/35044.html",
  acknowledgement = ack-nhfb,
  keywords =     "languages; theory",
  review =       "ACM CR 8902-0063",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Prolog. {\bf D.1.4}: Software,
                 PROGRAMMING TECHNIQUES, Sequential Programming. {\bf
                 D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Parlog86. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving. {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming.",
}

@Article{Cohen:1988:VOD,
  author =       "Jacques Cohen",
  title =        "A view of the origins and development of {Prolog}",
  journal =      j-CACM,
  volume =       "31",
  number =       "1",
  pages =        "26--36",
  month =        jan,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/35045.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; languages",
  subject =      "{\bf K.2}: Computing Milieux, HISTORY OF COMPUTING.
                 {\bf K.2}: Computing Milieux, HISTORY OF COMPUTING,
                 Software. {\bf D.3.2}: Software, PROGRAMMING LANGUAGES,
                 Language Classifications. {\bf F.4.1}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Mathematical Logic. {\bf K.2}: Computing Milieux,
                 HISTORY OF COMPUTING, People.",
}

@Article{Kowalski:1988:EYL,
  author =       "Robert A. Kowalski",
  title =        "The early years of logic programming",
  journal =      j-CACM,
  volume =       "31",
  number =       "1",
  pages =        "38--43",
  month =        jan,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/35046.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; languages; theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Logic
                 programming. {\bf I.2.5}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Programming Languages and
                 Software, Prolog. {\bf K.2}: Computing Milieux, HISTORY
                 OF COMPUTING. {\bf D.3.2}: Software, PROGRAMMING
                 LANGUAGES, Language Classifications, Prolog. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming.",
}

@Article{Kay:1988:FSS,
  author =       "J. Kay and P. Lauder",
  title =        "A Fair Share Scheduler",
  journal =      j-CACM,
  volume =       "31",
  number =       "1",
  pages =        "44--55",
  month =        jan,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Mon Jan 27 13:30:53 1997",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/35047.html",
  acknowledgement = ack-nhfb,
  keywords =     "management; measurement; performance",
  review =       "ACM CR 8903-0173",
  subject =      "{\bf K.6.2}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Installation
                 Management, Performance and usage measurement. {\bf
                 C.4}: Computer Systems Organization, PERFORMANCE OF
                 SYSTEMS, Performance attributes. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Scheduling.",
}

@Article{Stott:1988:ACU,
  author =       "Jack W. Stott and Jeffrey E. Kottemann",
  title =        "Anatomy of a compact user interface development tool",
  journal =      j-CACM,
  volume =       "31",
  number =       "1",
  pages =        "56--66",
  month =        jan,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/35048.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  review =       "ACM CR 8808-0600",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces. {\bf H.1.2}: Information
                 Systems, MODELS AND PRINCIPLES, User/Machine Systems.",
}

@Article{Weber:1988:CTJ,
  author =       "Ron Weber",
  title =        "Computer technology and jobs: an impact assessment
                 model",
  journal =      j-CACM,
  volume =       "31",
  number =       "1",
  pages =        "68--77",
  month =        jan,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/35049.html",
  acknowledgement = ack-nhfb,
  keywords =     "economics; management; measurement",
  review =       "ACM CR 8807-0556",
  subject =      "{\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Social Issues, Employment. {\bf K.4.3}: Computing
                 Milieux, COMPUTERS AND SOCIETY, Organizational
                 Impacts.",
}

@Article{Kahane:1988:CBP,
  author =       "Yehuda Kahane and Seev Neumann and Charles S.
                 Tapiero",
  title =        "Computer backup pools, disaster recovery, and default
                 risk",
  journal =      j-CACM,
  volume =       "31",
  number =       "1",
  pages =        "78--83",
  month =        jan,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/35050.html",
  acknowledgement = ack-nhfb,
  keywords =     "management; security",
  review =       "ACM CR 8907-0511",
  subject =      "{\bf K.6.0}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, General. {\bf
                 K.6.2}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Installation Management. {\bf
                 K.6.4}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, System Management.",
}

@Article{Frenkel:1988:ASV,
  author =       "Karen A. Frenkel",
  title =        "The Art and Science of Visualizing Data",
  journal =      j-CACM,
  volume =       "31",
  number =       "2",
  pages =        "110--121",
  month =        feb,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214971.html;
                 http://www.acm.org/pubs/toc/Abstracts/0001-0782/42373.html",
  acknowledgement = ack-nhfb,
  keywords =     "human factors",
  review =       "ACM CR 8809-0674",
  subject =      "{\bf I.3.7}: Computing Methodologies, COMPUTER
                 GRAPHICS, Three-Dimensional Graphics and Realism. {\bf
                 I.3.0}: Computing Methodologies, COMPUTER GRAPHICS,
                 General. {\bf I.3.3}: Computing Methodologies, COMPUTER
                 GRAPHICS, Picture/Image Generation. {\bf I.3.5}:
                 Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling.",
}

@Article{Greenberg:1988:CAL,
  author =       "Donald P. Greenberg",
  title =        "{Coons} Award Lecture",
  journal =      j-CACM,
  volume =       "31",
  number =       "2",
  pages =        "122--129",
  month =        feb,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Sat Sep 24 11:12:37 1994",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214972.html;
                 http://www.acm.org/pubs/toc/Abstracts/0001-0782/42374.html",
  acknowledgement = ack-nhfb,
  keywords =     "design; human factors; standardization",
  review =       "ACM CR 8811-0882",
  subject =      "{\bf I.3.0}: Computing Methodologies, COMPUTER
                 GRAPHICS, General. {\bf K.2}: Computing Milieux,
                 HISTORY OF COMPUTING, People. {\bf I.3.5}: Computing
                 Methodologies, COMPUTER GRAPHICS, Computational
                 Geometry and Object Modeling, Modeling packages. {\bf
                 I.3.7}: Computing Methodologies, COMPUTER GRAPHICS,
                 Three-Dimensional Graphics and Realism. {\bf J.0}:
                 Computer Applications, GENERAL. {\bf K.3.2}: Computing
                 Milieux, COMPUTERS AND EDUCATION, Computer and
                 Information Science Education.",
}

@Article{Heckbert:1988:RTJ,
  author =       "Paul S. Heckbert",
  title =        "Ray Tracing {Jell-O} Brand Gelatin",
  journal =      j-CACM,
  volume =       "31",
  number =       "2",
  pages =        "130--134",
  month =        feb,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214974.html;
                 http://www.acm.org/pubs/toc/Abstracts/0001-0782/42375.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; image output; theory",
  subject =      "{\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Array and vector processors. {\bf
                 I.3.7}: Computing Methodologies, COMPUTER GRAPHICS,
                 Three-Dimensional Graphics and Realism, Color, shading,
                 shadowing, and texture. {\bf J.3}: Computer
                 Applications, LIFE AND MEDICAL SCIENCES, Health.",
}

@Article{Pickover:1988:PFC,
  author =       "Clifford A. Pickover",
  title =        "Pattern Formation and Chaos in Networks",
  journal =      j-CACM,
  volume =       "31",
  number =       "2",
  pages =        "136--151",
  month =        feb,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  MRclass =      "58F13 (92A05)",
  MRnumber =     "89g:58138",
  bibdate =      "Tue Sep 06 19:54:02 1994",
  bibsource =    "http://www.acm.org/pubs/toc/",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214975.html;
                 http://www.acm.org/pubs/toc/Abstracts/0001-0782/42376.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms; design; image property; statistics;
                 theory",
  review =       "ACM CR 8904-0245",
  subject =      "{\bf I.3.2}: Computing Methodologies, COMPUTER
                 GRAPHICS, Graphics Systems, Distributed/network
                 graphics. {\bf C.2.1}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design, Network topology. {\bf J.2}: Computer
                 Applications, PHYSICAL SCIENCES AND ENGINEERING,
                 Mathematics and statistics. {\bf J.2}: Computer
                 Applications, PHYSICAL SCIENCES AND ENGINEERING,
                 Physics. {\bf G.1.7}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, Ordinary Differential Equations,
                 Convergence and stability.",
}

@Article{Gallant:1988:CES,
  author =       "Stephen I. Gallant",
  title =        "Connectionist Expert Systems",
  journal =      j-CACM,
  volume =       "31",
  number =       "2",
  pages =        "152--169",
  month =        feb,
  year =         "1988",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Neural/neural.5.bib;
                 http://www.acm.org/pubs/toc/",
  note =         "includes excurse on the Pocket Algorithm",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/214977.html",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms",
  subject =      "{\bf